Internet exposure of Operational Technology (OT) and Industrial Control Systems (ICS) remains a critical infrastructure security issue, according to Forescout’s seven-year analysis of internet-exposed OT/ICS data.
“If these warnings sound familiar, it is because they are. The looming potential for a mass target scenario is high,” said Elisa Costante, VP of research at Forescout Research – Vedere Labs.
Better safe than sorry
Forescout’s Better Safe Than Sorry report revealed that the United States and Canada significantly reduced the number of exposed devices during the study period by 47% and 45%, respectively.
It also revealed the need for enhanced risk management strategies, such as precise and detailed software and hardware bills of materials. Common system integrator practices like delivering pre-packaged units acting as black boxes to asset owners cause the exposure of OT devices and protocols, which most asset owners are unaware of.
The study revealed that nearly half of the reported ports remain vulnerable to attack, a year after reporting some to CISA, retaining the same open ports without any alterations or protective measures.
Not if, but when
"Time and again, we have seen the dire consequences of ignoring critical infrastructure threats,” adds Costante. “It is not a matter of if, but when, these vulnerabilities will be exploited. Let us heed the warnings and take proactive measures to safeguard our infrastructure before it is too late."
Costante reminds vendors, service providers, and regulatory agencies to collaborate to prevent attacks on critical infrastructure.