News
Welcome to the News community!
Rules:
1. Be civil
Attack the argument, not the person. No racism/sexism/bigotry. Good faith argumentation only. This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban. Do not respond to rule-breaking content; report it and move on.
2. All posts should contain a source (url) that is as reliable and unbiased as possible and must only contain one link.
Obvious biased sources will be removed at the mods’ discretion. Supporting links can be added in comments or posted separately but not to the post body. Sources may be checked for reliability using Wikipedia, MBFC, AdFontes, GroundNews, etc.
3. No bots, spam or self-promotion.
Only approved bots, which follow the guidelines for bots set by the instance, are allowed.
4. Post titles should be the same as the article used as source. Clickbait titles may be removed.
Posts which titles don’t match the source may be removed. If the site changed their headline, we may ask you to update the post title. Clickbait titles use hyperbolic language and do not accurately describe the article content. When necessary, post titles may be edited, clearly marked with [brackets], but may never be used to editorialize or comment on the content.
5. Only recent news is allowed.
Posts must be news from the most recent 30 days.
6. All posts must be news articles.
No opinion pieces, Listicles, editorials, videos, blogs, press releases, or celebrity gossip will be allowed. All posts will be judged on a case-by-case basis. Mods may use discretion to pre-approve videos or press releases from highly credible sources that provide unique, newsworthy content not available or possible in another format.
7. No duplicate posts.
If an article has already been posted, it will be removed. Different articles reporting on the same subject are permitted. If the post that matches your post is very old, we refer you to rule 5.
8. Misinformation is prohibited.
Misinformation / propaganda is strictly prohibited. Any comment or post containing or linking to misinformation will be removed. If you feel that your post has been removed in error, credible sources must be provided.
9. No link shorteners or news aggregators.
All posts must link to original article sources. You may include archival links in the post description. News aggregators such as Yahoo, Google, Hacker News, etc. should be avoided in favor of the original source link. Newswire services such as AP, Reuters, or AFP, are frequently republished and may be shared from other credible sources.
10. Don't copy entire article in your post body
For copyright reasons, you are not allowed to copy an entire article into your post body. This is an instance wide rule, that is strictly enforced in this community.
view the rest of the comments
I'll never understand how our infrastructure isn't on a completely separate air gapped network.
Obviously they need to share data in house, but the government absolutely has the resources to run their own separate intranet that's not at all connected to the global internet, and yet they just plug their shit into consumer lines and hope their security is up to snuff.
Sometimes an airgap isn't enough (Stuxnet is a good example), but realistically cybersecurity is an afterthought unfortunately. Simply go onto Shodan and lookup Schneider or Allen-Bradley to see how many of these controllers are accessible directly from the internet
Dont understate the effectiveness of offline networks.
Nah man, this is my game, air gap systems aren't really a thing for anything non-military anymore. Companies want a real-time view into their production for making business decisions.
There are ways to secure your control systems network properly without a full airgap with proper boundary controls between the various layers of your Purdue model as well as fully separate Active Directories just to make a start.
Its actually an entire independent cybersecurity specialisation for OT networks. For anyone who is interested I would recommend Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions by Clint Bodungen its a fantastic read and very easy to follow.
Now the concept of air gapping still exists in this architecture, its designed to be able to "Island" which is where you break the connection between your corporate and OT networks when an incident has occurred on the corporate side essentially creating an airgap.
Essentially vs actually is conflation. Zero trust and segmentation is marketing. If its connected its vulnerable. value just determines when. if you really are in the industry the big vulnerability everyone has been talking about last week is evidence enough to the fact.
Oh yea poor old Palo Alto Networks is having a rough time at the moment. But a mature OT network has implemented defence in depth correctly and have a plan in place for incidents such as this one should they occur. I know a few sites who have had to island until they were able to put vulnerability mitigation in place, the good thing is that they could do this without disrupting their OT operations significantly. What you're saying is correct, if its connected its only a matter of when not if, but you design your system with this in mind.
At the end of the day corporations are going to want business data from your site, and we need to design around that. To fight it and just air gap is going to result in you getting side stepped and your system being even more vulnerable. It's going to happen either way so we need to make sure we have the plans in place to implement it as safely as possible.
They don't even need to run a separate network. The NSA has long since figured out a way to move secure data over an insecure network. The problem is that most of the US's infrastructure is run by "for profit" companies. And since they are neither required, not is it profitable, to have robust security, they don't. Instead, they do the bare minimum to be compliant with whatever frameworks they are required to. And since basically every one of those compliance frameworks is all about having the right documentation and never actually audit systems directly, their actual security is shit.
If you want companies to start taking security seriously, then we need GDPR style fines when companies get breached and are found to be running operating system and software which is years out of date. Compliance frameworks also need to get into the nitty-gritty details of OS and software configuration and not just "have a baseline".