Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • How Network Segmentation Can Protect Supply Chains from Ransomware Attacks
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

How Network Segmentation Can Protect Supply Chains from Ransomware Attacks

5 years ago Tripwire Guest Authors
How Network Segmentation Can Protect Supply Chains from Ransomware Attacks

Organizations can take various steps to protect their operational technology (OT) environments against digital threats. But some stand out more than others. In particular, network segmentation is described as “the first answer to insufficient ICS (Industrial Control System) cybersecurity.” Experts advocate zoning ICS assets to coordinate informational technology (IT) and OT environments effectively.

That doesn’t always happen, however. Indeed, the WannaCry and NotPetya attacks decimated the OT side of the affected organizations’ infrastructure partly because segmentation was not in place. Otherwise, the impact of the attacks could have been mitigated at least in some way.

The State of Supply Chains, Ransomware, and Segmentation

Over the past year, organizations around the world have witnessed an untold proliferation of ransomware attacks across their supply chains.

Illustrating this fact, a recent survey of hundreds of executives found that 36% of cyberattacks had disrupted supply chains significantly within the past three years. And in 2020, the greatest threat to organizations’ supply chains behind COVID-19 was cyberattacks.

Fortunately, network segmentation has proven helpful in mitigating common ransomware attacks especially those arising from breached IoT devices, third-party vendors, and the like. Part of this has to do with the main benefits of network segmentation. These include the following:

  • Eliminates network congestion, resulting in overall improved performance. More so, it is harder to detect threats and fix vulnerabilities on a congested network.
  • Improves intrusion control by making it easy to contain detected threats.
  • Minimizes access to specific sensitive data and information by zoning them to a more secure network.

Segmentation also helps in organizations in the recovery phase. By limiting the available attack surface, the impact of any attack becomes much lower, making it easier to recover or replace lost data. That stands in contrast to having to revamp a supply chain’s entire cybersecurity infrastructure.

Moving Away from Linear Network Security

Organizations can implement network segmentation on their supply chains through a virtual local area network (VLAN), firewalls, Software-Defined Perimeter (SDP), and other micro-segmentation techniques. Not only that, but companies can build even more resilient supply chains by combining these with other features such as encryption and access control.

The way in which they integrate these features together is important. Indeed, experts have been saying for years that organizations need to move away from a flat network approach. That’s because perimeter security is great only until an attacker figures out how to breach the perimeter while remaining invisible the whole time. When that happens, the attacker moves stealthily across the network to attack assets and hold them for ransom.

Network Segmentation Best Practices

Supply chains have essentially become supply (chain) networks in that most organizations have jettisoned a linear supply structure for a complex system of production and distribution. Hence, there must be a security approach that addresses this current reality, and that is network segmentation. Organizations require a scalable security solution that protects their value networks using the following best practices:

  • As IoT proliferates supply chains everywhere now, it uses secure-by-design devices. Indeed, security for IoT devices begins right from the PCB assembly stage.
  • Uses firewalls to filter traffic between defined network segments. This limits and controls access to sensitive data. In the case of a breach of classified data, it is easier to identify and isolate the source.
  • Uses micro-segmentation to implement the zero-trust principle of least privilege, which grants access to network resources per use basis. What makes this work, particularly with software-defined perimeter (SDP) solutions, is that such segmentation is identity-based rather than device-based.
  • It is also essential to be conscious of over-segmentation. Heavily isolating your networks can impact performance and impede the smooth flow of the supply chain. The goal must be to balance productivity and security in the supply chain. In essence, network segmentation must be strategic, never all in or all out.
  • Reduces the number of endpoints that you must protect by integrating resources with similar properties into a single database. Your supply chain might be spread out widely, but you still need a central security strategy.
  • Consider segmenting third-party vendors. There have been significant attacks to supply chains resulting from vendor mismanagement. Use the principle of least privilege to restrict vendors to only the resources they require to meet your needs.

Conclusion

In all the best practices discussed above, there is a caveat. Truly, network segmentation can minimize the impacts of attacks, but it is not a cure-all or a protect-all. Instead, it is just one of the preliminary steps to secure your supply chain infrastructure.

Always remember that network segmentation is not just about security; it is also about control and visibility. The vaster the supply chain, the greater the control that should be implemented since even the tiniest breaches may have the mightiest impacts.


About the Author: Joseph Chukwube is the Founder of Digitage (https://digitage.net). He discusses Cybersecurity, E-commerce and Lifestyle and he’s a published writer on Infosecurity Magazine, The HuffingtonPost and more.

 Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” How Network Segmentation Can Protect Supply Chains from Ransomware Attacks” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: COVID-19, Encryption, Malware, Ransomware, TripWire, Vulnerability

Continue Reading

Previous Apple Releases Urgent 0-Day Bug Patch for Mac, iPhone and iPad Devices
Next Hackers Turning to ‘Exotic’ Programming Languages for Malware Development

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks

5 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware

16 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More

21 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

We Found Eight Attack Vectors Inside AWS Bedrock. Here’s What Attackers Can Do with Them

23 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware

24 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

1 day ago [email protected] (The Hacker News)

Recent Posts

  • Citrix Urges Patching Critical NetScaler Flaw Allowing Unauthenticated Data Leaks
  • North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware
  • ⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More
  • We Found Eight Attack Vectors Inside AWS Bedrock. Here’s What Attackers Can Do with Them
  • Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT