Fortinet News Official 2024年08月14日
Fortinet Report: Threat Actors Are Increasingly Targeting OT Organizations
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Fortinet报告指出OT系统受攻击增多,组织安全仍有改进空间,并提供了增强安全态势的最佳实践。

🌐OT系统面临的网络攻击呈上升趋势,2023年49%的受访者经历过相关入侵,今年近四分之三的组织受到影响,且仅影响OT系统的入侵比例也有所增加。同时,近三分之一的受访者表示过去12个月经历了多次入侵,除恶意软件外的各类入侵类型均有所增加。

🔍检测方法未能跟上当前威胁的发展,多数组织在环境中仍存在盲点。虽然对OT系统具有75%可见性的组织有所增加,但仍有超过半数的受访者经历过勒索软件或擦除器入侵,表明网络可见性和检测能力有待提高。

💪OT网络安全责任在一些组织的高管层中得到提升,与CISO对齐的组织比例增加,同时OT责任也向其他C-suite角色转移,这显示出对OT安全的关注。

🛡️部署分段可减少入侵,需创建网络区域或分段,并考虑集成或基于平台的方法。建立OT资产的可见性和补偿控制,利用相关能力检测和防止脆弱资产受损。将OT纳入安全操作和事件响应规划,创建包含OT环境的操作手册。采用OT特定的威胁情报和安全服务,确保信息源包含相关内容。考虑采用平台方法构建整体安全架构,以简化复杂性并提高效率。

News SummaryFortinet® (NASDAQ: FTNT), the global cybersecurity leader driving the convergence of networking and security, today announced the findings from its global 2024 State of Operational Technology and Cybersecurity Report. The results represent the current state of operational technology (OT) security and highlight opportunities for continued improvement for organizations to secure an ever-expanding IT/OT threat landscape. In addition to trends and insights impacting OT organizations, the report offers best practices to help IT and OT security teams better secure their environments. While this year’s report indicates that organizations have made progress in the past 12 months related to advancing their OT security posture, there are still critical areas for improvement as IT and OT network environments continue to converge.Key findings from the global survey include:Cyberattacks that compromise OT systems are on the rise. In 2023, 49% of respondents experienced an intrusion that impacted either OT systems only or both IT and OT systems. But this year, nearly three-fourths (73%) of organizations are being impacted. The survey data also shows a year-over-year increase in intrusions that only impacted OT systems (from 17% to 24%). Given the rise in attacks, nearly half (46%) of respondents indicate that they measure success based on the recovery time needed to resume normal operations.Organizations experienced a high number of intrusions in the past 12 months. Nearly one-third (31%) of respondents reported more than six intrusions, compared to only 11% last year. All intrusion types increased compared to the previous year, except for a decline in malware. Phishing and compromised business email intrusions were the most common, while the most common techniques used were mobile security breaches and web compromise.Detection methods aren’t keeping pace with today’s threats. As threats grow more sophisticated, the report suggests that most organizations still have blind spots in their environment. Respondents claiming that their organization has complete visibility of OT systems within their central security operations decreased since last year, dropping from 10% to 5%. However, those reporting 75% visibility increased, which suggests that organizations are gaining a more realistic understanding of their security posture. Yet more than half (56%) of respondents experienced ransomware or wiper intrusions—an increase from only 32% in 2023—indicating that there is still room for improvement regarding network visibility and detection capabilities.Responsibility for OT cybersecurity is elevating within executive leadership ranks at some organizations. The percentage of organizations that are aligning OT security with the CISO continues to grow, increasing from 17% in 2023 to 27% this year. At the same time, there was an increase to move OT responsibility to other C-suite roles, including the CIO, CTO and COO, to upwards of 60% in the next 12 months, clearly showing concern for OT security and risk in 2024 and beyond. Findings also indicate that some organizations, where the CIO is not outright responsible, there is an upward shift of these responsibilities from the Director of Network Engineering to the Vice President of Operations role, which illustrates another escalation of responsibility. This elevation into the executive ranks and below, regardless of the title of the individual overseeing OT security, may suggest that OT security is becoming a higher-profile topic at the board level.   Best PracticesFortinet’s global 2024 State of Operational Technology and Cybersecurity Report offers organizations actionable steps for enhancing their security posture. Organizations can address OT security challenges by adopting the following best practices:Deploy segmentation. Reducing intrusions requires a hardened OT environment with strong network policy controls at all points of access. This kind of defensible OT architecture starts with creating network zones or segments. Teams should also evaluate the overall complexity of managing a solution and consider the benefits of an integrated or platform-based approach with centralized management capabilities.Establish visibility and compensating controls for OT assets. Organizations must be able to see and understand everything that’s on the OT network. Once visibility is established, organizations must protect any devices that appear to be vulnerable, which requires protective compensating controls that are purpose-built for sensitive OT devices. Capabilities such as protocol-aware network policies, system-to-system interaction analysis, and endpoint monitoring can detect and prevent the compromise of vulnerable assets.Integrate OT into security operations and incident response planning. Organizations should be maturing towards IT-OT SecOps. To achieve this, teams must specifically consider OT with regard to SecOps and incident response plans. One step teams can take to move in this direction is to create playbooks that incorporate the organization’s OT environment.Embrace OT-specific threat intelligence and security services. OT security depends on timely awareness and precise analytical insights about imminent risks. Organizations should make sure their threat intelligence and content sources include robust, OT-specific information in their feeds and services.Consider a platform approach to your overall security architecture. To address rapidly evolving OT threats and an expanding attack surface, many organizations use a broad array of security solutions from different vendors, resulting in an overly complex security architecture. A platform-based approach to security can help organizations consolidate vendors and simplify their architecture. A robust security platform that is purpose-built to protect both IT networks and OT environments can provide solution integration for improved security efficacy while enabling centralized management to enhance efficiency. 

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

OT 网络安全 安全最佳实践 网络攻击 安全责任 安全架构
相关文章