USE CASES

Secure Remote Maintenance Access to OT Networks

TLDR: Exactly the right amount of access for OT Maintenance

You need to give outside vendors secure access to your OT network, but only to the right devices at the right times.

Combine passwordless MFA with segmentation, ensuring strong authentication without risky passwords, and put up virtual segmentation fences, limiting access to only what's needed. Give your outside vendors a personalized keycard that only works on certain doors at certain times, keeping your systems safe and giving you total control.

Challenge Met: Don’t let contractors be the Achilles heel in your cybersecurity framework

Organizations can leverage a combination of passwordless MFA and network segmentation to enable secure third-party maintenance access to OT networks. Passwordless MFA, utilizing methods like biometrics or hardware tokens, eliminates the risk of credential theft and phishing attacks, ensuring that only authorized contractors can access the network. This is further enhanced by network segmentation, which allows granular control over access permissions. By creating isolated network segments, organizations can restrict contractors to only the specific devices and systems they need to access for maintenance. This least-privilege approach minimizes the potential impact of a compromised contractor account. Additionally, access can be time-limited, granting access only during scheduled maintenance windows, further reducing the risk of unauthorized access. This strong authentication and granular access control combination provides a robust security framework for managing third-party access to sensitive OT environments.

The Ideal World: “Yet another day where you don’t need to change your password”

Imagine a world where bringing in outside help doesn't mean compromising your OT network security. Third-party contractors, essential for specialized maintenance, seamlessly connect with passwordless MFA, eliminating the risk of shared or stolen credentials: no more insecure passwords or phishing vulnerabilities.

Like virtual guardrails, segmentation guides them directly to the specific systems requiring attention. Access is precisely limited to the necessary devices and only during scheduled maintenance windows. The rest of your critical infrastructure remains invisible and untouchable, shielded from unintended access or potential mishaps.

This granular control fosters a secure ecosystem where external expertise is welcomed without compromising operational integrity. OT administrators breathe easy, knowing maintenance tasks are completed efficiently and securely, with minimal risk to their critical systems. It's a world where collaboration and security coexist, empowering organizations to leverage external expertise without compromising the safety and reliability of their operations.

How We do It:

Secure Remote Maintenance for OT Networks Using Passwordless MFA and Segmentation

This outlines a technical configuration for enabling secure remote maintenance of an Operational Technology (OT) network by third-party contractors, leveraging passwordless Multi-Factor Authentication (MFA) and network segmentation.

Rationale:

Remote maintenance by contractors introduces security risks. Passwordless MFA and segmentation are critical to ensure secure access while minimizing the attack surface.

Technical Configuration:

Network Segmentation

  • Dedicated Maintenance User Group:
    • Create a dedicated user group for remote maintenance activities.
  • Microsegmentation within the OT and Maintenance Zone:
    • Segment the maintenance zone based on contractor roles and responsibilities.
    • Use BlastShield’s software-defined segmentation to restrict communication between micro-segments.
  • OT Device Isolation:
    • Isolate the specific OT devices requiring maintenance within their own microsegments.
    • Limit communication between these devices and other network segments.

Passwordless MFA Implementation

  • Deploy BlastShield’s Passwordless MFA Solution:
    • Deploy BlastShield’s passwordless MFA supporting FIDO2 security keys, biometric authentication, and/or device-based authentication.
  • Contractor Identity Management:
    • Create dedicated contractor accounts with their user profiles and secure device enrollment
  • Biometric Authentication:
    • If biometric authentication is used, ensure contractors have compatible devices and enroll their biometric data securely.
  • Device-Based Authentication:
    • If device-based authentication is used, ensure contractor devices are registered and managed securely.
  • (Optional) FIDO2 Security Key Deployment:
    • Provide FIDO2 security keys to all authorized contractors.
    • Configure the MFA solution to require FIDO2 key authentication for all remote access attempts.

Remote Access Configuration

  • Deploy BlastShield OT Security Gateway:
    • Deploy BlastShield in the OT DMZ.
    • Configure the gateway to require passwordless MFA for all access attempts.
  • Zero Trust Network Access:
    • Implement ZTNA to enforce granular, identity-based access controls.
    • Require continuous authentication and authorization throughout the remote session.
    • Use contextual factors (location, time, device posture) to adjust access privileges dynamically based on the maintenance access needs for different device groups.
  • Time-Based Access Control:
    • Implement time-based access control to restrict contractor access to specific maintenance windows.
    • Automatically revoke access after the maintenance window expires.

Security Policies and Procedures

  • Contractor Agreement:
    • Establish a formal agreement with contractors outlining security responsibilities and access policies.
  • Security Training:
    • Provide security training to contractors on passwordless MFA, remote access procedures, and OT security best practices.
  • Incident Response Plan:
    • Develop an incident response plan for handling security incidents related to remote maintenance activities.
  • Regular Audits:
    • Conduct regular security audits to ensure ongoing compliance and effectiveness of the remote maintenance configuration.

Monitoring and Logging

  • Centralized Logging and Monitoring:
    • Implement centralized logging and monitoring for all remote access activities, network traffic, and security events.
    • Integrate logs with a SIEM system for analysis and alerting.

Benefits:

  • Reduced Attack Surface: Network segmentation isolates remote maintenance activities from critical OT networks.
  • Enhanced Security Posture: Passwordless MFA eliminates the risk of stolen credentials and phishing attacks.
  • Granular Access Control: ZTNA enforces strict access controls based on identity and context.
  • Increased Operational Resilience: Secure remote maintenance minimizes the risk of disruptions to OT operations.
  • Improved Compliance: Helps meet regulatory requirements and industry standards.