Zero Belief Community Entry (ZTNA) is a safe distant entry service. It verifies distant customers and grants them entry to the precise assets on the proper occasions primarily based on id and context insurance policies. That is half 3 in our weblog collection about ZTNA for operational know-how (OT). Take a look at Half 1 for why ZTNA beats out always-on VPNs for OT distant entry and Half 2 for a way ZTNA reduces the assault floor by limiting entry strategies and verifying distant customers’ safety posture.
Video cameras are all over the place, together with in services with the strictest bodily entry controls. Even should you belief a person to enter a delicate space, you continue to want to watch their actions as soon as they’re within the door. Seeing a suspicious exercise, you may step in to cease it. And if issues crop up after the go to, reviewing a recording may help pinpoint what went mistaken.
Monitoring and recording actions are equally vital in the case of distant customers accessing your OT networks. It’s not sufficient to confirm the id of distant staff, distributors, and contractors. Neither is it sufficient to know who’s linked to what OT/ICS property. You additionally must know what customers are doing throughout distant entry periods. Most organizations lack that visibility in the present day, a shortcoming for cybersecurity compliance, governance, the power to cease and recuperate from breaches, and incident investigation.
Conveniently, Cisco Safe Tools Entry (SEA) offers you an all-in-one answer to grant distant entry, implement entry controls, and monitor and report distant session exercise. Listed here are 3 ways you may benefit from Cisco SEA to actively management OT distant entry.
1 – Monitor, be part of, and terminate energetic periods
See a listing of all energetic periods on the Cisco SEA console. By clicking on the session between ‘Person A’ and ‘Asset B’ you may watch session actions as they occur, together with instructions despatched to the asset. Watching a vendor configure an OT/ICS asset might be useful for coaching, for instance. And should you see one thing suspicious, like an try to vary the code or a variable in a programmable logic controller (PLC), you may terminate the session with a click on and disconnect the distant consumer. Distant session termination is required by ISA/IEC62443-3-3 FR2.
2 – Preserve a whole log of previous periods
Cybersecurity finest practices require sustaining an in depth historical past of all previous periods, helpful for safety audits, forensic investigations, and regulatory compliance. The EU’s NIS2 Directive, for instance, requires a full audit path for each occasion that impacts vital infrastructure and OT safety requirements similar to ISA/IEC62443-3-3 require data of all login makes an attempt. Cisco SEA logs each system-generated and user-generated occasions. For instance, assessment how distant customers authenticate, together with usernames, time, gadget posture, and session actions. Or see who added new customers or new property to the system.
3 – Document periods to see what occurred
Optionally report periods for chosen property, just by choosing the asset on the console and checking a field. Recordings enrich your audit path and might be notably useful for troubleshooting. If an asset like a robotic arm, wind turbine, or freeway signal stops working, for instance, you may uncover {that a} vendor not too long ago upgraded the software program or made a typo in a brand new configuration. Sooner troubleshooting helps you place the asset again into manufacturing sooner.
Hold it easy, with an all-in-one answer for safe tools entry
Summing up, Cisco SEA offers you a single interface to guard your ICS and OT property with ZTNA. Require all distant customers to authenticate by way of a single level. Management which property they will entry and at what occasions. And do what a video digicam does by monitoring all distant session actions and recording information for safety audits.
Study extra about Cisco Safe Tools Entry right here.
Share: