Operational Technology Security

Reduce OT, IoT, IoMT, IIoT, and Robotics Cybersecurity Risk.

 

SRA’s Operational Technology (OT) security practice provides architecture, engineering, and operations support for your OT/IoT/IoMT/IIoT/Robotics security program. We bring an understanding of cross-vertical best practices and technical subject matter expertise. We can help develop policy and strategy, assess site security, help implement trusted technology solutions, and provide 24×7 MSSP monitoring and response.

Identify the capability and maturity of security controls at site and global levels.

 

Our assessment methodology focuses on the people, process, and technology with recommendations for immediate security risk reduction efforts as well as long-term financial and resource planning for controls maturity.

Key Focus Areas

Site and global capability maturity level characterization of critical Cyber Physical Systems security controls that can prioritize strategies to reduce production downtime risk from cyberattacks

Decompose Cyber Physical Systems to application and component levels to identify logical and physical threats and in-place controls

Classify asset and environmental risks to identify critical system impact on safety, operations, and intellectual property

Observations and remediation recommendations along with a prioritized roadmap

Test expected controls and identify ways to improve reliable OT security detection.

 

Our test plans map to MITRE ATT&CK for ICS and use VECTR™, our free industry-recognized tool for tracking and reporting Threat Resilience Metrics site-by-site and improvements over time.

Key Focus Areas

IT/OT convergence points​

OT, IoT and IT offensive and defensive security working together

Simulated cyber threats to discover attack paths and recommended security controls to identify, detect, and respond

Threat Index built on the top threat actors identified by industry leading organizations in your vertical

Assess your device and its ecosystem.

 

Modern cyber physical systems are often implemented as systems and even systems-of-systems, complete with integration interfaces and cloud-based infrastructure. Because of this, our hardware assessment methodology differs from more traditional hardware testing in that we consider not just the device itself, but the entire ecosystem including the product lifecycle starting from development.

Key Focus Areas

Review device hardware implementation including data storage elements, device boot process, and hardware security features such as Trusted Platform Modules/Hardware Security Modules and physical security

Identify third-party software components (e.g Software Bill of Materials) for potential vulnerabilities

Evaluate physical and logical communication interfaces for potentially

Examine system update process (software, firmware, and patching)

Assess operating system and user interface hardening

Review handing of sensitive data, such as device identity, Personally
Identifiable Information, and cryptographic keys

Test your response plan.

 

We facilitate OT and IoT security tabletop exercises (TTX) to reflect real-world attacks which
could disrupt critical processes that drive business objectives. We review your incident response plan (IRP) and procedures to identify potential gaps in roles, processes, decision trees and communications protocol and recommend enhancements​.

Key Focus Areas

Industry-specific scenarios constructed around your organizations critical assets, processes, and documentation

Cyber physical system security incident lifecycle review from alert to remediation

Cyber physical system security incident response observations, recommendations and enhancement opportunities

Security detection and response in OT and IoT environments.

 

SCALR™ XDR monitoring platform extends to security detection and response in OT and IoT environments. Our people-and-technology-driven XDR is a cost-efficient, turn-key security analytics ecosystem that can ingest Armis, Claroty, and other “OT/IoT Security Visibility” platform event data.

Key Focus Areas

Monitoring & Notification – We perform real-time monitoring of your OT and IoT environments.

Threat Hunts – Hunts are designed to identify anomalies and suspicious events which may have eluded detection rules.

Purple Teams – SRA will simulate adversaries with a set of benchmarked test cases.

Operated and Managed 24x7x365 – SRA solves your staffing problems with our talent process.

Why SRA?

 

  • We know that credibility with Sites is key to establishing relationships and progress, and have a proven record of gaining Site support of security programs.
  • We embed and operate as part of your team and within your environment so we can execute projects effectively.
  • Security Risk Advisors is a member of the ISA Global Cybersecurity Alliance.

OT Security Partnerships

Related Blogs