Protect Your Port: Using Segmentation to Keep Cyber Attackers at Bay
What do the city of Atlanta, the Port of Barcelona, Spain and the Port of San Diego have in common? They all have been victims of ransomware attacks this year.
- By Tom Gilbert
- Dec 21, 2018
What do the city of Atlanta, the Port of Barcelona, Spain and the Port of San Diego have in common? They all have been victims of ransomware attacks this year. Critical infrastructure was held captive, creating a public inconvenience for residents trying to access to park permits, public records and other online services.
There will certainly other names added to this list, and soon. Why? Because ports and city governments are an economic gateway, providing critical services that when brought to a halt, result in significant lost dollars. This gives attackers leverage, knowing that these entities cannot afford extensive downtime.
Why Ports and Why Now?
Traditionally, local and federal governments have a history of poorly maintained cyber infrastructure, creating an obvious opportunity for exploitation. This is not due to any fault of their own, but rather to the fact that these entities provide a conglomeration of services, with information shared back and forth, and no central cyber strategy or individual in charge. They are essentially huge extranet services platforms, with data exchanges, application exchanges and interdependencies that funnel all the way down to local residents and consumers.
These dependencies, particularly on external vendors, create additional vulnerabilities as attackers can target those entry points to make their way to the port or government organization itself. The Target breach in 2013 is proof of how attackers can work their way into an organization’s network by compromising a third-party vendor. The scary truth is that it only takes one vulnerable point of entry for malicious actors to work their up the food chain and reach a port’s critical infrastructure.
Traditional Security Approaches Aren’t Enough
Many organizations falsely believe they are immune to ransomware and other cyber threats because they haven’t been a target, yet. Plus, traditional intrusion detection and patch management solutions give ports a false sense of security. These approaches do not provide a sufficient layer of protection on their own, as they are unable to effectively be applied to the multiple vendors — and endless consumers — doing business with the port. After all, a port has zero visibility into what cybersecurity methods are being used by local city residents, or even major shipping lines. When you don’t have a true view of all of the components that may potentially host malware, this creates blind spots for detection-based products, ultimately degrading the effectiveness.
Don’t Trust What You Can’t Control
Our hyper-connected way of doing business today makes it increasingly difficult to trust anyone or anything. If you accept the fact that most of networks will eventually get hacked, due to the increased connectedness and complexity of business operations, embracing Zero Trust is a great way to limit the damage.
Zero Trust, which originated out of Forrester Research nearly a decade ago, believes that organizations should not assume that anything inside or outside their network perimeter can be trusted. While it would be ideal for ports and government organization to restrict the exchange of information with parties, computers or networks that they don’t control, it’s would make doing business nearly impossible.
Zero Trust cannot be proactively applied everywhere, including for front-end systems used to power many business exchanges. However, for your most critical information, which you cannot afford to lose and over which you have 100 percent of control, you can add a much-needed layer of protection.
Maybe it is only applicable for a quarter of your business, but you start there — walling off critical systems from any systems that don’t meet those two criteria. Embracing Zero Trust where you can and making sure that critical pieces of your business that have no reason to be visible to the rest of the world are not connected to even the most secure perimeter is a must to keep cyber threats at bay.
The Critical Role of Segmentation
Segmentation is a must-have element to a Zero Trust approach, limiting the risk that comes with access and limiting access to the portions of information you can control. When embarking upon Zero Trust, shifting to a network segmentation philosophy has the quickest impact and the highest payoff, allowing you to protect systems in which security wasn’t traditionally a requirement.
When done right, segmentation shouldn’t impact productivity in order to enhance security. Neither should take a hit. Your systems should be protected without impacting day-to-day operations. Your employees, vendors and consumers should still have secure connectivity and access to desired information wherever and wherever it’s needed. Plus, segmentation should give you the peace of mind that your most critical infrastructure is secure without requiring network configuration changes, significant IT management oversight or dependence on external network infrastructure. Translation – it shouldn’t require heavy lifting or hard work.
Maintaining the integrity of your infrastructure is imperative to the livelihood of your business, your community and our economy. Minimizing the very real and advanced threats to critical systems, as well preventing the downtime of those systems, has to be a top priority. By taking advantage of segmentation, you can trust that you are taking critical steps needed to protect your infrastructure today from the looming threats of tomorrow — and help you stay off the growing list of ports weren’t as well prepared.