Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • NSA offers advice: connecting OT to the rest of the net can lead to “indefensible levels of risk”
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach

NSA offers advice: connecting OT to the rest of the net can lead to “indefensible levels of risk”

5 years ago Graham Cluley
NSA offers advice: connecting OT to the rest of the net can lead to “indefensible levels of risk”

The US Defense Department and third-party military contractors are being advised to strengthen the security of their operational technology (OT) in the wake of security breaches, such as the SolarWinds supply chain attack.

The guidance comes from the NSA, which this week has issued a cybersecurity advisory entitled “Stop Malicious Cyber Activity Against Connected Operational Technology”

In its advisory, the NSA describes how organisations should evaluate the risks against OT – such as Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA) and Distributed Control Systems (DCS) – and make changes to “realistically monitor and detect malicious activity.”

According to the NSA, if the pros and cons of connecting OT networks and control systems to traditional IT networks and the public internet are not properly reassessed, there is a danger that organisations will be placing themselves in “indefensible levels of risk.”

Just how serious are the risks if OT hardware such as valves and pressure sensors within industrial operations are impacted by a malicious hacker?

Well, the NSA doesn’t mince its words:

The risks could involve many aspects, including:

a. Loss of process control.

b. Failure of safety systems/equipment to operate as designed.

c. Loss of revenue from process interruptions or shutdowns. d. Loss of human life should safety systems/equipment not operate appropriately.

And this is the reason why the authorities are calling on operators to acknowledge that standalone OT systems that are not connected to enterprise IT systems and the outside world are “safer from outside threats… no matter how secure the outside connections are thought to be.”

Of course, having such systems entirely unconnected on a permanent basis brings its own challenges, and so the NSA acknowledges that “an intermittently connected OT system can be a good compromise because it is only at risk when it is connected, which should only be done when required, such as for downloading updates or during times when remote access is required for a finite period of time.”

The NSA is right in pointing out that every time an isolated OT system and IT systems connect there is a rise in the risk level, due to the increased attack surface. So careful judgment calls need to be made about what the most important IT-OT connections are, and to ensure that they are hardened as much as possible to fend off potential attacks.

Where IT-OT connectivity is deemed essential, the NSA recommends organisations ensure that all connections are fully managed, and that all access attempts are authenticated, actively monitored, and logged.

Properly understanding the risks associated with connecting critical IT and OT systems and putting measures in place to protect them, should lead to an improved cybersecurity posture… and reduce the chance that a potentially highly-damaging or deadly attack will succeed.

More details on what steps OT administrators should take to protect their systems can be found in the NSA’s advisory.


Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc

The post ” NSA offers advice: connecting OT to the rest of the net can lead to “indefensible levels of risk”” appeared first on TripWire

Source:TripWire – Graham Cluley

Tags: Critical Severity, Goverment, Hacker, TripWire

Continue Reading

Previous Critical Flaws Hit Cisco SD-WAN vManage and HyperFlex Software
Next CISO Challenge: Check Your Cybersecurity Skills On This New Competition Site

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

2 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign

3 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models

14 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files

15 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

18 hours ago [email protected] (The Hacker News)
  • Data Breach

Orchid Security Introduces Continuous Identity Observability for Enterprise Applications

20 hours ago [email protected] (The Hacker News)

Recent Posts

  • Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows
  • Malicious NGINX Configurations Enable Large-Scale Web Traffic Hijacking Campaign
  • Microsoft Develops Scanner to Detect Backdoors in Open-Weight Large Language Models
  • DEAD#VAX Malware Campaign Deploys AsyncRAT via IPFS-Hosted VHD Phishing Files
  • China-Linked Amaranth-Dragon Exploits WinRAR Flaw in Espionage Campaigns

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT