Why Comprehensive Zero Trust is Economically Beneficial for Manufacturers

Published:

For Manufacturers, Comprehensive Zero Trust Makes Economic Sense

Summary

Cybersecurity is presenting greater challenges for operational technology (OT) organizations. Cybercriminals have begun to increasingly target the manufacturing sector in particular; Palo Alto Networks’ 2023 Unit 42 Extortion and Ransomware Report found that this industry is one of the most deeply affected by extortion attacks.

Industrial automation continues its forward momentum, spurring further growth of the Internet of Things (IoT) and manufacturers’ investment in scalable, next-generation technologies. Though companies are trying to transform as quickly as possible, they must not push cybersecurity aside in their rush toward competitive advantage. More robust security isn’t merely a requirement; it also has a financial impact.

Current Risk to the OT Environment

For manufacturers, digital transformation has meant a significant increase in OT assets—once air-gapped for security reasons—now connected to their internal networks. These new connections enable access to vital business information and insights, optimize the running of critical infrastructure, and maximize efficiency. However, this integration introduces vulnerabilities. Systems such as distributed control systems (DCS), industrial control systems (ICS), and remote terminal units (RTUs) that were previously isolated now lack default security measures. Their traffic is often unencrypted, and visibility into their functioning is alarmingly low.

The implications of compromised security are severe. A breach can lead to loss of revenue, defective products, physical harm to employees, and impaired critical services to customers. The financial toll of security failures is staggering. For instance, the 2023 breach of the Clorox Company resulted in significant system disruptions and product delays, costing the company an estimated $49 million, according to SEC filings. Similarly, Norsk-Hydro lost $75 million due to a ransomware attack, while FACC AG suffered a phishing scam that cost them $61 million. Such incidents are not isolated; they highlight the urgent need for robust cybersecurity measures in manufacturing.

A Better Approach to Cybersecurity for Manufacturing

To combat these challenges, security teams at manufacturing organizations need tools that enhance visibility into their OT assets. A comprehensive solution should assist in identifying and cataloging unique OT networks, quickly evaluating vulnerabilities and threats, and improving the deterrence of both known and unknown threats. Additionally, it should facilitate the creation and automation of Zero Trust policies that protect OT assets and the corporate network.

Key Components of a Comprehensive Security Solution

  1. Get Holistic Visibility: To effectively assess the OT/ICS threat landscape, organizations need context-rich, accurate visibility of all users, applications, and assets. By combining passive identification technology, machine learning (ML), and crowdsourced telemetry, manufacturers can quickly evaluate and assign risk to all visible assets.

  2. Use a Zero Trust Approach: A Zero Trust security model is ideal for remote operations at plants and remote sites, as well as for OT and 5G assets. This involves creating policies and processes for automatic policy enforcement. In scenarios where policy enforcement is challenging, such as in the physical processes governed by the Purdue Model, segmentation can be employed. This approach supports continuous trust verification of communications, enforcement of “least privilege” access policies, and ongoing threat inspection. A recent survey on the State of OT Security conducted by Palo Alto Networks and ABI Research found that 87% of industrial respondents believe Zero Trust is the right approach for securing OT environments.

  3. Streamline Security: Utilizing a centralized platform from a single vendor simplifies security deployment and operations. This approach ensures compatibility with existing IT and OT architectures. Over 70% of respondents in the aforementioned study indicated plans to consolidate IT and OT solutions from the same cybersecurity vendor.

Stronger Security’s Three Advantages for Manufacturing

Implementing a stronger security framework for the Industrial Internet of Things (IIoT) offers three significant advantages beyond mere compliance:

  1. Faster ROI: With the right mix of security tools, manufacturers can accelerate their IIoT investment returns, addressing security hurdles that often impede the adoption of IIoT, SD-WAN, and 5G technologies.

  2. Fiscal Efficiency: A platform approach simplifies integration with existing technologies, reducing the complexity of policy creation and management. Automation can further decrease both capital expenditures and operating expenses. According to the analyst firm Enterprise Strategy Group, an OT security tool can demonstrate a remarkable 351% ROI over five years.

  3. Reduced Downtime: Operational downtime can severely impact service delivery and revenue generation. An ML-driven tool can identify and mitigate risks that might otherwise go unnoticed, preventing ransomware or other threats from causing significant disruptions. By leveraging ML capabilities, manufacturers can avert large-scale attacks and the associated loss of production time.

See ROI Faster with OT Security

While manufacturers may traditionally categorize security investments as a “cost center,” these technologies can significantly enhance productivity and should be viewed through the lens of ROI. The costs associated with inadequate cybersecurity infrastructure can far exceed the initial investment in robust security measures. In the absence of the traditional air gap for OT, manufacturers require holistic security solutions that provide operational simplicity, visibility, and Zero Trust security. Implementing a platform-based approach with ML capabilities will empower IT security teams to protect digital assets while realizing faster ROI.


About The Author

Navneet Singh is the Vice President of Marketing, Network Security, at Palo Alto Networks.


Did you enjoy this article?
Check out our free e-newsletters to read more great articles.
Subscribe

Related articles

Recent articles