Russia’s Kaspersky unveils enhanced industrial cyber security solution to protect OT-IT converged space
Digital Edge Bureau 14 Oct, 2024 0 comment(s)In response to the increased challenges and escalating threats facing operational technologies (OT) and critical infrastructure, Kaspersky has enhanced its Kaspersky Industrial CyberSecurity (KICS), a native XDR Platform for industrial enterprises, and streamlined Managed Detection and Response (MDR) for Industrial Control Systems (ICS), a service that helps to perform key SOC functions for organizations that may lack dedicated personnel.
The new reality for owners and operators of industrial infrastructures is shaped by IT-OT convergence, high regulatory requirements, and the rise of cyberattacks in the industrial sector. According to Kaspersky ICS CERT, malicious objects were blocked on almost one quarter (23.5 percent) of ICS computers in the second half of 2024.
The new solution is certified to protect OT and critical infrastructure equipment and networks from cyber-initiated threats. Designed to comprehensively secure the industrial automation and control systems, it consists of KICS for Nodes, which focuses on endpoints in distributed control systems, and KICS for Networks, which monitors automation system network security and protects automation system equipment from network-initiated threats.
Andrey Strelkov, Head of the Industrial Cybersecurity Product Line at Kaspersky, said, “We’ve always been aiming to help customers build more reliable and converged protection of their IT and OT assets. With the new KICS (Kaspersky Industrial CyberSecurity) release, we’ve introduced new features that can help to strengthen critical infrastructure, drastically improve visibility and control over assets in industrial networks.”
“We streamlined our Managed Detection and Response (MDR) service, enabling businesses to engage with experts from our internal SOC to analyze incidents, prevent attacks, and receive relevant recommendations,” comments Andrey Strelkov, Head of the Industrial Cybersecurity Product Line at Kaspersky,” added Strelkov.
This highlights the persistent and significant level of threats, underscoring the need for companies to prioritize their cybersecurity strategy and implement comprehensive, reliable solutions to protect all their assets and processes. To meet this growing demand, Kaspersky has tailored its key solutions specifically designed to safeguard industrial companies.
New enhanced capabilities of Kaspersky Industrial CyberSecurity (KICS)
1
The KICS enables security settings inspection and change monitoring through agent-based or agentless polling for Windows and Linux hosts, network devices, and PLCs to collect configurations. A predefined set of configurations is provided out of the box for all supported asset types and can be collected manually or in scheduled mode. The accumulated configuration archive is always available for review, and can be used to monitor change and analyze identified discrepancies.
2
The KICS for Networks now supports the reception and aggregation of additional types of assets including installed software, patches, local users and discovered executables. When KICS for Nodes is installed on a host (both in Windows and Linux), it automatically transmits this information to KICS for Networks with periodic updates. This provides automatic change management and alerts when deviations are detected. The aggregated lists of software and users greatly simplify the incident investigation process, allowing security professionals to easily identify all hosts with suspicious executables or find specific user actions in registered events.
3
The KICS provides a topology map that displays real-time information about asset connections and manages security state changes for devices without installed agents, such as computers and switches. Active polling tasks now support scheduling, to automate the creation of this map and keep connection data, asset attributes and security settings up to date. Each scheduled run is supplemented with a detailed report, including query results and any identified issues.
4
The KICS for Networks now supports the import of SCD (substation configuration description) files[1] to analyze configurations, the extraction of asset attributes, and the review of IEC 61850 settings. It also provides a report of identified errors and misconfigurations. By monitoring substation networks based on reference configurations it enables the detection of unauthorized network connections, anomalous activity, and failures or errors in IEC 61850 communications. This indicates improper operation or equipment misconfigurations.
5
The updated KICS provides a new architecture for geographically distributed infrastructures, enabling support for up to 100 monitoring points on a single KICS for Networks node. When KICS for Networks sensors cannot be placed at remote sites due to the equipment size or connectivity limits, traffic from remote sites can be transferred directly to a KICS for Networks node located at a central office. SD-WAN technologies provide unlimited options to establish new software-defined wide area networks between company branches allowing industrial traffic copies to be delivered from the source switch to the monitoring node.
6
The KICS Portable Scanner expands host inspection capabilities with new scanning technologies such as host inventory, vulnerability, compliance and security settings inspection scans, and traffic capturing, which can also be configured to a classic anti-virus scan on the USB drive writing stage. The portable Scanner now also supports anti-malware scanning of Windows 2000 SP4 hosts.
7
Another update concerns Kaspersky Managed Detection and Response, a service that supports industrial companies experiencing staff shortages or skill gaps. Enterprises can now outsource the key cybersecurity functions such as threat monitoring, detection, threat hunting, and incident analysis to Kaspersky experts. This provides organizations with access to necessary expertise and reliable cybersecurity solutions. The service also allows the organizations to effectively counter the growing volume and complexity of cyberattacks on critical infrastructure, and effectively allows them to optimize their internal resources, when these resources are limited.