The Industrial Internet of Things (IIoT) landscape has increased the connectivity of ICS and OT networks to various enterprise systems and cloud services, making them more vulnerable to supply chain attacks. The 2020 SolarWinds Orion breach is an example of this, while other attacks, such as Havex and NotPetya, have had direct impacts on OT. Traditional security methods are proving inadequate, and a multifaceted strategy is required, including Content Disarm and Reconstruction (CDR) technology. CDR operates on the Zero Trust principle, adapting and responding to various threat scenarios, and can be integrated into existing network security modules. The NIST SP 800-82 Revision 3 document outlines the importance of CDR in protecting ICS/OT systems.
Bulletpoints:
• IIoT has increased the connectivity of ICS and OT networks, making them more vulnerable to supply chain attacks
• The SolarWinds Orion breach and other attacks have had direct impacts on OT
• A multifaceted strategy is required, including Content Disarm and Reconstruction (CDR) technology
• CDR operates on the Zero Trust principle, adapting and responding to various threat scenarios, and can be integrated into existing network security modules