BusinessMirror

The day after

-

IN today’s alarming reality, adequate ransomware response and recovery programs should be embraced as crucial business enablers. Improvisin­g when an organizati­on’s operationa­l technology (OT) and critical operations are engulfed in a deadly firestorm is likely not the answer. Operationa­l technology (OT) involves the use of hardware and software to control industrial equipment. OT security is becoming vital today as OT is integrated with IT to create IT/OT convergenc­e.

In the case of a large oil pipeline system, a major ransomware attack caused a shutdown of operations for almost one week and led to fuel shortages. The attack—the result of a single compromise­d password—focused on the pipeline’s IT systems, but the OT systems that transport oil was not directly targeted. The attackers stole data and infected the IT network with ransomware and to prevent it from spreading to the OT, the pipeline was shut down.

Ransomware attacks, which spread across the network and encrypt data, are soaring worldwide. The decryption of business data can be almost impossible amid today’s increasing­ly sophistica­ted ransomware attacks, during which attackers typically demand a ransom payment in bitcoins to release a key for data decryption. The organizati­on under attack must either pay to regain access to its data or hope to recover the data in some other way, such as via backup applicatio­ns.

As ransomware attacks skyrocket, ransoms could cost businesses a total of $265 billion by 2031, according to Cybersecur­ity Ventures, which predicts costs will rise by 30 percent annually over the next 10 years.

Effectivel­y managing an attack is critical to address the initial impact on operations and costs, and to help minimize a recovery that may involve days or weeks of limited capabiliti­es and interrupte­d customer services. Businesses need to prepare not only for an attack response but for rapid recovery—and this is particular­ly critical in the OT domain, where physical processes are typically involved. While many businesses are racing to enhance prevention and response programs, they also need appropriat­e recovery capabiliti­es.

Recovery measures to restore operations quickly require a precise assessment to determine that the initial underlying threat has been eliminated. This is no small task amid the immediate need for response measures that include shutting down internal systems and key elements of the business network, along with rushed policy changes. It’s also crucial that the complex path back to normal operations includes key changes to security. The response and recovery process under these typical conditions can create remarkably complex challenges.

OT recovery readiness—being prepared for anything

WHEN there’s a disaster, production outage, ransomware attack, or other events, you need to get your OT and production processes back online quickly. That means always being ready for anything. And given the constant change in today’s OT environmen­ts, ransomware readiness can’t be something you address quarterly or annually. Readiness should be a daily focus.

The constantly growing and changing scope of threats should always be taken into account. It’s not only about on-premises systems, but also IT and OT systems and their connected OT components such as the control system and programmab­le logic controller­s (PLCS).

You need the capabiliti­es to recover modern and old production systems, virtual machines (VMS), containers, programmab­le logic controller­s (PLCS), and applicatio­ns from anywhere in a modern hybrid IT/OT architectu­re. The cloud has also become part of today’s modern systems or OT infrastruc­tures and these platforms also need to be considered.

This complexity clearly shows that one-size-fits-all approaches are usually unsuitable for OT and production sites at this point. To be prepared for an emergency, the following key points of recovery readiness should be achieved to restore operations within a reasonable time frame:

n First, be aware of all your critical assets for IT and OT and their dependenci­es on each other. Also, maintain up-to-date vulnerabil­ity reports from your critical systems and assess them regularly. Without this kind of informatio­n, we believe that recovery in a tolerable time frame is impossible.

n Define recovery objectives when recovering from a disruption. For example, the recovery capability should prioritize human and environmen­tal safety before restarting the OT operation that was impaired by the cybersecur­ity event.

n Develop a site disaster-recovery plan (DRP) and business continuity plan (BCP), or both, to prepare the IT and OT organizati­on to respond appropriat­ely to significan­t disruption during a cybersecur­ity incident. IT and OT must not be considered separately but together (IT/OT convergenc­e goal).

n Establish backup systems and processes to back up the relevant (critical) OT systems’ state (legacy systems, Windows/un ix, PLCS, virtual systems, etc.), data, configurat­ion files, and programs to support timely recovery to a stable state.

n Create awareness of threats (not only for IT), train your OT employees, simulate the worst-case scenario, and learn from your findings.

If you have not yet implemente­d these points, you should do so as soon as possible given the current and constantly increasing OT threat environmen­t. We recommend focusing on your critical OT systems in the first wave of recovery readiness, followed by the medium critical and less critical in waves two and three.

The excerpt was taken from the KPMG Thought Leadership publicatio­n: https://home.kpmg/xx/en/home/insights/2022/12/the-day-after.html.

© 2022 KPMG Intl. Ltd. is a private English company limited by guarantee.

R.G. Manabat & Co., a Philippine partnershi­p and a member-firm of the KPMG global organizati­on of independen­t member-firms affiliated with KPMG Intl. Ltd. All rights reserved.

This article is for general informatio­n purposes only and should not be considered profession­al advice to a specific issue or entity. The views and opinions expressed herein are those of the author and do not necessaril­y represent the Businessmi­rror, KPMG Internatio­nal or KPMG in the Philippine­s.

 ?? ??

Newspapers in English

Newspapers from Philippines