Please select a language

Please select the country/region where you would like to introduce your business.

Contact Us
Contact Us

Please select a language

Please select the country/region where you would like to introduce your business.

Knowledge OT Security – An Essential for Overseas Locations and Factories: Introduction to Risks and Specific Countermeasures(3/3)~Specific points in implementing OT security measures~

To strengthen OT security, it is vital to implement a combination of several specific measures based on the guidelines.


img

OT (Operational Technology) security is essential in the manufacturing and infrastructure sectors, where digitization is progressing, and the risk of cyber-attacks is increasing. To achieve OT security, it is vital to have a clear division of roles between headquarters and overseas locations so they can cooperate promptly. Headquarters are responsible for overall security standards and governance, while overseas locations need to strengthen coordination throughout the supply chain, taking into account locally specific risks. 

This article explains the risks and specific countermeasures in OT security based on guidelines, details how to establish a security system on a global scale, and discusses specific OT security essentials in three parts.

4. Specific points in implementing OT security measures

To strengthen OT security, it is vital to implement a combination of several specific measures based on the guidelines. Some key points that should be addressed are listed below.

Four pillars of OT security measures

Network separation

Clearly separate OT and IT systems to limit the impact of cyber-attacks. For example, the production line and administrative departments can be separated using firewalls and security gateways to control access, thereby increasing the level of security.

Control access rights

Keep the number of users with remote access to the minimum necessary, and for those remote accesses that are allowed, implement multi-factor authentication (MFA) to reduce the risk of unauthorized access

Vulnerability management and patching

For OT systems, including legacy systems, it is crucial to perform periodic vulnerability scans and apply patches only when they are deemed essential. For legacy systems that are difficult to update, it is recommended that alternative measures be implemented to complement the vulnerabilities, utilizing virtual patching and network segment isolation.

In addition, equipment and systems connected to the supply chain must be kept up to date to prevent the risk of cyber-attacks spreading through the network.

Security monitoring and incident response system

To minimize damage from cyberattacks, it is vital to develop a mechanism to monitor the network and detect abnormal behavior early. For example, IDS (Intrusion Detection System) or IPS (Intrusion Prevention System) can be introduced to monitor traffic in real-time and detect signs of anomalies.

Furthermore, a company-wide incident response flow should be formulated, and a consistent response policy should be presented in a form overseen by the headquarters. At the same time, prepare an incident response manual tailored to the laws, regulations, and business processes of each location, and establish a system that enables prompt initial response and recovery work.

Understanding the Zero Trust Network

Based on the premise of “trust no one,” implement a “zero-trust” model that verifies all access inside and outside the network. This model, which always enforces authentication and verification for users and devices inside and outside the network, will be used to protect critical systems in an OT environment.

Creating a zero-trust environment improves OT security and contributes to building security that is resistant to attacks from within.

Reference:What are the components of the Zero Trust Model?
Explanation of optimal security technologies required for diversified IT environments in overseas locations.
Japanese)https://biz.kddi.com/content/column/smartwork/zero-trust/
Reference:What is Zero Trust, a security measure for IoT at overseas locations?
Japanese)https://biz.kddi.com/content/column/smartwork/zero-trust-point/

Steps for implementation and improvement

There are a wide variety of measures to strengthen OT security, and it may be difficult to achieve all of them at once. It is important first to conduct a risk analysis to understand the current situation, then check the status of each location and production facility and take priority and step-by-step measures starting with the most important areas and sections.

Step overview diagram

If it is difficult to handle in-house, requesting an outside vendor can be an effective solution.

5. Summary

Strengthening OT security is an essential initiative for companies to remain competitive and build credibility in the global marketplace. Appropriate security measures tailored to each location's OT environment can help protect systems and production facilities from external threats.

Furthermore, in today's world of IoT proliferation and integration of IT and OT, dealing with security risks is becoming increasingly complex. To address the current challenges, a security strategy that combines global standards with local requirements for each location and integrates vulnerability management, monitoring, and incident response systems is essential. In today's rapidly changing world, companies need to continuously review and strengthen the framework that protects their systems and facilities while responding quickly and flexibly.

See also:What security threats and countermeasures should you be concerned about at overseas locations?
Japanese)https://biz.kddi.com/content/column/smartwork/security-threats/
See also:What is Endpoint Security? Explaining its importance in the Zero Trust Model and best practices for overseas locations
Japanese)https://biz.kddi.com/content/column/smartwork/what-is-endpoint-security/
See also:Security measures for industrial and production systems