Cyber-security management landscape of the Indian automation industry: Overview,...
Experts propose five managerial action items that should form a part of an efficient and effective industrial automation security program

India"s industrial automation (IA) market is worth approximately $11 billion in 2023 and is projected to grow at a CAGR of roughly 14 percent from 2022 to 2027 to $23 billion in 2027. Key players in this industry include manufacturers producing (closed-circuit) TVs, mobile electronics, air-conditioners, automotive and aviation vehicles, energy products (gas, diesel, petrochemicals), and healthcare solutions. Some of the major brands (in both the private and public sectors) representing these players and serving the Indian IA market include General Electric, Reliance Industries, Rockwell Automation, Siemens India, Honeywell Automation, ABB India, BHEL, Mitsubishi Electric, Larsen and Toubro, and Titan Engineering.
The core technology (significantly different from the traditional information technology (IT) in general non-IA enterprises) behind the functioning of the IA market is (AI/ML-driven) intra-organisation IoT and operational technology (OT) embedded Industrial IoT (IIoT) networks. Such smart networks, along with associated software and mobile applications, help each organisation:
This broadened cyber-vulnerability space causes the bad actors to exploit IIoT cyber-security loopholes at a faster rate when compared to the rate at which the defenders are getting more knowledgeable and better at identifying and plugging these holes in a timely fashion. To drive home this point, according to Dragos – a market leader in IT/OT and critical infrastructure security consultancy, the ransomware attacks against the IA sector in the US (and is equally applicable to the Indian IA sector) increased by approximately 86 percent from 2022 to 2023. One of the main reasons for this increasing gap is that around 80 percent of investigated vulnerabilities lie deep within IIoT networks, with more than 82 percent of IoT/OT industries, anywhere around the globe, including India, having limited to no visibility within the IIoT environment. This limited visibility is often because of insufficient investments by an IA enterprise in IA cyber-security in the dimensions of people (e.g., human-in-the-loop), process (e.g., software supply chain issues), technology (e.g., lack of security by design), and governance (e.g., compliance).
The ransomware attacks against the IA sector in the US (and similar trends hold in India also and on the upward with Indian IAs getting increasingly digital and subsequently being on the radar of cyber-attackers) and increased approximately 86 percent from 2022 to 2023 via opportunistic threat groups with 72 percent of these ransomware attacks for 2023 targeting 437 manufacturing entities in 104 manufacturing subsectors. There was a nearly 30 percent increase in ransomware groups attacking critical industrial infrastructures between 2022 and 2023, with ransomware-as-a-service (RaaS) being the growing cyber-attack vector. Examples of well-known IA targeting ransomware groups include Lockbit, Conti, and Black Basta.
It is not just ransomware cyber-attacks that affect industrial automation systems. APTs are equally effective in launching business disruption cyber-attacks on IA enterprises in diverse sectors, including oil, gas, electricity, manufacturing, transportation, and food and beverage. In the last six years, the number of cyber-threat groups targeting industrial infrastructure has increased by approximately 300 percent. Some of the well-known and recent IA APT threat groups (along with their threat characteristics) include CHERNOVITE (manufacturing and ICS Kill Chain and IA software supply chain), BENTONITE (manufacturing, espionage and IT compromise), INDUSTROYER2 (IA software supply chain), KOSTOVITE (zero-day exploitation in IA systems), KAMACITE (command and control communications with IA infrastructure), XENOTIME (compromise of industrial safety instrumented systems), ELECTRUM (software supply chain), ERYTHRITE (search engine optimisation poisoning in IA systems), and WASSONITE (nuclear energy themed spear phishing, and command and control communications).
In contrast to that in IT systems (used for how you manage a business), cyber-incidents that impact OT systems (resembling why you are in business) can have physical consequences that threaten human and environmental safety. On top of that, OT incident responders must be able to effectively triage systems without shutting them down to maintain operational and uptime requirements. Moreover, traditional forensic tools for IT enterprises offer little or no visibility to systems and protocols in the OT network, which is usually a complex network of systems of systems. In addition, system abnormalities in OT-driven IA industries are very different from IT system abnormalities, and alternative OT network expertise is needed to respond to IA cyberattacks. Unlike in an IT system, where the adversary needs to exploit vulnerabilities in the software management systems to achieve its goal, an adversary might just need to exploit a single IT vulnerability and then abnormally operate OT systems to threaten human and environmental safety.
The OT-driven IA sector poses significant challenges in charting an incident response program (IRP). First, it is quite difficult to align operational and IT engineers on the same plane regarding agreeing on procedures and policies that need to be part of an IRP. However, as OT = IT + Physics, the IRP must have a good blend of IT and OT engineering system expertise. This is because a simple IT security breach on an Engineering Workstation System (EWS) can cause a set of cascading OT functionality abnormalities with potentially significant physical and environmental damage, and this damage space needs to be anticipated by OT system experts. Add to this the very high costs of dedicating an OT engineering team full-time within an enterprise to build a bridging capability between the IT and OT space for an IRP.
One might wonder (as many executives do) whether the IT incident response team could do the job of an OT incident response team, and the answer is a "no". IT incident response retainers are usually incapable of managing the cyber risk of physical consequences. What an IA enterprise needs (according to Dragos) is a retainer relationship with a firm specialised in OT-focused experts who:
(b) Small and medium businesses (SMBs) are buying cyber-insurance coverage for ransomware (to mitigate the adverse effects of business disruption), but at the same time, some enterprises in the SMB space query on the prospective value of cyber-insurance – resorting to self-insurance instead if the cost outweighs the value.
(c) Cyber-insurance can reduce the risk of ransomware via pre and post-breach consultancy regarding increasing cyber-resilience in a ransomware attack—but only as a means and not as an end.
(d) Increased cyber-insurance premiums/deductibles and a sparse cyber-insurance market are pushing some enterprises to good cyber-security practices, including zero-trust, multi-factor authentication, and backups.
(e) As cyber-insurers get more insight into organisational cyber-security practices and mandated security controls (without which these organisations may not be able to purchase cyber-insurance), certain organisations cannot purchase cyber-insurance. Subsequently, they cannot protect themselves against residual ransomware cyber risk.
(f) Cyber-insurers often do not find it rational to engage in cyber-loss prevention efforts that cyber-security experts and governments recommend for enterprises due to their attention to enterprise. In contrast, selectively engage in cyber-security efforts only.
(g) Cyber-insurers have not been able to adopt a traditional K&R insurer"s approach (due to privacy concerns) to negotiation for managing ransomware cyber-attacks.
(h) In certain situations when the impact due to a ransomware attack becomes un-insurable, cyber-insurers have been successful in pressuring governments to bear coverage responsibility in part and
(i) Cyber-insurance often does promote their clients to adhere to a critical NIST guideline that states that corrective actions post cyber-incident response should be shared in the private and the public to ensure that industrial automation organisations learn together, and improve together in preventing, protecting, handling, and recovering from cyber-attacks. This is because the breach attorneys hired by cyber-insurance agencies suggest enterprises against forensic and vulnerability information sharing to reduce litigation risk for the insured client. Also read: The cyber-insurance vision is failing for ransomware attacks in India
First Published: Jan 10, 2024, 16:02
Subscribe Now