Skip to content

Missing Hardening

Hardening is usually done to make a system more secure, typically by reducing or restricting features which inherently reduces a system's attack surface. Another form of hardening is enabling additional layers of security so that an attacker has to overcome multiple hurdles to gain access to a system.

Description

Hardening is the process of securing a system by reducing its surface of vulnerability. This can be achieved by removing unnecessary services, closing unused ports, and applying security patches. Hardening is an essential step in securing any system, as it reduces the number of potential entry points for attackers.

Another way of hardening is to apply additional layers of security, such as firewalls, intrusion detection systems, and encryption. These additional layers can help protect against attacks even if the underlying system is compromised. In the context of OT, hardening is particularly important due to the unique challenges and requirements of these systems. OT systems are often designed to operate continuously and cannot be easily patched or updated without causing downtime.

Apply established hardening guidelines

Disable default accounts and passwords

Rationale

Inclusion of hardening in the OWASP OT Top 10 was a point of serious discussion.

Hardening itself does not reduce a concrete vulnerability but makes meaningful exploitation of vulnerabilities harder for attackers.

Empirical data, gathered during the development of the OWASP OT Top 10, showed that missing hardening was a common part of successful exploits and comprehensive hardening would have prevented successful exploitation.

Given the requirement of non-stop operation of many OT systems, hardening is crucial as it allows for controlled updates after a security issue has been identified (as the additional security layers uphold the security of the overall system).

Known Attacks/Examples

  • Stuxnet: Disabling USB ports could have avoided initial compromise.
  • NotPetya: Proper network segmentation and hardening could have limited the spread of the malware.

Mitigation/Countermeasures

Developers/Component Suppliers/Integrators: Design and Implementation

  • Disable unnecessary services and interfaces (e.g. USB ports, insecure protocols like Telnet, web server, JTAG/SWD interfaces)
  • Start with established hardening benchmarks and gradually relax controls only as necessary to ensure your component or system functions properly
  • Include Application allow-listing if possible
  • Provide your component or system with a secure default configuration
  • Provide a hardening guideline for your component or system to customers

Operators: Operational

  • Make sure hardening is reapplied after maintenance
  • Request documentation of hardening measures
  • Include hardening requirements in the tender, ideally with the integrator providing their own hardening concept
  • Make sure hardening is actually implemented with a Pentest or some kind of Cybersecurity Acceptance Test (during SAT/FAT)

Next Actionable Steps

  • identify applicable hardening guidelines for your environment
  • implement hardening guidelines
  • disable default accounts and passwords

References

Standards

  • IEC 62443-4-1:2018 - 12.4 SG-3 - Security hardening guidelines
  • IEC 62443-2-1:2024 - COMP 1.1 - Component hardening
  • IEC 62443-2-4:2024 - SP.02.03 - Hardening guidelines

OT-specific hardening guides are often provided by the system integrator or product supplier, for example:

  • "System Hardening for Substation Automation and Protection" for SICAM/SIPROTEC, which includes hardening measures at the solution level as well as for individual components.

Several organizations provide configuration baselines and benchmarks for common systems:

  • The Center for Internet Security (CIS) offers Benchmarks for various systems, including operating systems, network devices, and commonly used applications. In OT environments, relevant benchmarks cover operating systems, network infrastructure, and supporting applications.
  • The Defense Information Systems Agency (DISA) publishes Security Technical Implementation Guides (STIGs), which define configuration standards for securing Department of Defense (DoD) IT systems and are also widely adopted in other sectors.
  • Microsoft Security Baselines recommend security settings for Windows operating systems and Microsoft applications.

Background information

Tooling

  • Tenable Nessus, with compliance Scanning
  • CIS-CAT Lite/Pro
  • Microsoft Security Compliance Toolkit