Hidden dangers of remote management
In Secure remote management for ICS I have written and stated that you can have a secure remote management solution / setup for ICS environments.
Having a centralized, time based, source IP controlled, strong authenticated, monitored and logged solution is good and secure - but remains limited to your environment. Nevertheless, there are hidden dangers to any remote management solution which focuses solely on the internal environment.
I see the following potential dangers with any remote management connection to your OT environment (actually this is true for any environment).
- You don't know who is actually using the remote connection
- You don't know the security of the device used to connect to your environment
- You don't know the security of the network environment from where the connection is made
- keep a remote access token at your premises. Whenever remote access is needed by that particular person, they will have to call you to get the code.
- Use a Skype video call to verify that the person is who he claims to be (you can also use other video call solutions of course)
- Distribute company controlled devices to everybody in need of network based remote access (if that person needs to connect to several systems directly from the remote laptop for example) - however you have to be able to manage those distributed devices then
- Use a "remote access (virtual) desktop environment" through which all remote management traffic is to be done (in a controlled manner)
- Do not allow disk/folder/printer/clipboard sharing through the remote (virtual) desktop but use a secure file transfer solution and thoroughly scan every single file being transferred through this solution.
- Enforce the remote end to give proof of the security of the device
- You should certainly limit access to your network environment from remote locations, especially within ICS environments where consequences might be just that tiny bit bigger...
- You might also require the remote maintenance provider to give proof of their network setup and security
- If such proof can not be given, you might want to enforce them to let you perform a security assessment on their support environment