Most concerns about industrial automation vulnerabilities are related to the risk of external interference. However, our experience with OT network cyber security deployment projects, including those based on the National Cyber Security System Act, indicates that a significant portion of incidents are internal in origin: failures, unintentional changes, configuration errors, operator inattention. It should be assumed that the expected amendment to the KSC Law will reflect these observations.
Already the first NIS directive implemented in Poland through the KSC Act placed great emphasis on risk analysis and incident response in this regard. So, it is important that preparations for the implementation of the new regulations, inventories, risk analysis, response plans and the OT environment monitoring tools that are being implemented allow parallel management of incidents and detection of operational anomalies resulting from failures or human error (business continuity).
When talking to decision makers (including at the board level) about security planning, emphasize the importance of both groups of threat sources and the need to monitor and prevent them.
While there is a growing conviction among decision makers that OT networks need to implement security systems, these projects often raise legitimate concerns. In many companies, the OT infrastructure is outdated and integrating it with modern IT systems can involve significant risks. However, this is an increasingly desirable measure. Not only for security reasons, but also because of the drive toward ever more automation and remote access to OT systems needed to reduce infrastructure maintenance costs.
Another concern has to do with whether IT professionals who are tasked with supporting their automation colleagues in this task, which is new to them, understand the world of automation.
Change awaits both sides. In IT, there are certainly major learning needs and lessons to be learned about what they will face as they enter the OT world. OT teams need to be aware of the need to adapt to IT requirements. Additionally, in companies burdened with the requirements to comply with a growing number of increasingly restrictive regulations at the EU and national levels, it is necessary to clearly communicate support for change from the board level.
It is worth noting that OT environments require a different kind of security measures, often of a lower scale of complexity compared to modern IT security technologies. This makes mainly passive incident detection measures applicable, while in IT the foundation is active interference with network traffic. The very static nature of OT architectures and the highly repetitive content of network traffic affect the simpler nature of incidents, which we will also detect as a direct consequence of what risks we identify.