- By Gabe Authier
- May 14, 2020
- Opinion
Summary
-
By Gabe Authier
While ICS downtime at the hands of a security solution was once a much more realistic concern, cybersecurity tools are now changing the face of ICS cybersecurity by helping operators remediate issues that could threaten system uptime.

Even If It Ain’t Broke, It Still Needs to Change with the Times
Historically, traditional IT tools didn’t know how to play nice with industrial equipment, which risked operational downtime if machines were disrupted during security scans intended for IT environments. Luckily, cybersecurity solutions providers are now customizing their IT tools to speak ICS’ language—the language of industrial protocols like Modbus TCP and Ethernet/IP CIP, HTTP/HTTPS and SNMP, to name but a few. This opens up a whole new world of possibilities for monitoring OT environments to ensure the safety, quality and uptime of your operations.Industrial CISOs are now in an advantageous position: they can give their floor operators the same cybersecurity visibility their IT operators have had for years. With a single change management solution, the IT and OT sides of your organization can finally be in alignment under one cybersecurity tool monitoring for suspicious and unauthorized changes.
With a single interface management system, Tripwire Enterprise offers OT an agentless security solution which can be accessed from virtually anywhere and which provides a comprehensive picture of security issues and actions. With automated continuous monitoring across different types of operating systems, industrial devices and applications, industrial organizations now have a simplified and cost-effective solution for maintaining system hardening and continual proof of compliance for standards like IEC 62443, NERC CIP, NIST and CIS ISC CSC.
4 Questions You Need to Ask When Evaluating a Cybersecurity Tool
1. Why Is It Crucial to Know What’s on Your ICS Network?
Network monitoring systems provide the first line of defense when applications go down or when performance begins to deteriorate. With Tripwire Enterprise Asset View, you can classify assets across your OT and It networks. Users benefit from unparalleled deep visibility and cyber-resilience while reducing operational burdens and improving responsiveness.Sixty-four percent of security leaders (directors or higher) feel that they lack the tools and resources they need to monitor, 62 percent lack the tools and resources they need to analyze and understand and 68 percent lack the tools and resources they need to mitigate external threats. It is not always easy to figure out what is running, much less whether or not it is configured properly. But once you understand your current security posture, you can develop a strategy to assemble the assets and implement protocols to accomplish your security goals.
2. Does It Test for Regulatory Compliance?
In addition to detecting an unauthorized change on your industrial devices, Tripwire Enterprise aids in achieving and maintaining regulatory compliance with frameworks like IEC 62443, NERC CIP, NIST and the Center for Internet Security’s CIS ISC CSC. You can analyze for secure configurations and run policy tests against standards and best practices on your industrial devices.3. How Does It Handle Configuration Security?
In a recent Ponemon study, only 15 percent of businesses surveyed believed they were effective in implementing security initiatives that provided actionable intelligence in attacks on their IT systems/networks and ICS/SCADA systems. Another global study by ServiceNow indicated that 78% of CISOs are worried about their ability to detect breaches in the first place.4. Will Remediating Suspicious Changes Cause System Downtime?
One of the biggest concerns of ICS operators is that remediating suspicious changes will lead to an interruption in operations. Tripwire Enterprise provides centralized control of configurations across the entire physical and virtual IT & OT infrastructures, including multiple devices, platforms and operating systems, without interrupting operations.While ICS downtime at the hands of a security solution was once a much more realistic concern, cybersecurity tools are now changing the face of ICS cybersecurity by helping operators remediate issues that could threaten system uptime.
About The Author
This article was written by Gabe Authier of Tripwire
Did you enjoy this great article?
Check out our free e-newsletters to read more great articles..
Subscribe