ARC View- Enabling Continuous Vulnerability Management for Industrial Control Systems

Issue link:

Contents of this Issue


Page 2 of 5

ARC View, Page 3 ©2018 ARC • 3 Allied Drive • Dedham, MA 02026 USA • 781-471-1000 • Vulnerability Management Is the Foundation of Good Security Ensuring that devices are free of known vulnerabilities, a focus of the first step in ARC's model, is at the very heart of effective cybersecurity. Most malware attacks exploit known vulnerabilities - eliminating them is the on- ly real defense. Companies can't rely solely upon firewalls and anti- malware software to block cyber-attacks. Hackers, who are becoming in- creasingly more sophisticated, can use "morphing" and "cloaking" techniques to overcome perimeter defenses to penetrate the ICS. Vulnerability management includes a thorough inventory of all cyber as- sets, a comparison of findings with known weaknesses, and a complete system hardening/patching effort. Establishing a reliable, automated pro- cess for ongoing vulnerability management is also essential. New vulnerabilities appear daily and plant managers need to be sure that the associated risks are being continuously evaluated and addressed. Systems in industrial facilities need a more extensive continuous vulnera- bility management program than conventional IT systems. Industrial programs need to deal with software, firmware, and hardware vulnerabili- ties across a broad range of ICS cyber assets. This includes conventional servers and PCs, networking equipment, level 1 controllers (PLCs, DCS, etc.), I/O systems, etc. Industrial programs also need to support mixed- vendor, mixed vintage ICS environments, and provide visibility across multiple systems and facilities. Continuous Vulnerability Management Requires an Automated Cybersecurity Management Solution Even with a good vulnerability management process, most companies struggle to keep up with the myriad ICS alerts and advisories issued each month. Evaluating the relevance of each alert and deciding which and how to mitigate is incredibly time consuming. Tracking the many steps in- volved in procuring patches or upgrades from suppliers, testing them, and scheduling implementations within scheduled shutdowns or turnarounds adds to the burden. Without effective tools to manage these activities au- tomatically, companies can quickly lose control of their security, leaving managers with a false sense of security regarding their organization's real cyber risks. Most companies are already constrained when it comes to investments in cybersecurity technology and available resources. Limited staffs are often

Articles in this issue

Links on this page

view archives of Brochures - ARC View- Enabling Continuous Vulnerability Management for Industrial Control Systems