Securing OT key to unlocking Australia’s manufacturing vision in an ever-growing threat landscape
Evan Thomas, Channels Director, Armis The recently unveiled ‘Future Made in Australia’ heralds an exciting new chapter for local manufacturing. The Australian government is committing to partnership with the private sector to build new industries to protect against unreliable foreign supply chains. However, one critical area for success is the concurrent commitment towards manufacturing’s cyber resilience. Managing the cyber threat landscape is crucial to realise the potential of the FMIA vision and the future success of Australia’s manufacturing sector, as cyber threats continue to escalate with the industry’s dependence on Operational Technology (OT) and Industrial Control Systems (ICS). It is vital for businesses to deploy better cybersecurity, platforms and protocols if they are to mitigate the risk faced from cyber criminals. Securing OT and IT in ICS and Manufacturing environments The risk-based challenge with OT environments is that more recently, they are connecting to traditional enterprise IT and wireless networks. No longer being ‘air gapped’ or isolated, control systems are at higher risk of being compromised. This is because threat-actors now have the opportunity to breach OT systems through IT networks, particularly as OT typically lacks adequate security measures to protect from attack. To complicate matters further, OT devices in industrial and manufacturing environments have no built-in security. It is also not possible to install an agent on many of the legacy devices, as they were designed by manufacturers who were operating on the, now invalid, assumption that these devices wouldn’t be connected to any other networks. Unfortunately, the convergence of IT and OT means this is no longer the case, exposing OT devices to numerous threats. Without the right security capabilities designed with all types of assets (OT, IT, and IoT) in mind, practitioners are limited in their visibility into what devices are on their networks, what risks each device poses […]