Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

10 steps to prevent cyberattacks on industrial control systems

By Keith Thome
industrial cyber security

Image from Pixabay

August 22, 2022

Industrial control system (ICS) security is certainly not a new concept, but over the past 18 months, its status has risen to the top of organizations’ priority lists. This is, in large part, due to the high-profile ICS attacks that have dominated news headlines of late.

Perhaps one of the most infamous incidents in recent years was the Colonial Pipeline ransomware attack in May 2021. Although the group behind the attack specifically targeted the company’s information technology (IT) systems, Colonial’s operational technology (OT) systems were affected in the process because of their reliance on IT infrastructure. The cyberattack served as an eye-opening example of the significant security risks associated with IT/OT convergence.

While ICSs can be negatively affected by ransomware and other cyberattacks targeting IT environments, they also can be the target of malware. For example, this past April, the Department of Energy (DOE), the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI) issued a joint advisory warning of a full malicious ICS framework incorporating all facets of ransomware. Known as PIPEDREAM, this malicious ICS framework demonstrates how cybercriminals are escalating in their abilities to target ICSs.

Regardless of whether ICSs are targeted from the beginning or impacted after an IT breach, cybercriminals’ motives are the same — typically financially or geopolitically driven. This means any company — regardless of industry or size — can be a target if they have something that will advance cybercriminals’ goals. Today, small ICS environments are just as valuable for an attacker as large ICSs, and every company needs to remain vigilant.

Why ICSs are an appealing target 

Cybercriminals want to reap the maximum reward for doing the minimum amount of work — and most ICSs present an opportunity for easy access into OT environments because the systems were built years ago, when cybersecurity was an afterthought. This is an attacker’s ideal target — old technology that lacks basic security protections, such as encryption and authentication protocols. Once a bad actor breaches an OT network, it might be possible to then move laterally within an organization to wreak havoc across the business. And, conversely, if a cybercriminal can breach an IT system, they can easily enter into OT networks if they are not properly designed and implemented.

Complicating matters, many industrial Internet of Things (IIoT) devices are now connected to the cloud, which has dramatically expanded organizations’ attack surfaces. This means organizations are battling unsecured ICSs, a rise in network entry points and a significant increase in ICS attacks.

Defending against a growing threat

Despite the increasing risks associated with IT/OT convergence and the rise of ICS attacks, there are steps organizations can take to strengthen their cybersecurity posture and overall cyber resilience.

  • Take advantage of existing ICS security frameworks: There are a variety of recognized regulatory standards that companies should follow to design secure, safe and reliable ICS environments. There are general frameworks, including the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF), NIST 800-82 (Guide to Industrial Control Systems Security) and ISA 99.02.01/IEC 62443: Security for Industrial Automation and Control Systems. And, then there are industry-specific frameworks, such as the North American Electric Reliability Corporation Critical Infrastructure Protection (NERC SIP), the Transportation Security Administration (TSA) Pipeline Security Guidelines and the Cybersecurity & Infrastructure Security Agency (CISA) Critical Infrastructure Sectors guidance.
  • Strengthen password policies: Password polices should require a minimum length of 12 characters as well as the use of alphabetic, numeric and special characters.
  • Utilize multi-factor authentication (MFA): MFA should be used for all externally facing authentication portals and internal sensitive services. This technology serves as a second layer of defense, so accounts remain protected even if a password is guessed.
  • Prioritize application security: Properly configure applications that can execute containerized code and prioritize application whitelisting.
  • Ensure continuous network monitoring: Perform baselining to establish “normal” environment behavior to enable abnormal behavior detection down the line. Additionally, routinely monitor and review: 1) endpoint AV/EDR logs and traffic logs to identify potential malicious activity, 2) domain controllers for increased, burst activity, 3) protocol communications for suspicious network activity, and 4) communications between PLCs and internal/external destinations to identify unusual patterns.
  • Properly segment zones to keep OT and IT separated: This will ensure the damage inflicted during an attack will stay compartmentalized within the “zone” that was breached.
  • Incorporate threat intelligence: Threat intelligence will help you stay informed on the latest attack methods targeting ICSs and how best to defend against them.
  • Stay committed to security basics: This includes keeping ICS firmware up to date, utilizing security-focused ICS protocols and ensuring patch management procedures.
  • Develop and practice an incident response (IR) plan: Develop a proper IR plan and make sure all affected personnel and systems are routinely trained and assessed on it.
  • Provide ongoing employee awareness training: Employees, from the executive team to entry level staff, should be continuously trained to recognize all types of malicious attacks and to respond with best practices, if they are targeted.

The stakes are rising when it comes to ICS attacks and the associated consequences. Beyond the business implications of these attacks (e.g., financial loss, downtime, damaged reputation, etc.), there could be serious consequences, such as physical harm to humans. In fact, Gartner predicts that “by 2025, cyber attackers will have weaponized operational technology (OT) environments to successfully harm or kill humans.”

Now is the time to lock down ICS systems with an iron-clad cybersecurity strategy, so cybercriminals can inflict harm on humans, or businesses, for that matter. Following the above best practices will start organizations down the path to cyber resilience, keeping ICSs and employees safe regardless of the threats the organization encounters along the way.

KEYWORDS: cyber security education ICS incident response Industrial Control Systems multi-factor authentication NIST cyber security framework operational resilience password security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Keiththome headshot%5b74%5d%5b46%5d

Keith Thome is a Principal Consultant in Optiv’s Threat Management practice on the Attack and Penetration team. His role is to provide post-sales support and consulting to Optiv’s clients, specializing in Adversarial Simulation. Thome has over 20 years’ IT experience and more than 10 years exclusively in Information Security. His experience ranges from small businesses to Fortune 500 corporations in a multitude of industries.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • critical-infrastructure-freepik1170x658 (1).jpg

    Industrial security posturers are improving – but still struggle to keep up with growing threats

    See More
  • covid-office re-entry freepik

    Access control systems (ACS) data can help organizations get back to the office

    See More
  • Security Lock

    6 steps to respond to enterprise cybersecurity challenges

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!