HomeCII/OTClaroty's Team82 Research Reveals Remote Access Risks for Mission-Critical OT Assets

Claroty’s Team82 Research Reveals Remote Access Risks for Mission-Critical OT Assets

Published on

spot_img

In recent news, cybersecurity company Claroty unveiled troubling data indicating that 13% of the most essential operational technology (OT) assets are at risk due to insecure internet connections. Furthermore, 36% of these vulnerable assets contain Known Exploited Vulnerabilities (KEVs), which could potentially be leveraged by malicious actors to disrupt crucial operations. To combat these risks arising from the increased adoption of remote access technologies in cyber-physical systems (CPS) environments, Claroty has launched its upgraded Claroty xDome Secure Access solution.

According to a report by Gartner, the interconnectivity of CPS technologies with enterprise systems has created a need for remote access capabilities to operate, maintain, and update these systems from afar. However, Claroty’s research team, Team82, analyzed over 125,000 OT assets and identified several alarming findings. One such discovery is that 3.7% of all OT assets possess insecure internet connections, leaving them vulnerable to remote exploitation by cybercriminals scanning the IP address space.

Moreover, the study revealed that 13% of crucial engineering workstations (EWS) and human-machine interfaces (HMIs) also suffer from insecure internet connections. These assets play a pivotal role in controlling and monitoring production systems, making them desirable targets for threat actors seeking to compromise critical infrastructure. Additionally, 36% of these insecurely connected EWS and HMIs harbor at least one KEV, amplifying the risk of operational disruption.

Amir Preminger, the vice president of research for Claroty’s Team82, emphasized the urgent need for organizations to adopt a least-privileged access approach to safeguard mission-critical OT assets. Claroty’s xDome Secure Access solution offers a comprehensive security framework tailored for the unique requirements of OT environments. By integrating Identity Governance and Administration (IGA), Privileged Access Management (PAM), and Zero Trust Network Access (ZTNA) principles, the platform ensures enhanced productivity, reduced complexity, and regulatory compliance across all users.

The benefits of Claroty’s xDome Secure Access solution include increased productivity through seamless access for users, risk reduction through a tailored Zero Trust framework, reduced administrative complexity with scalable architecture, and compliance maintenance through real-time logging and auditing. Grant Geyer, Claroty’s chief product officer, highlighted the importance of balancing frictionless access with robust security measures to protect critical infrastructure effectively.

In conclusion, Claroty’s xDome Secure Access solution sets a new standard for securing industrial CPS assets and upholding operational excellence in today’s rapidly evolving threat landscape. Organizations must prioritize safeguarding their OT environments against cyber threats to ensure the continuity of essential services and public safety. Claroty’s innovative approach to cybersecurity provides a roadmap for enhancing resilience and maintaining a secure operational environment amidst growing digital risks.

Source link

Latest articles

Njordium Vendor Management System Removes Duplicate Third-Party Assessments

Njordium Cyber Group Unveils Innovative Vendor Management System to Streamline Regulatory Compliance In a significant...

Anthropic AI Ultimatums and Intellectual Property Theft: The Unspoken Risk

China’s Extraction Campaign: A Targeting Operation, Not a Curiosity A recent disclosure by Anthropic has...

Customized Havoc C2 Deploys Fake Tech Support Spam Across Organizations

New Cybersecurity Threat: Bad Actors Pose as IT Support In the ever-evolving landscape of cybersecurity,...

The Vulnerability That Turns Your AI Agent Against You

Zenity Labs has revealed a significant security concern dubbed "PleaseFix," a series of critical...

More like this

Njordium Vendor Management System Removes Duplicate Third-Party Assessments

Njordium Cyber Group Unveils Innovative Vendor Management System to Streamline Regulatory Compliance In a significant...

Anthropic AI Ultimatums and Intellectual Property Theft: The Unspoken Risk

China’s Extraction Campaign: A Targeting Operation, Not a Curiosity A recent disclosure by Anthropic has...

Customized Havoc C2 Deploys Fake Tech Support Spam Across Organizations

New Cybersecurity Threat: Bad Actors Pose as IT Support In the ever-evolving landscape of cybersecurity,...