Selection of components/protocols with insufficient security capabilities
Given the long, potentially multi-decades, lifetimes of OT system, it becomes understandable why OT components become legacy systems over time. Many of the mentioned countermeasures try to deal with the existence of legacy systems.
When designing new systems, however, the best way to deal with legacy systems is to not use them in the first place. If we design new systems there should be slack for future security features.
This Top 10 items is related to missing awareness. While missing awareness is about the lack of knowledge about security features, this item is about the lack of security features in the first place.
Description
We define legacy systems as systems with security and cryptography capabilities that do not conform to current best practices. This includes systems that are not able to be updated or patched, as well as systems that are not able to be replaced.
Don't use Legacy Systems for new Deployments
Obviously, if you are designing a new system, you should not use legacy systems. This is especially true for systems that are not able to be updated or patched. If you are designing a new system, you should use systems that are able to be updated or patched.
Deployments are seldom new green-field installations. Most of the time, new systems are deployed in existing environments (think about the long lifetimes of OT systems). If new components are added to an existing environment, they often have to conform and interact with the existing environment, often mandating usage of legacy protocols. If this is the case, it would be preferable to use components that (while they provide the legacy feature set) also incorporate capabilities for state-of-the-art security features so that the installation can be updated in the future.
Don't use Legacy Protocols if possible
Components commonly use standardized protocols to communicate with each other or with other systems. When designing a new system, chosen protocols should heed best security practices and legacy protocols should be avoided if feasible.
Legacy protocols often have security issues:
- They often lack integrity protection and thus can lead to availability problems.
- They do not offer thorough or sufficient authentication mechanisms and thus can lead to unauthorized access to systems and data.
- They have weak built-in security features like basic Bluetooth.
Rationale
- given the long lifetimes of OT systems, parts of them becoming legacy systems will happen
- there is economic pressure to use existing legacy systems for new deployments:w
- there is a lack of awareness about the security implications of using legacy systems
Known Attacks/Examples
Mitigation/Countermeasures
Design and Implementation
- mitigations for developers/builders
Operational
- mitigations for integrators/builders
Next Actionable Steps
- maybe add this to a separate section?
References
Standards
- IEC 62443-2-4:2024 SP.03.03
- IEC 62443-3-2:2020 ZCR 5.X
- IEC 62443-4-2:2020 CCSC 2
- NIST CSF 2.0 PR.AA-02
- EU NIS2 Directive Commission implementing Regulation C(2024) 7151 - ANNEX 6.3
- EU NIS2 Directive Commission implementing Regulation C(2024) 7151 - ANNEX 6.5
- EU NIS2 Directive Commission implementing Regulation C(2024) 7151 - ANNEX 6.10
- EU NIS2 Directive Commission implementing Regulation C(2024) 7151 - ANNEX 12.2
Background information
- links to blogs, etc.
Tooling
- for testing, etc.