SANS Institute’s annual survey of industrial control systems (ICS) has revealed that the introduction of unprotected devices into sensitive ICS networks and ransomware are now among the top threats that organisations face in securing critical infrastructure. In addition, 69% of respondents stated that the level of threats to control systems is now high or severely critical.
“Industrial plants and critical infrastructure have become prime targets for politically and financially motivated cybercriminals in the MEA region,” explained Ned Baltagi, Managing Director, Middle East & Africa at SANS. “Traditionally, these systems have been less frequently updated and the teams operating them lack dedicated cybersecurity professionals. This places some of the most critical systems we have in the region at risk of cyberattack.”
The survey also found that some basic security practices are still not being implemented and identifying attacks remains challenging; 40% of ICS security practitioners lack visibility or sufficient supporting intelligence into their ICS networks and this is one of the primary impediments to securing these systems.
Despite the high-profile news coverage of recent attacks against unpatched systems, SANS found that only 46% of respondents regularly apply vendor-validated patches. An astounding 12% neither patch nor layer controls around critical control system assets.
“The importance of patching systems and keeping them up to date cannot be emphasised enough,” explained Baltagi. “Consider WannaCry, which as a ransomware attack was no doubt a top concern for ISC security practitioners. It spread by exploiting a known Microsoft vulnerability which is why unpatched systems played a key role in the spread of the malicious code. Once again, the lack of skilled cybersecurity professionals or appropriately trained IT staff in the field is impacting the ability of ICS organisations to adequately patch their systems, exacerbating this issue.”
Bengt Gregory-Brown, survey author, noted, “Changes in ICS/SCADA environments have historically come at a pretty slow pace, but this pace is accelerating with IT/OT convergence, and the speed of change is challenging everyone working with these systems to keep up, or accept growing levels of risk.”
Now in its fourth consecutive year, the survey noted some improvements in protecting critical assets and infrastructure, and respondents acknowledged that their ICS security budgets have increased over the fiscal year 2016. “With higher budgets becoming available to ISC professionals, it is imperative that they are aware of the key issues that the industry faces so they can allocate time and resources to the most pressing issues.” concluded Baltagi.
SANS Institute’s survey of industrial control systems report can be viewed and downloaded here.
Further information:
Two SANS ICS training courses are running in Dubai and Khobar in November and December this year:
1. ICS515: ICS Active Defence and Incident Response teaches how to deconstruct ICS cyberattacks, leverage an active defence to identify and counter threats in ICS, and use incident response procedures to maintain the safety and reliability of operations.
2. ICS410: ICS/SCADA Security Essentials provides a foundational set of standardised skills and knowledge for industrial cybersecurity professionals. The course is designed to ensure that the workforce involved in supporting and defending industrial control systems is trained to keep the operational environment safe, secure, and resilient against current and emerging cyberthreats.