Asset management's role in ICS security

Most industrial control system (ICS) networks were designed and implemented before the advent of cyber crime, and the availability of automated asset management capabilities, which makes it difficult to assess risk and apply effective defenses. Three major pain points for users are highlighted.


Given the increase in cyber attacks against critical infrastructures in the U.S. and abroad, the need to secure industrial control systems (ICS) has never been greater.

Unfortunately, ICS networks are difficult to secure since they lack basic, automated asset discovery and management capabilities, which are common in IT networks.

Most ICS networks were designed and implemented before the advent of cyber crime, and the availability of automated asset management capabilities. Without an up-to-date and accurate inventory of ICS assets, including automation controllers responsible for managing physical processes, it is virtually impossible to assess risk and apply effective defenses.

Beyond security, asset management can play a pivotal role in maintaining operational reliability and safety, since it enables OT personnel to track changes made to devices, prioritize threat mitigation efforts, restore misconfigured devices to a "known good" state, and plan maintenance schedules.

As ICS networks grow, so does asset complexity. The number and variety of different devices, versions and firmware within a network, coupled with decades of consolidation and M&A activities, can become manually unfeasible to manage.

Curing a blindspot

In contrast to IT networks, where automated asset management is a given, industrial networks track their assets the old-fashioned way via a mix of manual processes, notes, and spreadsheets. This inefficiency makes it virtually impossible to perform reliable discovery, maintain up-to-date asset inventories, and track changes to assets over time.

Poor asset visibility is a basic and serious deficiency because it affects everything else in the network. Without knowing the type, model, location, functions, and current configurations of devices, organizations cannot monitor them to ensure operational safety and reliability. Manual monitoring in ICS networks is especially difficult since devices (mostly industrial controllers) are proprietary boxes with vendor-specific communication protocols.

Poor or non-existing monitoring inevitably means that organizations are unable to implement basic proactive security measures. For example, organizations cannot take snapshots of current configurations, allowing them to restore devices to safe configurations if an incident occurs.

Image courtesy: Ilya Pavlov/UnsplashHere are three major pain points users suffer:

1. Limitations of manual inventory management: This is time-consuming and prone to human error. Frequently, this approach provides data that is outdated or erroneous, or simply fails to uncover any information. This inefficiency is risky since new assets and changes are added on a regular basis.

2. Complying with cybersecurity regulations: Industrial networks must comply with new standards and regulations regarding cybersecurity. The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF), for example, requires organizations to implement an asset management solution that can identify, inventory, and manage all physical devices and systems.

3. Securing assets: Ten years ago, cyber security was a non-issue for ICS/OT networks, which were totally isolated from IT networks and considered insulated from cyber threats. Today, one of the biggest problems facing critical infrastructures is the weakness of their security. Automated asset discovery is vital for meeting the security needs of ICS networks. Unfortunately, most organizations don't know what devices they have in different segments of the plant. A typical ICS network contains controllers from a mix of vendors.

Asset management

The foundation for securing industrial networks requires the following: Deep visibility into control plane communication protocols; the capability to scan the network, discover devices, inventory them, and snapshot their settings; and continuous monitoring of activity on devices to detect unauthorized changes.Implementing automated asset discovery and management can ensure all of an organization's assets are not just easy to identify and audit, but equally easy to update, restore and protect.

Dana Tamir is vice president of market strategy for industrial cybersecurity technology provider Indegy. This content originally appeared on ISSSource is a CFE Media content partner. Edited by Chris Vavra, production editor, CFE Media,

ONLINE extra

See related stories from ISSSource linked below.

The Top Plant program honors outstanding manufacturing facilities in North America. View the 2017 Top Plant.
The Product of the Year program recognizes products newly released in the manufacturing industries.
Each year, a panel of Control Engineering and Plant Engineering editors and industry expert judges select the System Integrator of the Year Award winners in three categories.
Welding ergonomics, 2017 Salary Survey, and surge protection
2017 Top Plant winner, Best practices, Plant Engineering at 70, Top 10 stories of 2017
Pipe fabrication and IIoT; 2017 Product of the Year finalists
Product of the Year winners, Pattern recognition, Engineering analytics, Revitalize older pump installations
Control room technology innovation; Practical approaches to corrosion protection; Pipeline regulator revises quality programs
The cloud, mobility, and remote operations; SCADA and contextual mobility; Custom UPS empowering a secure pipeline
Setting internal automation standards
Knowing how and when to use parallel generators
PID controllers, Solar-powered SCADA, Using 80 GHz radar sensors

Annual Salary Survey

Before the calendar turned, 2016 already had the makings of a pivotal year for manufacturing, and for the world.

There were the big events for the year, including the United States as Partner Country at Hannover Messe in April and the 2016 International Manufacturing Technology Show in Chicago in September. There's also the matter of the U.S. presidential elections in November, which promise to shape policy in manufacturing for years to come.

But the year started with global economic turmoil, as a slowdown in Chinese manufacturing triggered a worldwide stock hiccup that sent values plummeting. The continued plunge in world oil prices has resulted in a slowdown in exploration and, by extension, the manufacture of exploration equipment.

Read more: 2015 Salary Survey

Maintenance and reliability tips and best practices from the maintenance and reliability coaches at Allied Reliability Group.
The One Voice for Manufacturing blog reports on federal public policy issues impacting the manufacturing sector. One Voice is a joint effort by the National Tooling and Machining...
The Society for Maintenance and Reliability Professionals an organization devoted...
Join this ongoing discussion of machine guarding topics, including solutions assessments, regulatory compliance, gap analysis...
IMS Research, recently acquired by IHS Inc., is a leading independent supplier of market research and consultancy to the global electronics industry.
Maintenance is not optional in manufacturing. It’s a profit center, driving productivity and uptime while reducing overall repair costs.
The Lachance on CMMS blog is about current maintenance topics. Blogger Paul Lachance is president and chief technology officer for Smartware Group.
The maintenance journey has been a long, slow trek for most manufacturers and has gone from preventive maintenance to predictive maintenance.
This digital report explains how plant engineers and subject matter experts (SME) need support for time series data and its many challenges.
This digital report will explore several aspects of how IIoT will transform manufacturing in the coming years.
Maintenance Manager; California Oils Corp.
Associate, Electrical Engineering; Wood Harbinger
Control Systems Engineer; Robert Bosch Corp.
This course focuses on climate analysis, appropriateness of cooling system selection, and combining cooling systems.
This course will help identify and reveal electrical hazards and identify the solutions to implementing and maintaining a safe work environment.
This course explains how maintaining power and communication systems through emergency power-generation systems is critical.
click me