Skip to content
3 MIN READ

Securing Critical Infrastructure in the Digital Age

We know adversaries have the expertise and tools necessary to take down critical infrastructure and systems that cripple entire regions. These critical systems are essential to our global economy, physical security, and health. We rely on them to provide electricity in our homes; transportation to work and play, a secure place for our lifesavings, as well as a communication systems to stay in touch with people we love. With such a heavy reliance, we must ask ourselves….are we doing enough to protect our global critical infrastructure? Some good progress has been made; through the maturing of industry standards and deployment of commercial off-the-shelf security technologies. But, in order for critical infrastructure to be ready to take on the cyber risks of today (and tomorrow) will require a holistic strategy.

It will require that security is put above everything, embedded everywhere and integrated throughout the operations of every critical infrastructure provider – across its people, processes and technology.

Start with a Resilient Network

Critical infrastructure providers no longer see technology as an extension of the services they provide but rather at the core – and because they are enabled by technology, that means they will need to embed security everywhere. Like any cybersecurity strategy, critical infrastructure providers need to take a risk-based approach to understand, where are they most vulnerable? And how do they address those risks? In nearly every risk based assessment I’ve seen, the ability to have visibility and control from the network is THE critical risk control point. The network connects the data, programs, applications, web networks, software and hardware within a critical infrastructure provider’s environment so it can deliver goods and services to end customers. It’s impossible to successfully digitize critical infrastructure securely if you don’t trust your network. Any network including devices like routers, switches, or access points, as well as your cloud infrastructure can be vulnerable. Addressing this risk requires embedding security technology, processes and policies so the authenticity and integrity of each device can be verified as well as any hardware and/or software running on it.

Integrate Security throughout Your Operations

It is clear that no single vendor provides every technology to prevent, detect or respond to the threats of today. It is crucial that security operations add capabilities that increase their ability to respond to security incidents as an essential part of any cybersecurity strategy. However, this strategy of adding bespoke tools to address point problems can quickly break down without an integrated architecture. We know the pain because at Cisco we lived through it. The digital age requires machine speed. To get to machine speed you must have visibility and control. To gain visibility and control takes an integrated architecture of solutions that work together, communicate, and automate actions to make it easier to address incidents faster (machine speed) and less complex (does not rely on multiple human actions). The digital world moves fast. With critical infrastructure providing essential services to our daily way of life, the speed at which cyber incidents can be detected and thwarted in their environments is vital.

It’s a Multi-Party Responsibility

To secure critical infrastructure on a global scale will require more than just individual organizations, it is a multi-party responsibility including both the public and private sector. There is much to be gained through innovative partnerships that share best practices, collaborate on threat intelligence, teach how to build and deploy secure solutions, and bolster education and training.

A cyber-attack on critical infrastructure, and the technology that keeps it running, has the potential for wide-ranging effects. This is why, when it comes to something so valuable to our global society, cybersecurity must be a top priority. When done properly – security above everything, embedded everywhere and integrated throughout the operations of every provider – our global critical infrastructure will be ready for the risks of tomorrow and the providers will be able to grow and innovate armed with the power of digital capabilities.

 

 By Anthony Greico

Published with permission from blogs.cisco.com.