Why integrated systems need integrated security

Why integrated systems need integrated security

Share this content

Facebook
Twitter
LinkedIn

In today’s increasingly digital world, the concept of “integrated systems” has become paramount, writes John Gallagher, Vice President at Viakoo.

Holistic security

Integrated systems, which range from building automation to manufacturing and communication networks in addition to physical security, are deeply interconnected, forming a complex web where the performance, maintenance and security of one component directly impacts others.

Understanding these intricate relationships is not merely beneficial; it’s critically important to prevent unexpected failures and bolster overall security.

At its core, an integrated system represents the deliberate combination of devices, applications and networking to achieve a specific business outcome.

Consider the seemingly simple act of retrieving video evidence from a surveillance system.

This critical business outcome is only possible because multiple elements are working in unison: the camera device captures the footage, a video management system (VMS) application controls that device, the data is properly transmitted across a network, and finally, it is securely stored for the required retention period.

Each of these elements – the device, the application, the network and the storage – is interdependent; none can achieve the desired result on its own.

This intricate reliance highlights a key characteristic of these environments: they are “tightly-coupled”.

Virtually all cyber-physical systems like the Internet of Things (IoT) and operational technologies (OT) are tightly-coupled environments.

The consequences of failing to grasp this tight coupling can range from operational inefficiencies to significant security breaches.

When systems are integrated, a vulnerability or failure in one area can cascade, impacting seemingly unrelated components or even the entire operational fabric.

Therefore, a holistic understanding of these relationships is not just about troubleshooting; it’s about proactive management and robust defense.

Here are three critical areas where understanding these interdependencies is absolutely essential:

Updating device passwords or firmware

The seemingly routine task of updating device passwords or firmware in an integrated system is far more complex than it appears on the surface.

In a standalone device, updating firmware might be a straightforward process.

However, in an integrated system environment, firmware updates can impact compatibility with other devices or applications.

An update to a camera’s firmware, for instance, can potentially not be compatible with the VMS if it does not support that latest version of camera firmware.

Similarly, updating passwords on a camera device requires updating that same password in the VMS.

The challenge intensifies when considering the scale of modern deployments.

Large enterprises often have thousands of IoT devices, from door sensors and access control readers to HVAC controllers and specialized industrial sensors.

Each of these devices may have its own specific firmware update procedure, compatibility matrix and credential requirements.

Without an integrated system approach that can discover all connected devices, assess their current firmware versions, manage credentials securely and orchestrate updates systematically, organizations face significant operational overhead and increased vulnerability.

Incorrect or incomplete updates can lead to device malfunction, network instability, or, critically, leave devices unpatched and exposed to known exploits.

Cyber-hardening integrated systems

The concept of “cyber-hardening” systems, especially in the pursuit of a Zero Trust environment, fundamentally relies on an in-depth understanding of system integration.

Zero Trust operates on the principle of “never trust, always verify,” meaning no user, device or application is inherently trusted, regardless of its location within the network.

Implementing Zero Trust in cyber-physical systems is particularly challenging due to their diverse nature, often legacy components and direct interaction with the physical world.

Achieving Zero Trust requires meticulous control over access to devices, applications and network segments.

This includes:

  • Micro-segmentation: Dividing the network into small, isolated segments to limit lateral movement of threats. This requires knowing exactly which devices communicate with which applications and services
  • Multi-factor authentication (MFA): Extending MFA to as many devices and access points as possible, even for physical security components
  • Continuous monitoring: Constantly verifying the identity and integrity of every device and user attempting to access resources
  • Principle of least privilege: Ensuring that devices and users only have the minimum access rights necessary to perform their functions

Without a comprehensive understanding of how devices connect to applications, how data flows across the network and the specific roles each component plays in a business outcome, implementing such granular controls is impossible.

A cyber-physical system security platform is crucial for mapping these connections, enforcing policies consistently and continuously validating trust across the entire cyber-physical ecosystem.

It allows for automated credential rotation, certificate management and continuous vulnerability assessment, all vital for a truly hardened, Zero Trust posture.

Failure analysis and remediation

When a system fails within an integrated environment, identifying the root cause and implementing effective remediation is incredibly difficult without a clear understanding of the interconnections.

In a tightly-coupled system, a problem in one component can manifest as an error in another, far-removed part of the system.

For instance, a network congestion issue might appear as a video lag or a storage array failure could prevent critical security footage from being recorded.

Pinpointing the exact cause requires tracing the data flow and operational dependencies across devices, applications and the network.

Having metrics that assess the system as a whole (for example, the entire path a video surveillance stream) is critical.

Consider a scenario where an access control system is intermittently failing. Is it the card reader device itself? Is it the local controller?

Is it a network connectivity issue to the central server? Is the access control software encountering a server motherboard temperature problem?

Or is it an issue with the power supply or physical cabling?

Without an integrated view that monitors the health, performance and connectivity status of every component, troubleshooting becomes a lengthy, manual and often frustrating process of elimination.

Strengthened security

An integrated approach to failure analysis provides the necessary visibility.

It allows operators to:

  • Correlate events: Link seemingly disparate alerts from different system components to identify a common root cause
  • Trace dependencies: Understand which components rely on others, so a failure in one can quickly point to potential impacts elsewhere
  • Automate diagnostics: Utilize tools that can automatically test connectivity, check configuration settings and diagnose common issues across the integrated system
  • Streamline remediation: Once the root cause is identified, an integrated platform can facilitate automated remediation steps, such as restarting services, pushing configuration changes or even triggering firmware rollbacks, minimizing downtime and operational disruption

Conclusion

Modern cyber-physical systems, including physical security, IoT, OT and industrial control systems (ICS) environments, are inherently integrated and tightly-coupled.

Their complexity demands a fundamental shift in how organizations manage, maintain and secure them.

Relying on isolated tools or manual processes for individual components is no longer sustainable.

By embracing an integrated systems approach, organizations gain the holistic visibility and control necessary to:

  • Ensure the smooth performance and maintenance of their critical infrastructure
  • Proactively secure against evolving cyber-threats
  • Automate essential security hygiene tasks like credential and firmware updates
  • Build resilient Zero Trust architectures
  • Rapidly identify and remediate failures, ensuring business continuity

Ultimately, understanding the profound interconnectedness of these systems is the cornerstone of building truly secure, reliable and efficient cyber-physical system operations.

Strong execution on these principals can turn physical security teams into the organizational experts on overall cyber-physical system security and management.

This article was originally published in the August edition of Security Journal Americas. To read your FREE digital edition, click here.