Breaking IT OT Silos With ICS OT Visibility 1692284249
Breaking IT OT Silos With ICS OT Visibility 1692284249
Breaking IT OT Silos With ICS OT Visibility 1692284249
In this 2023 ICS/OT Visibility survey, the results provide a glimpse into the relationship
between IT and OT security operations and provide key insights, including:
• While SOC capabilities are expanding to include more ICS/OT, there are still
significant gaps in OT-specific visibility as well as staffing and education issues
across enterprise IT.
• Even in the areas where IT and OT SOC capabilities are merging, the visibility is still
incomplete.
• OT security programs are less mature than their IT counterparts, specifically in the
areas of identifying, containing, and eradicating threats in their environments and
overall incident response.
• Although staffing and lack of education and training were identified as the greatest
challenges for security operations, there are also significant gaps due to legacy
technology and limitations in implementing IT capabilities in OT environments.
Survey results also indicate that these are the areas that could benefit from more
automation (because they require more resources) and where respondents feel IT and OT
could complement each other more.
This survey explores how respondents are currently tackling ICS/OT visibility challenges,
the gaps across the IT-OT boundary, the roadblocks for expanding visibility, and the
maturity comparisons from both domains.
This year’s survey had nearly 350 respondents across a wide variety of industrial sectors.
Details are shown in Figure 1 on the next page.
1
“Alert (AA22-103A), APT Cyber Tools Targeting ICS/SCADA Devices,” www.cisa.gov/uscert/ncas/alerts/aa22-103a
Small/Medium
Information (1,001–5,000)
Technology
Medium
(5,001–15,000)
Engineering/
Control Systems Medium/Large
(15,001–50,000)
Critical
Manufacturing Large
(More than 50,000)
Each gear represents 10 respondents.
Each building represents 10 respondents.
Security manager or
Ops: 111 director
HQ: 22 Ops: 114
HQ: 23
Ops: 128
HQ: 56 Security administrator/
Security analyst
IT manager or director
Ops: 313 Ops: 83
HQ: 259 HQ: 8
Figure 1. Demographics of
Respondents represented organizations of various sizes, both in terms of workforce Survey Respondents
and the number of industrial facilities being operated. Roughly 20% of respondents, the
largest pool of survey results, worked in organizations with 101–500 people while nearly
30% of respondents operated 1–10 industrial facilities (and another 18.5% operated 10–25
industrial facilities). That said, some surveyed firms were more than 50,000 people strong
(14.5% of respondents) and had operations spanning more than 1,000 industrial sites
(6.3% of respondents).
Stage 1 requires:
• P
lanning—During this stage, the attacker identifies
their target and researches potential vulnerabilities
in the target’s security defenses. The attacker
also may gather information about the target’s
employees, partners, and customers to better
understand the target’s security posture. Based on the Cyber Kill Chain® model from Lockheed Martin
• P
reparation—In this stage, the attacker prepares Figure 2. Stage 1 of the ICS Cyber
their tools and techniques for the attack. They may create malware or phishing Kill Chain
emails, set up command and control infrastructure, or conduct reconnaissance to
identify potential targets.
• C
yberintrusion—This is the stage where the attacker gains access to the target’s
network or system. They may use a variety of tactics, such as exploiting vulnerabilities,
using stolen credentials, or social engineering techniques to gain access.
2
For more information on the ICS Cyber Kill Chain, visit www.sans.org/white-papers/36297
• S
ustainment, entrenchment, development,
and execution—In this final stage, the attacker
focuses on achieving their goals, such as
stealing data, disrupting operations, or installing
ransomware. The attackers also may work to
maintain their access and evade detection, and
they may continue to develop new tactics and
techniques for future attacks.
3
For more information, visit https://ics.sans.org/duc5
As SOCs expand in OT environments, they not only must determine what data can be
integrated to increase visibility but also what services will be performed by an OT-capable
SOC. This determination could include anything from passive defense to threat hunting
to intelligence functions—each of which may have its own prerequisites, metrics, and
feasibility in any given environment.
Furthermore, within security operations, there are three levels of analysts that will need to
have some level of OT training to be successful. They are:
• T
ier 1—This is the first level of analysts in a SOC. Their primary responsibility is to
monitor security alerts and events, triage incidents, and perform initial investigation
and analysis. Tier 1 analysts typically have entry-level security skills and use
predefined playbooks and workflows to investigate alerts.
• T
ier 2—If an incident requires further investigation, it is escalated to Tier 2 analysts.
These analysts have more experience and knowledge than Tier 1 analysts and are
responsible for conducting more in-depth analysis and investigation of security
incidents. They also may be responsible for identifying and documenting new
threats, creating custom playbooks, and working with Tier 1 analysts to improve
overall SOC efficiency.
It’s important to note that some routine tasks performed by Tier 1 analysts in an IT-
specific SOC may cause large problems in an integrated OT SOC. For example, if a Tier 1
analyst were to leverage endpoint protections to quarantine or delete files in an infected
ICS/OT asset, or reimage it entirely, such an action could have impacts on the industrial
process being controlled, depending on the system or the timing of such actions. As such,
an OT-specific (or integrated) SOC likely would need to escalate more often to the Tier 3
ICS/OT analyst with knowledge of those systems and the people operating them.
Expanding Visibility
With that foundation, we can now explore the survey results specific to ICS/OT visibility
and larger discussions around IT and/or OT security operation centers. Out of the nearly
350 respondents operating industrial facilities, 80% have monitoring capabilities within
their ICS/IT environment. As observed throughout the survey responses, however, the
lower level of the Purdue Model significantly lacks visibility across industrial facilities. Of
the respondents, approximately 50% claim that their enterprise SOC includes some level
of ICS/OT visibility.4 With or without an enterprise SOC, 37% of respondents indicated that
they had an ICS/OT-specific SOC.
Interestingly, survey results from the energy sector largely indicated a preference for
an enterprise-wide SOC with OT visibility, while engineering and critical manufacturing
sectors preferred an OT-specific SOC, which tends to have smaller workforces, according
to survey respondents. These preferences could suggest that the OT SOC functions are
performed locally at plant locations compared to the energy sector, which traditionally
has pockets of centralized operations.
Of the survey respondents that had no ICS/OT visibility in their SOC (or a standalone
OT-specific SOC), 67% indicated there were plans to expand their SOC to include
these capabilities.
As mentioned previously, the SOC may perform several different services for the
organization’s business units. When asked about one of the more foundational services,
incident response for OT, nearly 40% of respondents indicated that only IT staff would
respond to the incident. An additional 6% stated that there was no OT-specific incident
response plan. Unfortunately, OT cybersecurity incidents require a combination of IT and
OT expertise, specific to the safety and reliability of the ICS/OT environment. In a related
statistic, 54% of respondents also identified training for IT staff in OT cybersecurity as the
No. 1 challenge for expanding security operations.
4
Visibility gaps are covered in the next section, Gaps in OT-Specific Visibility, and this result does not imply full ICS/OT visibility.
INCIDENT INVESTIGATION
AND RESPONSE
Limited visibility,
existing resources
Existing
5
The whitepaper on the Five ICS Cybersecurity Critical Controls can be found here: www.sans.org/white-papers/five-ics-cybersecurity-critical-controls
34% 33%
41%
Figure 6. Server Assets Running Figure 7. Engineering Assets Running Figure 8. Operator Assets Running
Commercial OS Commercial OS Commercial OS
Organizational size absolutely scaled with EDR deployments. Smaller organizations (1–25
industrial facilities) had EDR on 50% of their servers, while mid-sized organizations
(100–500 industrial facilities) reported 75–80% EDR coverage on their server assets. The
coverage dipped again for organizations between 500–1,000 industrial facilities, but then
for organizations with more than 1,000 industrial sites, more than 80% of server assets
with EDR was deployed where possible. Size had no discernable impact on engineering or
operator assets—and, in fact, having an enterprise-wide SOC correlated with higher server
EDR deployments, implying that the server assets are centrally managed compared to the
on-site engineering and operator assets.
Using the Purdue Model as a reference architecture, we asked our respondents about where
NSM technology was deployed. The averages across all respondents are shown in Figure 9.
No/Unknown Yes
29.9%
70.1%
35.5%
64.5%
37.5%
62.5%
19.6%
80.4%
8.2%
91.8%
CSF Category Activity Low Labor Intensity Moderate Labor Intensity High Labor Intensity
Asset inventory 13.6% 43.0% 42.1%
Identify Cyber risk management and impact evaluation 11.3% 47.5% 38.0%
Threat management and intelligence 12.7% 42.1% 35.3%
Configuration management 12.2% 38.0% 47.5%
Identity and access management 12.7% 46.2% 38.0%
Protect Cybersecurity workforce management 11.3% 49.3% 33.9%
Cybersecurity policies and procedures 13.6% 49.3% 34.8%
Vulnerability management 10.4% 42.1% 45.2%
Cyber event detection 14.5% 43.0% 39.4%
Detect Cyber event analysis 10.9% 43.9% 41.2%
Cyber incident determination 9.0% 44.3% 41.6%
Cyber incident containment 7.7% 38.9% 46.2%
Respond
Cyber incident eradication 5.9% 33.9% 54.3%
Cyber incident recovery 8.1% 37.1% 47.5%
Recover
Cyber incident lessons learned 12.2% 45.7% 35.7%
6
More information about the NIST CSF can be found at www.nist.gov/cyberframework.
One theme became readily apparent when looking at both the level of effort and
the relative maturity compared to traditional IT practices: ICS/OT incident response
and recovery is difficult. Survey respondents overwhelmingly listed cyber incident
containment, eradication, and recovery as requiring the highest levels of effort
(46.2%, 54.3%, and 47.5% of respondents, respectively). Meanwhile, every single task
in the following list for incident response was listed as less mature compared to IT.
• Cyber event detection (45.7% of respondents listed it as less mature than IT)
• Cyber event analysis (40.8% of respondents listed it as less mature than IT)
• Cyber incident recovery (40.4% of respondents listed it as less mature than IT)
• C
yber incident lessons learned (40.4% of respondents listed it as less mature
than IT)
These results indicate that there are likely areas where further education and
automation not only can help improve the relative maturity of incident response
capabilities but also help decrease the overall manual labor required.
where logs and security operations Cyber incident lessons learned 50.3%
7
“Developing an Industrial Control Systems Cybersecurity Incident Response Capability,” The Department of Homeland Security,
https://us-cert.cisa.gov/sites/default/files/recommended_practices/final-RP_ics_cybersecurity_incident_response_100609.pdf
case security practitioners must focus Lack of buy-in from OT/engineering/operations 15.6%
on optimizing within those constraints Lack of testing in ICS/OT environments with visibility tools 14.2%
On the relative maturity between IT and OT, the industry needs to understand not only
where OT security can continue to improve but also where the fundamental differences
between IT and OT need to be accounted for, such as incident response plans and
capabilities. Understanding these challenges and opportunities is especially helpful for
teams that are growing in ICS/OT security. This paper outlined which capabilities may
require additional resources. These would be smart areas to further invest in as an ICS/OT
security program matures.
Sponsor