Industry Defence Insights

Infrastructure security: integrating IT and physical defenses

Jarek Sordyl Season 3 Episode 1

Today’s podcast delves deep into the urgent need for robust physical security within industrial control systems as IT and OT converge. Discussing critical concepts like the six-sided barrier, Physical Security Perimeter, and the intertwining of physical and digital security, we highlight vulnerabilities and considerations necessary for safeguarding essential infrastructures.

• Importance of integrating IT and OT security measures 
• Exploring the six-sided barrier concept for holistic security 
• Defining and securing Physical Security Perimeters (PSP) 
• Consequences of neglecting physical vulnerabilities 
• Integration of physical security with IT networks 
• Industry standards like IEC 62443 for comprehensive security 
• Continuous assessment required for addressing weaknesses 
• The interplay of environmental risks impacting sensitive equipment 
• Key takeaway: holistic approach is necessary for effective security

Support the show

Speaker 1:

In today's podcast we are going to talk about the vital intersection of information technology and operational technology within industrial control systems. All right, everyone welcome back. I bet you're all pretty used to us talking cybersecurity in the IT world, right? Firewalls, encryption, all that jazz.

Speaker 2:

All the good stuff.

Speaker 1:

Yeah, but today we're going deep on something a bit different.

Speaker 2:

A little bit more tangible.

Speaker 1:

Exactly we're diving into physical security.

Speaker 2:

Especially crucial for those of you out there in ITOT roles.

Speaker 1:

Think about it this way what if a hacker didn't even need to touch a keyboard?

Speaker 2:

Right no fancy code.

Speaker 1:

What if all they needed were some bolt cutters to wreak havoc?

Speaker 2:

Oh, that's, scary.

Speaker 1:

Right Suddenly, those industrial control systems that are so vital.

Speaker 2:

The ones we rely on every day.

Speaker 1:

They become a whole lot more vulnerable, don't they?

Speaker 2:

They do, and that's what makes this deep dive so important. For sure, and you know we're seeing more and more IT and OT converging these days.

Speaker 1:

Oh, absolutely, that risk just keeps growing. It's a huge trend.

Speaker 2:

We're talking about manufacturing plants, power grids, water treatment facilities all those essential systems that keep our world running. The backbone of modern society.

Speaker 1:

Absolutely, and you know we've got a great white paper we're looking at today.

Speaker 2:

Yeah, it lays out some interesting points.

Speaker 1:

It really highlights the benefits of this convergence right, automation, efficiency, all those data insights. But it also kind of begs the question how does this merging of these two worlds make physical security such a big deal? Why should we care?

Speaker 2:

Well, for starters, OT environments. They're a different beast.

Speaker 1:

In what way?

Speaker 2:

They've got their own quirks. Think about it Legacy systems that you can't just update every other week, equipment out in the field in harsh environments.

Speaker 1:

Oh yeah.

Speaker 2:

And a constant need for things to just work. Rock solid stability.

Speaker 1:

Oh, I can relate to that. My home PC struggles with updates sometimes.

Speaker 2:

Right, but in these settings even a tiny software glitch could be catastrophic. Oh, absolutely, you're not talking about your Netflix buffering anymore.

Speaker 1:

No, you're talking about a power plant shutting down or a whole production line grinding to a halt. Right. So I guess, if a hacker gains physical access, they could potentially bypass all those digital safeguards.

Speaker 2:

All the firewalls, all the encryption, all the fancy stuff gone. Exactly, it's like building this high-tech fortress, but you just leave the drawbridge wide open.

Speaker 1:

You're just asking for trouble.

Speaker 2:

You are, and that's why this idea of a six-sided barrier is so crucial.

Speaker 1:

Six-sided barrier? Now that sounds interesting.

Speaker 2:

It is, it is. It's a way of thinking about physical security holistically. You're not just focusing on the front door, you've got to consider all six sides right Walls, roof, floor.

Speaker 1:

Gotcha.

Speaker 2:

Think back to that power outage a few years back.

Speaker 1:

Yeah, I vaguely remember that.

Speaker 2:

Someone just cut the right cable. Simple as that and boom chaos.

Speaker 1:

Wow, that's a perfect example of why you need that all-around approach. And speaking of approaches, the white paper mentions this thing called a physical security perimeter PSP they call it. What exactly is that?

Speaker 2:

So PSP, it's basically defining and securing the boundaries around your critical infrastructure Think fences, gates but it's more than that. It's about controlling access points, making sure only authorized personnel can get in, using surveillance systems.

Speaker 1:

Cameras and such.

Speaker 2:

Yep, and here's the kicker you got to consider how your physical security integrates with your IT network.

Speaker 1:

Oh, that's interesting. So like something as simple as a security camera feed. Yeah, so like something as simple as a security camera feed. Yeah, being routed through the same network as, say, sensitive operational data, that could be a vulnerability.

Speaker 2:

Absolutely. A hacker gets into that camera feed. They could disable it, manipulate the footage, who knows?

Speaker 1:

Wow, that's a whole other level. It's making me think about how intertwined our physical and digital security systems really are. And there's another thing the white paper talks about equipment protection. It's got to be more than just locking up the server room.

Speaker 2:

No, yeah, much more. Think about all those sensors out there collecting data. If someone tampers with a sensor that's feeding info to a critical system, it could lead to bad decisions, maybe even catastrophic outcomes.

Speaker 1:

You're painting quite a picture here.

Speaker 2:

And physical security also means thinking about the environment flooding, extreme temperatures, things that can damage sensitive equipment.

Speaker 1:

So we basically need to start thinking about our physical infrastructure with the same level of scrutiny that we apply to our digital systems 100%, and that's where industry standards come in, things like IAIEC 6244321. Now, that sounds familiar.

Speaker 2:

Right. It's a framework, a roadmap for implementing a comprehensive security program, one that addresses both cybersecurity and physical security.

Speaker 1:

Okay, so we've covered a lot of ground here. We talked about why physical security is so important, especially in a converged ITOT world. We touched on some practical steps the six-sided barrier, setting up a PSP but as we wrap up, what's the one key takeaway you want our listeners to really remember?

Speaker 2:

That's security. It's a holistic endeavor. You can have the best cybersecurity in the world, but someone can just walk in and cut a cable. It all goes out the window.

Speaker 1:

So true.

Speaker 2:

Think about your own facility. What are the weak points? What are the potential vulnerabilities?

Speaker 1:

Those physical vulnerabilities.

Speaker 2:

Exactly and how can you address them? That's the key question.

Speaker 1:

Great advice, yeah, Great advice. And you know, for our listeners out there, there are resources to help guide you. Those ISA standards we mentioned great place to start. Don't let physical security be the weak link in your chain.

Speaker 2:

Word.

Speaker 1:

Thanks for joining us on this Deep Drive. We'll catch you next time.

Speaker 2:

See ya Bye. This podcast is supported by OTSET EU Cohort.