In today’s increasingly digital world, the concept of “integrated systems” has become paramount, writes John Gallagher, Vice President at Viakoo.
Article Chapters
ToggleIntegrated systems, which range from building automation to manufacturing and communication networks in addition to physical security, are deeply interconnected, forming a complex web where the performance, maintenance and security of one component directly impacts others.
Understanding these intricate relationships is not merely beneficial; it’s critically important to prevent unexpected failures and bolster overall security.
At its core, an integrated system represents the deliberate combination of devices, applications and networking to achieve a specific business outcome.
Consider the seemingly simple act of retrieving video evidence from a surveillance system.
This critical business outcome is only possible because multiple elements are working in unison: the camera device captures the footage, a video management system (VMS) application controls that device, the data is properly transmitted across a network, and finally, it is securely stored for the required retention period.
Each of these elements – the device, the application, the network and the storage – is interdependent; none can achieve the desired result on its own.
This intricate reliance highlights a key characteristic of these environments: they are “tightly-coupled”.
Virtually all cyber-physical systems like the Internet of Things (IoT) and operational technologies (OT) are tightly-coupled environments.
The consequences of failing to grasp this tight coupling can range from operational inefficiencies to significant security breaches.
When systems are integrated, a vulnerability or failure in one area can cascade, impacting seemingly unrelated components or even the entire operational fabric.
Therefore, a holistic understanding of these relationships is not just about troubleshooting; it’s about proactive management and robust defense.
Here are three critical areas where understanding these interdependencies is absolutely essential:
The seemingly routine task of updating device passwords or firmware in an integrated system is far more complex than it appears on the surface.
In a standalone device, updating firmware might be a straightforward process.
However, in an integrated system environment, firmware updates can impact compatibility with other devices or applications.
An update to a camera’s firmware, for instance, can potentially not be compatible with the VMS if it does not support that latest version of camera firmware.
Similarly, updating passwords on a camera device requires updating that same password in the VMS.
The challenge intensifies when considering the scale of modern deployments.
Large enterprises often have thousands of IoT devices, from door sensors and access control readers to HVAC controllers and specialized industrial sensors.
Each of these devices may have its own specific firmware update procedure, compatibility matrix and credential requirements.
Without an integrated system approach that can discover all connected devices, assess their current firmware versions, manage credentials securely and orchestrate updates systematically, organizations face significant operational overhead and increased vulnerability.
Incorrect or incomplete updates can lead to device malfunction, network instability, or, critically, leave devices unpatched and exposed to known exploits.
The concept of “cyber-hardening” systems, especially in the pursuit of a Zero Trust environment, fundamentally relies on an in-depth understanding of system integration.
Zero Trust operates on the principle of “never trust, always verify,” meaning no user, device or application is inherently trusted, regardless of its location within the network.
Implementing Zero Trust in cyber-physical systems is particularly challenging due to their diverse nature, often legacy components and direct interaction with the physical world.
Achieving Zero Trust requires meticulous control over access to devices, applications and network segments.
This includes:
Without a comprehensive understanding of how devices connect to applications, how data flows across the network and the specific roles each component plays in a business outcome, implementing such granular controls is impossible.
A cyber-physical system security platform is crucial for mapping these connections, enforcing policies consistently and continuously validating trust across the entire cyber-physical ecosystem.
It allows for automated credential rotation, certificate management and continuous vulnerability assessment, all vital for a truly hardened, Zero Trust posture.
When a system fails within an integrated environment, identifying the root cause and implementing effective remediation is incredibly difficult without a clear understanding of the interconnections.
In a tightly-coupled system, a problem in one component can manifest as an error in another, far-removed part of the system.
For instance, a network congestion issue might appear as a video lag or a storage array failure could prevent critical security footage from being recorded.
Pinpointing the exact cause requires tracing the data flow and operational dependencies across devices, applications and the network.
Having metrics that assess the system as a whole (for example, the entire path a video surveillance stream) is critical.
Consider a scenario where an access control system is intermittently failing. Is it the card reader device itself? Is it the local controller?
Is it a network connectivity issue to the central server? Is the access control software encountering a server motherboard temperature problem?
Or is it an issue with the power supply or physical cabling?
Without an integrated view that monitors the health, performance and connectivity status of every component, troubleshooting becomes a lengthy, manual and often frustrating process of elimination.
An integrated approach to failure analysis provides the necessary visibility.
It allows operators to:
Modern cyber-physical systems, including physical security, IoT, OT and industrial control systems (ICS) environments, are inherently integrated and tightly-coupled.
Their complexity demands a fundamental shift in how organizations manage, maintain and secure them.
Relying on isolated tools or manual processes for individual components is no longer sustainable.
By embracing an integrated systems approach, organizations gain the holistic visibility and control necessary to:
Ultimately, understanding the profound interconnectedness of these systems is the cornerstone of building truly secure, reliable and efficient cyber-physical system operations.
Strong execution on these principals can turn physical security teams into the organizational experts on overall cyber-physical system security and management.
This article was originally published in the August edition of Security Journal Americas. To read your FREE digital edition, click here.