2024³â 11¿ù 15ÀÏ ±Ý¿äÀÏ
 
 
  ÇöÀçÀ§Ä¡ > ´º½ºÁö´åÄÄ > Business

·£¼¶¿þ¾îºÎÅÍ µÅÁöµµ»ì±îÁö... ³ë·ÃÇØÁø »ç±âÇà°¢

 

Á¤Ä¡

 

°æÁ¦

 

»çȸ

 

»ýÈ°

 

¹®È­

 

±¹Á¦

 

°úÇбâ¼ú

 

¿¬¿¹

 

½ºÆ÷Ã÷

 

ÀÚµ¿Â÷

 

ºÎµ¿»ê

 

°æ¿µ

 

¿µ¾÷

 

¹Ìµð¾î

 

½Å»óÇ°

 

±³À°

 

ÇÐȸ

 

½Å°£

 

°øÁö»çÇ×

 

Ä®·³

 

Ä·ÆäÀÎ
Çѻ츲 ¡®¿ì¸®´Â ÇѽҸ²¡¯ ½Ò ¼Òºñ Ä·ÆäÀÎ ½Ã...
1000¸¸¿øÂ¥¸® Àΰø¿Í¿ì, °Ç°­º¸Çè Áö¿ø ¡®Æò...
- - - - - - -
 

Armis Identifies Riskiest OT and ICS Devices Across Critical Infrastructure Industries

Heightened Risks for Manufacturing, Utilities and Transportation
´º½ºÀÏÀÚ: 2023-06-13

SAN FRANCISCO-- June 13, 2023 -- Armis, the leading asset visibility and security company, today released new research identifying the riskiest devices that pose threats to critical infrastructure industries: manufacturing, utilities and transportation. Data analyzed from the Armis Asset Intelligence and Security Platform, which tracks over three billion assets, found that the operational technology (OT) and industrial control systems (ICS) devices that present the highest risk to these industries are engineering workstations, SCADA servers, automation servers, historians and programmable logic controllers (PLCs).

Prioritization and vulnerability management remains an issue

Armis research found that engineering workstations are the OT device that received the most attempts of attack in the industry in the past two months, followed by SCADA servers. Fifty-six percent of engineering workstations have at least one unpatched critical severity Common Vulnerabilities and Exposures (CVEs) and 16% are susceptible to at least one weaponized CVE, published more than 18 months ago.

Uninterruptible Power Supplies (UPS) are the third device type that suffered the most attack attempts in the past two months. Although critical for continuity in an event of power outage, data showed that 60% of UPS devices have at least one unpatched critical severity CVE, which, as we saw with TLStorm, could potentially lead criminals to cause physical damage to the device itself or other assets connected to it.

Programmable Logic Controllers (PLCs) are another example, with 41% having at least one unpatched critical severity CVE. These legacy devices are of high importance as, if attacked, could lead to the disruption of central operations, but the research highlighted they can be susceptible to high risk factors such as end of support hardware and end of support firmware.

A set of additional devices represent risk to manufacturing, transportation and utilities environments as they have at least one weaponized CVE published before January 2022: 85% of barcode readers, 32% of industrial managed switches, 28% of IP cameras and 10% of printers.

OT industries are characterized by having multiple locations, multiple lines of production and complex distribution lines with a vast amount of both managed and unmanaged devices on their networks. In that context, understanding where risk comes from and remediation is needed presents a significant challenge and can be an obstacle to vulnerability management, posing an entry point for malicious actors.

“In an ICS environment it's pretty common to have vulnerable devices, so professionals need to see what assets are on their network and additional intelligence on what those devices are actually doing,” said Nadir Izrael CTO and Co-founder of Armis. “Contextual data will enable teams to define what risk each device poses to the OT environment so that they can prioritize remediation of critical and/or weaponized vulnerabilities to quickly reduce the attack surface.”

There is a need for collaboration between OT and IT teams

OT industries have significantly changed in the past years due to the convergence of OT and Information Technology (IT). This alignment is driving a new phase for the Industrial Era and will enable cross-domain collaboration but, in practice, unified management of both environments has yet to take place. With OT teams focused on maintaining industrial control systems, mitigating risks to OT and ensuring overall integrity within operational environments, more IT focused duties have been left aside.

Four out of the five riskiest devices notably run Windows operating systems, showcasing how a basic understanding of asset risk and securing vulnerable assets is still a challenge for IT and OT teams.

Armis looked at device types and found that many are more exposed to malicious activity because they are using the SMBv.1 protocol, end of support operating systems and many open ports. SMBv.1 is a legacy, unencrypted and complicated protocol with vulnerabilities that have been targeted in the infamous Wannacry and NotPetya attacks. Security experts previously advised organizations to stop using it completely, but the data shows it is still preeminent in the field.

“From an organizational perspective, having a risk-based approach to vulnerability management must go hand in hand with OT and IT departments working together to help coordinate mitigation efforts,” continued Izrael. “Cross-departmental projects will help streamline process and resource management and achieve greater compliance and data security. Overall, to navigate the challenges of the new industrial era, security professionals need an IT/OT convergence security solution that shields all assets connected to the network.”

The Armis Unified Asset Intelligence Platform discovers all connected assets, maps out the communications and relationships between them, and adds contextual intelligence to help understand their context and the risk they may introduce to the business. It is purpose-built to protect both OT and IT environments and can ingest meaningful signals from hundreds of IT and OT platforms. Armis’ cloud-based threat detection engine uses machine learning and artificial intelligence to detect when a device is operating outside of its normal “known good” baseline and triggers an automated response for an easier management of the overall attack surface.

Armis was recognized by ISG as an OT Security Leader for the 3rd consecutive year in the 2022 report “ISG Provider Manufacturing Security Services: OT Security Solutions”. And was named a Representative Vendor for the 3rd consecutive year in the Gartner “Market Guide for Operational Technology Security.”



 Àüü´º½º¸ñ·ÏÀ¸·Î

New Data and Recent Approval in China Cements Galderma¡¯s Leadership in Regenerative Biostimulation
Kyowa Kirin Announces Changes in Top Leadership Positions to Strengthen Operations as a Global Specialty Pharmaceutical Company
Güntner Appoints Michael Bauer as Global Vice President for Growth and Success
The Estée Lauder Companies¡¯ New Incubation Ventures and NYKAA Announce the BEAUTY&YOU India 2024 Winners
Technology Holdings Has Expanded Operations into Brazil, Driving Growth in Latin America
Burjeel Holdings and Response Plus Medical launch $1mn Human Energy Health and Wellbeing Award
AngloGold Ashanti Q3 2024 Earnings Release for the Three Months and Nine Months Ended 30 September 2024

 

Takeda Announces Strong First Half FY2024 Results and Raises Full Year...
NielsenIQ (NIQ) appoints Steen Lomholt-Thomsen as Chief Commercial Off...
ELIQUENT Life Sciences Announces: Rob Wojciechowski Joins Firm
Geopolitical Tensions Reshape Global Competitiveness: Insights from th...
Kinaxis Appoints President of Global Commercial Operations
ExxonMobil Announces Licensing Agreement to Expand Proprietary Rebar P...
Cascale Introduces New Membership Engagement Model, Elevates Supplier ...

 


°øÁö»çÇ×
´º½ºÁö ÇÑÀÚÇ¥±â 'ãæÚ¤ó¢'
´º½º±×·ì Á¤º¸ ¹Ìµð¾î ºÎ¹® »óÇ¥µî·Ï
¾ËÇÁ·Ò °è¿­ »óÇ¥, »óÇ¥µî·Ï ¿Ï·á
¾Ë¶ã°Ç¼³, »óÇ¥µî·Ï ¿Ï·á
Á¸Â÷´åÄÄ, ±Û²Ã º¯°æ »óÇ¥µî·Ï ¿Ï·á

 

ȸ»ç¼Ò°³ | ÀÎÀçä¿ë | ÀÌ¿ë¾à°ü | °³ÀÎÁ¤º¸Ãë±Þ¹æħ | û¼Ò³âº¸È£Á¤Ã¥ | Ã¥ÀÓÇÑ°è¿Í ¹ýÀû°íÁö | À̸ÞÀÏÁÖ¼Ò¹«´Ü¼öÁý°ÅºÎ | °í°´¼¾ÅÍ

±â»çÁ¦º¸ À̸ÞÀÏ news@newsji.com, ÀüÈ­ 050 2222 0002, Æѽº 050 2222 0111, ÁÖ¼Ò : ¼­¿ï ±¸·Î±¸ °¡¸¶»ê·Î 27±æ 60 1-37È£

ÀÎÅͳݴº½º¼­ºñ½º»ç¾÷µî·Ï : ¼­¿ï ÀÚ00447, µî·ÏÀÏÀÚ : 2013.12.23., ´º½º¹è¿­ ¹× û¼Ò³âº¸È£ÀÇ Ã¥ÀÓ : ´ëÇ¥ CEO

Copyright ¨Ï All rights reserved..