{"id":124998,"date":"2022-12-14T04:30:00","date_gmt":"2022-12-14T12:30:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=124998"},"modified":"2023-05-15T23:00:06","modified_gmt":"2023-05-16T06:00:06","slug":"cyber-signals-risks-to-critical-infrastructure-on-the-rise","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/12\/14\/cyber-signals-risks-to-critical-infrastructure-on-the-rise\/","title":{"rendered":"Cyber Signals: Risks to critical infrastructure on the rise"},"content":{"rendered":"\n
Today, the third edition of Cyber Signals<\/a> was released spotlighting security trends and insights gathered from Microsoft\u2019s 43 trillion daily security signals and 8,500 security experts. In this edition, we share new insights on wider risks that converging IT, Internet of Things (IoT), and operational technology (OT) systems pose to critical infrastructure. Cyber Signals presents new data on these risks with practical recommendations for enterprises.<\/p>\n\n\n\n OT is a combination of hardware and software across programmable systems or devices that interact with the physical environment (or manage devices that interact with the physical environment). Examples of OT can include building management systems, fire control systems, and physical access control mechanisms, like doors and elevators.<\/p>\n\n\n\n With increasing connectivity across converging IT, OT, and IoT increasing, organizations and individuals need to rethink cyber risk impact and consequences. Similar to how the loss of a laptop or modern vehicle containing a homeowner\u2019s cached Wi-Fi credentials could grant a property thief unauthorized network access, compromising a manufacturing facility\u2019s remotely connected equipment or a smart building\u2019s security cameras introduces new vectors for threats like malware or industrial espionage.<\/p>\n\n\n\n With more than 41 billion IoT devices across enterprise and consumer environments expected by 2025\u2014according to International Data Corporation (IDC) research1<\/sup>\u2014devices such as cameras, smart speakers, or locks and commercial appliances can become entry points for attackers. <\/p>\n\n\n\n As OT systems underpinning energy, transportation, and other infrastructures become increasingly connected to IT systems, the risk of disruption and damage grows as boundaries blur between these formerly separated worlds. Microsoft has identified unpatched, high-severity vulnerabilities in 75 percent of the most common industrial controllers in customer OT networks, illustrating how challenging it is for even well-resourced organizations to patch control systems in demanding environments sensitive to downtime.<\/p>\n\n\n\n For businesses and infrastructure operators across industries, the defensive imperatives are gaining total visibility over connected systems and weighing evolving risks and dependencies. Unlike the IT landscape of common operating systems, business applications, and platforms, OT and IoT landscapes are more fragmented, featuring proprietary protocols and devices that may not have cybersecurity standards. Other realities affecting things like patching and vulnerability management are also factors.<\/p>\n\n\n\n While connected OT and IoT-enabled devices offer significant value to organizations looking to modernize workspaces, become more data-driven, and ease demands on staff through shifts like remote management and automation in critical infrastructure networks, if not properly secured, they increase the risk of unauthorized access to operational assets and networks.<\/p>\n\n\n\n David Atch, Microsoft Threat Intelligence, Head IoT and OT Security Research, highlights in this edition\u2019s profile that to address IT and OT threats to critical infrastructure, organizations must have full visibility into the number of IT, OT, and IoT devices in their enterprise, where or how they converge, and the vital data, resources, and utilities accessible across these devices. Without this, organizations face both mass information disclosure (such as leaked production data of a factory) and the potential elevation of privilege for command and control of cyber-physical systems (such as stopping a factory production line). He shares additional insights in the Cyber Signals digital briefing<\/a> where we take a deeper dive into wider risks that converging IT, IoT, and OT systems pose.<\/p>\n\n\n\n Securing IoT solutions<\/a> with a Zero Trust<\/a> security model starts with non-IoT specific requirements\u2014specifically ensuring you have implemented the basics to securing identities and their devices and limiting their access. These requirements include explicitly verifying users, having visibility into the devices on the network, and real-time risk detections. <\/p>\n\n\n\n Read the third edition of Cyber Signals<\/a> today.<\/p>\n\n\n\n We hope these resources are helpful in understanding and managing this evolving risk. To learn more about IT, OT, and IoT threats and explore the latest cybersecurity insights and updates visit Security Insider<\/a>.<\/p>\n\n\n\n To learn more about Microsoft Security solutions, visit our website<\/a>. Bookmark the Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n\n\n\nLearn more<\/h2>\n\n\n\n