{"id":92903,"date":"2021-02-22T11:00:58","date_gmt":"2021-02-22T19:00:58","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=92903"},"modified":"2023-09-11T16:00:22","modified_gmt":"2023-09-11T23:00:22","slug":"securing-azure-datacenters-with-continuous-iot-ot-monitoring","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/02\/22\/securing-azure-datacenters-with-continuous-iot-ot-monitoring\/","title":{"rendered":"Securing Azure datacenters with continuous IoT\/OT monitoring"},"content":{"rendered":"

\"Real<\/p>\n

Figure 1: Industrial cooling system for datacenters.<\/em><\/p>\n

As more intelligent devices and machinery become connected to the internet, Operational Technology (OT) and the Internet of Things (IoT) have become part of your enterprise network infrastructure\u2014and a growing security risk. With every new factory sensor, wind turbine monitoring device, or smart building, the attack surface grows. Analysts estimate that there will be 37 billion industrial IoT (IIoT) devices by 2025<\/a>. Even more alarming for business leaders, Gartner predicts that 75 percent of CEOs will be personally liable for cyber-physical incidents by 2024<\/a>.<\/p>\n

We’ve spent 15 to 20 years adding layers of telemetry and monitoring for IT security. However, most chief information security officers (CISOs) and security operations center (SOC) teams have little or no visibility into their OT risk. It’s clear that a new approach is needed, one that includes IoT and OT-specific incident response and best practices for bringing the two teams together to defend against increasingly sophisticated cyber threats.<\/p>\n

A changing threat landscape<\/h2>\n

In every area of our lives, cyber-physical systems (CPS) go mostly unseen as they quietly monitor building automation, industrial robots, gas pipelines, HVAC systems, turbines, automated warehousing and logistics systems, and other industrial systems. In the past, OT risk was minimized because of “air-gapping” meaning, a physical divide was maintained between OT and IT networks. But digital transformation has disrupted all that. Now devices in the warehouse, refinery, and factory floor are connected directly to corporate IT networks and often to the internet.<\/p>\n

Microsoft offers end-to-end IoT security solutions<\/a> for new, or “greenfield,” IoT deployments, but most of today’s IoT and OT devices are still considered “unmanaged” because they’re not provisioned, tracked in a configuration management database (CMDB), or consistently monitored. These devices typically don’t support agents and lack built-in security such as strong credentials and automated patching\u2014making them soft targets for adversaries looking to pivot deeper into corporate networks.<\/p>\n

For OT security, the key priorities are safety and availability. Production facilities need to be up and running to keep generating revenue. However, beyond revenue losses, there’s a risk for catastrophic damage and possible loss of life when OT systems are breached. And like IT attacks, an OT breach also poses a risk for theft of intellectual property (IP). According to the Verizon Data Breach Investigations Report (DBIR), manufacturers are eight times more likely to be breached for theft of IP<\/a>. OT security translates directly into three main types of business risks:<\/p>\n