homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured

    Get a Free Hour of SANS Training

    Free Course Demos

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured: Solutions for Emerging Risks

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. Defending Against OT Ransomware in Industrial Control Systems
Mike_Hoffman_-_Headshot_-_370x370.png
Mike Hoffman

Defending Against OT Ransomware in Industrial Control Systems

Leveraging ICS612 and the SANS Five Critical Cybersecurity Controls

August 30, 2023

Ransomware attacks against organizations are now one of the primary methods criminal and adversarial groups leverage to bring organizations, cities, and governments to their knees. The method and reasons behind the attacks vary. Still, the impact is often the same: potentially sensitive data is exfiltrated for financial or intellectual gain, and IT systems are encrypted and rendered unusable. Industrial Control System/Operational Technology (ICS/OT) servers and workstations are not immune to these styles of attacks as they use operating systems containing similar vulnerabilities to their IT counterparts but are often significantly lacking in patches or other forms of mitigations.

Critical Infrastructure Sectors

The US Cybersecurity and Infrastructure Security Agency (CISA) lists 16 Critical Infrastructure Sectors of primary concern for national economic security or public health and safety. Listed among these is the Critical Manufacturing sector, which comprises most of the goods we enjoy, from the clothes we wear and cars we drive to the materials used to build our homes. This sector, which we often take for granted but rely on for our daily existence, is often overlooked from a cybersecurity perspective. The Dragos 2022 Year in Review report revealed that 72% of Dragos tracked ransomware incidents targeted the manufacturing sector.

Figure 1: Dragos 2022 YIR Tracked Ransomware Attacks

Ransomware trends are increasing every year, and we can expect to see further attacks against the manufacturing sectors and other ICS/OT areas. However, all hope is not lost, as asset owners can take a defensible position and be ready when their plant moves into the adversary's crosshairs. To defend against these attacks, owners and operators must understand how to:

  1. Respond to an attack,
  2. Design and deploy defensible architecture,
  3. Monitor networks,
  4. Secure remote access connections, and
  5. Ensure key vulnerabilities are remediated.

These five controls are detailed further in Figure 2 below and in the Five ICS Cybersecurity Critical Controls White Paper and subsequent Webcasts.

Figure 2: SANS Five Critical Cybersecurity Controls

In SANS ICS612: ICS Cybersecurity In-Depth, we train you and your organization's workforce to consider the ICS/OT environment from the ground up, leveraging many of the elements discussed in the Five Critical Cybersecurity Controls white paper while taking a more nuanced approach to certain critical topics. The course focuses on understanding the physical machine, or the process, first considering how it operates and developing an understanding of how the controllers, servers, workstations, and other systems interact with the plant floor. This information is critical to building defensible Programmable Logic Controller (PLC) programs, architectures, remote access solutions, network monitoring, and backup/restore capabilities, for example. As the course author Jason Dely often stresses, adversaries don't attack PLCs; they leverage the PLCs to attack the physical process. Thus, understanding how the machines and processes work is the first step to securing the ICS/OT environment.

Defensible Architecture

Circling back to ransomware, we often find that it and other forms of malware enter the ICS/OT environment via the IT/OT interconnect, vendor or third-party connections, or portable devices (also known as transient cyber assets). These points of entry require both technical and administrative controls to be put in place to protect from and detect against malicious behaviors. These common entry points into the ICS/OT environment highlight the importance of the fourth critical cybersecurity control, defensible architecture. In ICS612, we provide labs that help you understand data flows and recommend ways to architect the environment from the IT/OT boundary, establishing a Demilitarized Zone (DMZ) and then understanding how the manufacturing lines function and communicate between other lines, as shown in Figure 3.

Figure 3: Understanding and Securing Data Flows

Firewalls are a common security control leveraged in OT to enforce zones and conduits in an environment to restrict IT/OT traffic. They perform the necessary function of inspecting traffic across the OSI layers but often fail to understand OT protocols at the application layer. They also introduce points of failure and latency in the communication pathway. All these aspects are covered in lectures and hands-on labs in the course. For instance, PLC-to-PLC communication in manufacturing often requires very high-speed communication, and latency introduced by placing a firewall between the PLCs can cause operational disruptions, especially in high-speed conveyor and robotics applications. As students also find out in an adversary in the middle attack lab, some protocols, such as the Common Industrial Protocol (CIP) leveraged by Rockwell Controllers, are almost impossible to create Application Layer restrictions for as the data blob changes upon transaction. Commonly known service object fields can be parsed and understood, but the data elements themselves cannot.

Securing the OT edge is a crucial area the course emphasizes. It is vital when considering adversarial attack paths and ransomware placement. However, the dependency between IT and OT systems is significant, especially in manufacturing, where Manufacturing Execution Systems (MESs) and Enterprise Resource Planning (ERP) systems are leveraged. ICS612 covers these critical systems, and Figure 4 illustrates how ERP and MES systems are logically placed in a manufacturing facility. The MES forms the central nervous systems of the plant floor, pulling operational data from SCADA systems or directly from controllers and then updating controllers with new product run specifications, recipes, and tracking products throughout the manufacturing process. The ERP is the business side of manufacturing and performs order processing, invoicing, inventory, forecasting, and many other business functions necessary to run the plant.

Figure 4: MES and ERP in Manufacturing

Incident Response

In the case of a ransomware event where the incident response plan is activated, one of the first actions is to scope the incident and begin to contain the incident. However, containment often consists of segmenting the IT/OT boundary. In many ICS/OT environments, this action could stop product production as MES systems are tightly integrated between IT and OT. Without the MES, products may not be tracked, labels not printed, and inventory unknown. Thus, understanding these dependencies before an incident is critical, and as I am teaching ICS612, it is one of the many areas I focus on with the class.

Therefore, developing an incident response plan according to a realistic scenario facing your industry, such as ransomware, is a critical first step that asset owners and operators should undertake. As control one of the five critical controls, it's the most important control to have (albeit also one of the easiest controls to implement) because, in this adversary landscape, it's not if but when an incident will happen. Having an IR plan is good, but testing the plan with a Tabletop Exercise (TTX) is equally essential to understand if the document is fit for purpose and if the response teams know their roles, are trained, and are ready to respond from an organizational and technical perspective.

ICS612 students learn the importance of training for an incident by taking backups, practicing system containment, looking for signs of malicious tampering and system abuse, and restoring systems back to a known good operational state. When ransomware strikes, it can be devastating for companies to respond to, especially if they have not trained for the scenario. At this point, it's too late to understand if backup processes are weak or if reliance on always-connected backup systems proved in error when it becomes the primary adversary target before going after the networked attached hosts. These topics and more are brought to life when students try to recover their compromised PLCs and HMIs during the Covfefe Down exercise. During the day five capstone event, students harness all aspects of the course lectures and labs and engage in a hands-on cyber-physical exercise to restore the Covfefe plant for Java production.

Secure Remote Access

Apart from securing the IT/OT boundary is developing the infrastructure and capabilities to establish a micro-segmented DMZ. The DMZ is more of a logical construct that allows services, such as remote access, for owners and third parties to leverage. Secure Remote Access is the fourth critical cybersecurity control and a common pathway for adversaries.

When not teaching for SANS, I am a Technical Consultant Lead for Dragos. A frequent finding I come across in customers' environments is poorly implemented remote access solutions. In ICS612, there is a remote access lecture as well as a lab to aid in knowledge retention. The lab leverages the Windows Remote Access server to provide students with an example of setting up a remote access solution at their company. Many other vendor solutions exist for remote access, and I recommend their consideration. Still, the remote access cybersecurity control can be implemented on a Windows server - of course, with multiple configuration steps and access to a certificate authority.

ICS Network Monitoring and Visibility

Day four of ICS612 covers the all-important topic of host, network device, and network traffic visibility, which is the third critical cybersecurity control. As I teach this section, I often repeat the phrase from Dr. Eric Cole, which I first heard while taking SEC401 many years ago, that "Prevention is ideal, but detection is a must." For ICS/OT security, this phrase couldn't be more accurate. Monitoring host logs and network visibility across the OT environment is critical to understanding if adversarial activity is in your environment and responding if detection occurs.

Lecture materials and labs cover using both open-source tools and paid vendor tools to allow students to see the difference between them but also to allow those with varying Opex and Capex budgets to deploy monitoring solutions back at their places of work. Ransomware implantation detection is much more obtainable by monitoring for North-South communications across the IT/OT boundary and collecting host logs across the DMZ and Layer 3 Purdue model systems. However, monitoring doesn't stop here.

Monitoring network communication across the East-West plane is also critical where workstation-to-controller or server-to-controller communications occur. Additionally, the host logs from these systems can be forwarded using native Windows Event Forwarding to a Windows Event Collector server and sent to an IT/OT Security Information and Event Manager (SIEM) for SOC analysts to monitor. My white paper, Gaining Endpoint Log Visibility in ICS Environments, further delves into the details of Windows Event Forwarding.

Vulnerability Management

History shows even the most defended castles can eventually be breached due to vulnerabilities found within the walls or internal layout of the fortress. ICS/OT environments are no different, and vulnerabilities found in devices at the perimeter and interior need to be understood and dealt with.

This brings us to the fifth critical cybersecurity control of key vulnerability management. For ICS612, we discuss strategies for dealing with vulnerabilities, such as considering the edge first, where high IT/OT interconnectivity occurs, and then looking further down in the Purdue levels to consider Crown Jewels and other critical systems.

As shown in Table 1 below, rolling out patches or other mitigating means should be done using vendor-approved patches, per allowed operational and maintenance windows, and at a staged rollout, such as patching one set of a redundant server pair or half of the operator consoles at a time.

Table 1: Example ICS/OT Patch Strategy

AssetPatching PriorityDays After Vendor ApprovalWeekday UpdateWeekend Update
HMI Server114No

Yes

Engineering Workstation560YesYes
Historian130NoYes
QC Software Server445YesYes
Industrial Switches10180NoYes
Industrial Firewall130NoYes

This is due to the likelihood, albeit low, that a patch may disrupt an ICS/OT application that could affect the visibility or control of the plant floor. Many adversaries leverage unpatched and vulnerable systems to deploy ransomware. At control number five, vulnerability management is one of the areas that companies must continuously focus on. However, it's important to consider that this should not be the primary focus area.

Wrapping up

Ransomware will continue to be effective if we let our guard down and not defend our own. A well-defended castle is not easily breached, and we should leverage the SANS Five Critical Cybersecurity Controls to create a defensive posture against such adversary Tactics, Techniques, and Procedures (TTPs).

SANS ICS612 will allow you and your team to consider the entire ICS/OT security stack, from the process to controllers, servers, and workstations to remote access, logging and monitoring, backup and restore, and beyond.

Continuous learning is a responsibility for all of us employed in the vital role of defending critical infrastructure, and ICS612 provides an exceptional opportunity to take your knowledge and skills to the next level.

I look forward to seeing you in class.

To learn more about how to effectively defend your industrial environments from ransomware and leverage the Five ICS Cybersecurity Critical Controls, download the SANS Strategy Guide: ICS is the Business. This guide provides actionable insights and best practices to fortify your defenses and ensure operational resilience.

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Recommended Training

  • SEC510: Cloud Security Controls and Mitigations™
  • FOR518: Mac and iOS Forensic Analysis and Incident Response™
  • SEC402: Cybersecurity Writing: Hack the Reader™

Tags:
  • Cybersecurity and IT Essentials
  • Industrial Control Systems Security

Related Content

Blog
N2C - Blog - A Beginner’s Guide to Cybersecurity_340 x 340.jpg
Cybersecurity and IT Essentials
December 4, 2024
A Beginner’s Guide to Cybersecurity: Start with the ABCs
Get up to speed on industry’s terms and meanings to jumpstart your cybersecurity career.
SANS_social_88x82.jpg
SANS Institute
read more
Blog
Cybersecurity and IT Essentials
November 26, 2024
The 21 Best Cybersecurity Podcasts for 2025
Whether you're a security professional or just someone who wants to learn more about cybersecurity, these podcasts are sure to keep you informed.
Emily_Neuens_370x370.png
Emily Neuens
read more
Blog
ICS - Blog - The 2024 State of ICS_OT Cybersecurity- Our Past and Our Future_340 x 340.jpg
Industrial Control Systems Security
October 16, 2024
The 2024 State of ICS/OT Cybersecurity: Our Past and Our Future
The 2024 State of ICS/OT report shows our industry’s growth since 2019 and offers insight into how we may improve going into 2029.
370x370_Jason-D-Christopher.jpg
Jason D. Christopher
read more
  • Company
  • Mission
  • Instructors
  • About
  • FAQ
  • Press
  • Contact Us
  • Careers
  • Policies
  • Training Programs
  • Work Study
  • Academies & Scholarships
  • Public Sector Partnerships
  • Law Enforcement
  • SkillsFuture Singapore
  • Degree Programs
  • Get Involved
  • Join the Community
  • Become an Instructor
  • Become a Sponsor
  • Speak at a Summit
  • Join the CISO Network
  • Award Programs
  • Partner Portal
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
© 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn