Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

CISA Calls for Improved Critical Infrastructure Security

The United States Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday called on critical infrastructure owners and operators to improve their security stance against malicious cyberattacks.

The United States Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday called on critical infrastructure owners and operators to improve their security stance against malicious cyberattacks.

The agency urges executives and senior leaders to take steps to ensure that their organizations are prepared to respond to incidents through the implementation of cybersecurity best practices.

“Sophisticated threat actors, including nation-states and their proxies, have demonstrated capabilities to compromise networks and develop long-term persistence mechanisms. These actors have also demonstrated capability to leverage this access for targeted operations against critical infrastructure with potential to disrupt National Critical Functions,” CISA notes.

To improve their defenses, critical infrastructure organizations are advised to eliminate gaps in IT/OT security personnel coverage, and to prepare for rapid response through heightened awareness and well implemented incident response procedures.

Furthermore, organizations are advised to train their personnel on the steps to take during and after a cyberattack, to implement two-factor authentication and make sure systems and applications are kept updated, and to set a low threshold for threat and information sharing.

For entities with OT or industrial control systems (ICS) assets, CISA also recommends identifying critical processes and securing them, developing workarounds and manual controls to isolate critical processes if needed, and ensuring that backup procedures are implemented.

At the same time, CISA encourages organizations to implement their cyber incident response plan as soon as an attack is detected, and to immediately report the assault to CISA.

Related: CISA Expands ‘Must-Patch’ List With Log4j, FortiOS, Other Vulnerabilities

Related: CISA Releases Guidance on Securing Enterprise Mobile Devices

Related: CISA Releases Incident and Vulnerability Response Playbooks

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Breaches

GoTo said an unidentified threat actor stole encrypted backups and an encryption key for a portion of that data during a 2022 breach.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Management & Strategy

Industry professionals comment on the recent disruption of the Hive ransomware operation and its hacking by law enforcement.

Management & Strategy

Tens of cybersecurity companies have announced cutting staff over the past year, in some cases significant portions of their global workforce.

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

Risk Management

A threat-based approach to security often focuses on a checklist to meet industry requirements but overlooked the key component of security: reducing risk.

Management & Strategy

Microsoft making a multiyear, multibillion dollar investment in the artificial intelligence startup OpenAI, maker of ChatGPT and other tools.