Skip to content ↓ | Skip to navigation ↓

Tripwire has announced the results of research comparing risk-based security management in the industrial sector to that of other industries. The survey data is being shared at the eighth annual American Petroleum Institute Cybersecurity Conference, and reveals that 60% of the industrial control systems have no Security Configuration Management deployed.

“With the rapid escalation of critical infrastructure cybersecurity threats, industrial control organizations have a lot to do. It is encouraging that they are embracing a risk-based view of their operations at a higher than average rate, but this is not enough to protect them against determined attackers,” said Dwayne Melancon, chief technology officer for Tripwire.

“It is imperative for this sector to get a handle on system hardening and configuration management practices to improve security and reliability.”

Key findings included:

  • 51 percent use formal risk assessments to identify security risks – five percent higher than the survey average.
  • 86 percent believe minimizing noncompliance with laws and regulations helps meet certain business objectives – five percent higher than the survey average.
  • 43 percent measure the reduction in unplanned system downtime to assess the effectiveness of cost-containment management efforts, differing from survey average of 38 percent.
  • 52 percent listed the “flow of upstream communications” as one of the top three features most critical to the success of a risk-based security management approach – an eight percent increase over the survey average of 46 percent.

However, the study revealed that the industrial sector is less effective than other industries in deploying risk management controls and communicating effectively about security. Additional findings included:

  • Only 40 percent have fully or partially deployed security configuration management, differing from the survey average of 49 percent.
  • 75 percent have fully or partially deployed system hardening, five percent lower than the survey average of 80 percent.
  • 69 percent said security communications are contained in only one department or line of business, differing from the survey average of 63 percent.
  • 67 percent said security communications occur at too low a level, differing from the survey average of 62 percent.
  • Only 56 percent listed an “openness to challenge assumptions” as one of the top three features most critical to the success of a risk-based security management approach. This was six percent lower than the survey average of 62 percent.

“Even though industrial sector organizations are actively considering security risks, they must also improve their willingness to elevate key risks to the executive level,” Melancon continued. “Security risks must be considered in context with overall business risk or the entire organization’s success will be in jeopardy.”

Industrial control systems used to be those those old boxes managed by OT, and in some respects not even considered information technology in the past. With Stuxnet and the many, many other attacks, these are now deemed critical infrastructure.

“It is in any nation’s interest to protect this critical infrastructure from cyber attacks. That said, traditional IT security technologies like vulnerability management and security configuration management solutions have proven to be highly effective in protecting this critical infrastructure,” said Rekha Shenoy, Tripwire’s Vice President of Marketing and Corporate Development.

“But there’s a catch, they must be used. And the survey results show that there is room for improvement – a lot of improvement.”

The survey, conducted in April 2013 with the Ponemon Institute, evaluates the attitudes of 1,320 respondents from IT security, IT operations, IT risk management, business operations, compliance/internal audit and enterprise risk management. One hundred eight industrial sector respondents from the U.S. and U.K. participated in the industrial controls portion of the survey.

For more information about this survey, please visit: http://www.tripwire.com/ponemon/2013/#industrial.

 

Related Articles:

 

P.S. Have you met John Powers, supernatural CISO?

 

Title image courtesy of ShutterStock

Industrial control systems used to be those those old boxes managed by OT, and in some respects not even considered information technology in the past. With Stuxnet and the many, many other attacks, these are now deemed critical infrastructure.  It is in any nation’s interest to protect this critical infrastructure from cyber attacks.  That said, traditional IT security technologies like vulnerability management and security configuration management solutions have proven to be highly effective in protecting this critical infrastructure. But there’s a catch, they must be used. And the survey results show that there is room for improvement – a lot of improvement.