<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">
BLOG

IT / OT Convergence: The Great Dilemma

March 23, 2022

The IT / OT Convergence Parody

Whilst people often refer to the utilities sector as a “Critical Infrastructure”, the transport and logistics industry should be considered equally as vital. A country’s economy demands the rapid delivery of goods to manufacturers, retailers and consumers.

A significant supply chain disruption can impact the entire global economy.

Transport and logistics companies are constantly competing to deliver goods faster and cheaper. Some firms are finding a competitive advantage through the convergence of their IT and OT environments.

Within IT environments, speed and security have generally been the mainstay considerations. Conversely, on the OT side, the primary drivers have been safety and 100% availability.

OT protocols and devices are normally not reliant on a high speed/bandwidth network and security was never a concern, as historically OT was always an isolated environment.

Cybercriminals are now actively exploiting the vulnerabilities created by the IT/OT convergence.

This has led to cyberattacks on transportation and logistics operations of every type: from air, rail and sea to warehousing, airports and everything in between.

Given the primary driver of the OT environment is non-interrupted availability, rather than security, this environment has become the primary target. Once the OT controls for physical equipment are converged with IT computers and networks, the air gap that separated the systems (and protected OT environments) is gone.

Research shows that malware and cyberattacks will almost certainly be designed to target and penetrate this expanded digital attack surface, resulting in an increasing number of breaches.

There are numerous compelling reasons why OT networks are prized targets for some cybercriminals.

In traditional IT environments, it’s “personal data” that criminals often seek. Even though OT systems don’t possess this type of information, impacting a critical infrastructure system still has huge appeal for state sponsored and commercial gain cybercriminals.

Agendas for OT attacks can extend to holding a critical system hostage, manipulating stock prices, or even operating as a competitive agent.

Given the potential risks, companies are proactively implementing sophisticated, non-disruptive security solutions for their OT environments.

These solutions are generally reliant on obtaining visibility into the OT network data and devices for functions such as asset/vulnerability discovery, threat detection and response. Access to this data, whilst recognised as a requirement, is alarmingly often overlooked during the security tool selection and planning stages. Unfortunately, without secure, non-disruptive access to the data, security tools cannot properly protect the network.

An OT environment is typically a dated infrastructure of legacy systems, applications, network switches and aging HMI (human-machine interface) devices that have not been consistently patched or updated through the years. Often the aged network switches have no SPAN/Mirror facility to mirror packets, or there are serious concerns regarding port availability and switch utilisation capacity.

Data Diode

Also, questions quickly arise regarding the disruption of an operational network and the impact of reconfiguring switches that may not have been touched since they were installed many years prior. When opening a switch port, there’s a potential vulnerability created as bi-directional traffic flow can inadvertently provide backdoor access into the OT network.

Garland Technology’s network TAPs with data diode monitoring offer a means of obtaining network data, without disrupting the current configuration. Engineered to exclusively allow uni-directional traffic flow, data diode TAPs guarantee that a backdoor security vulnerability isn’t introduced.

In order to obtain complete visibility, data acquisition is required from many locations within the OT network. Often, this will mean that physical connections are of different media types (fibre, copper etc.) and these need to be aggregated together and provided to the security tools in the format they require.

Garland Technology offers multiple media conversion options within our portfolio of network TAPs.

Aggregation of the mirrored data is provided through the use of one or more network packet brokers. Whilst frequently used in IT environments, advanced network packet broker features such as packet slicing, decryption and deduplication are generally not needed for OT. These features are compute-intensive and therefore create increased platform costs.

Garland Technology has developed a unique line up of network packet brokers that fit any environment. This includes simple-to-deploy aggregators ideal for OT environments, all the way up to higher end network packet brokers commonly deployed in enterprise IT environments.

Data acquisition (OT network visibility) is a vital component of the OT security stack. It should be considered early and often in the security tool evaluation process.

Indeed, TAPs and network packet brokers are incredibly useful assets in the security tool evaluation process. Data from strategic locations can be collected and then delivered to multiple security tools simultaneously as part of a proof of concept.

When looking to enhance or add security within your OT environment, reach out to us for assistance. Garland Technology is an expert in OT network visibility. Together with our tech partners, we’re available to assist you with current and upcoming security projects.

Unidirectional Data Diodes

See Everything. Secure Everything.

Contact us now to secure and optimized your network operations

Heartbeats Packets Inside the Bypass TAP

If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.

If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.

While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.

Some of you may have noticed a flaw in the logic behind this solution!  You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.

Glossary

  1. Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.

  2. Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.

  3. Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.

NETWORK MANAGEMENT | THE 101 SERIES