Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Operational Technology Threats in Automotive: What You Need to Know

When it comes to automotive manufacturing, industrial control systems (ICS) may be the weak link inviting new types of attacks. Here’s what you need to know.

Auto manufacturing has become an increasingly popular target today for industrial cyberattacks. Since 2016, the number of annual incidents has increased by 605%, with incidents more than doubling in 2019 alone.1 One reason – advances and changes in OT have opened up new attack vectors and surfaces. 

Advances in OT invite new attacks

Legacy ICS in the automotive industry has proven to be durable, but this durability has become a security risk in today’s connected world. Most of the original operational technology (OT) networks servicing the automotive industry were not built with security in mind, simply because there was little security risk. They consist of equipment originally designed to be “air-gapped,” in other words totally isolated – electromagnetically, electronically and physically – from all networks, including local systems and the internet, especially those that weren't secure. However, the convergence of IT and OT, combined with the rapid adoption of IIoT, has yielded new attack vectors that were previously not possible. 

Cybersecurity challenges in auto manufacturing

Several conditions make auto industry ICS vulnerable:

  1. Modern auto assembly lines are connected to IT. Integration between IT and OT systems can create blind spots, which means a breach in one system can create a gateway into the other.
  2. Most car components and parts are made using digital technology.
  3. Many vehicle components are digitally manufactured outside the assembly plant by third-party manufacturers. This extends vulnerability beyond the assembly plant to all manufacturing facilities and the plants of all supply chain partners. They are susceptible to the same risks as the main auto manufacturing plant.
  4. Connected cars are always connected – and thus always vulnerable to attacks, making them potential targets even after the manufacturing process is completed.
  5. Assembly operations are turned over every model year, exposing them to new security threats.
  6. Auto manufacturing requires constant uptime. It’s estimated that 1 minute of downtime costs automotive manufacturers $22,000 per minute or $1.3 million per hour. Some estimates run as high as $50,000 per minute.2

Mitigate core risks through full OT visibility, security and control 

Full visibility

To mitigate OT risks, you need full visibility into all the operational assets that control sourcing, fabrication and assembly processes. Deep knowledge of all types of devices in the OT network – including patch levels, firmware versions and backplane information – is essential. Also, account for dormant devices not communicating regularly over the network. You can do this at your organization’s main location via an on-premises physical device. 

Be sure to establish OT security at all sites, so that remote locations have the same mitigation as the main campus. If sites are too small or remote to accommodate additional gear, consider deploying a cloud-based solution. In addition, live feeds can identify new security threats and enable a real-time OT security posture.

Vulnerability prioritization and control 

Due to the strict production schedule and cost of downtime in automotive manufacturing, it’s difficult to stop operations to apply patches when a vulnerability is discovered or even to perform routine maintenance. To ensure vulnerability windows are closed in a timely manner, an effective OT security system should perform regular inventory checks that provide details, including device model numbers, firmware versions, vulnerabilities, patch levels and more. These checks will pinpoint the devices that require maintenance when the plant can be idled and allow for targeted and prioritized operations procedures in the meantime.

Effective security and threat detection

When it comes to threat detection, the most effective process combines multiple detection engines:

  • Traffic mapping and traffic visualization: Identifies policy violations and alerts on instances in which a given policy (e.g., blacklisting, whitelisting) is violated.
  • Anomaly detection: Pinpoints traffic patterns outside regular network operation.
  • Signature-based detection: Identifies published threats and leverages crowd-sourced alerts of previously unidentified threats.

IT/OT cybersecurity solutions can help you mitigate risk

Want to learn more about how you can overcome OT security challenges? Tenable.ot (powered by Indegy) can help by providing capabilities such as:

  • A multidetection engine that employs both passive detection and patented active querying to detect any threat to your network – on your main campus and remote sites
  • An up-to-date and detailed inventory list that helps identify, manage and prioritize vulnerabilities and plan maintenance schedules
  • Sitewide audit information that can speed incident response and demonstrate proactive regulatory compliance

Download the solution brief

1. 2020 Automotive Cybersecurity Report, Upstream Security
2. True Cost of Factory Downtime: How Downtime Affects Productivity,” Simutech, 2019

Related Articles

Are You Vulnerable to the Latest Exploits?

Enter your email to receive the latest cyber exposure alerts in your inbox.

tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable.io Vulnerability Management trial also includes Tenable Lumin, Tenable.io Web Application Scanning and Tenable.cs Cloud Security.

tenable.io BUY

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today.

NEW - Nessus Expert Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Professional Trial.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable.io Vulnerability Management trial also includes Tenable Lumin, Tenable.io Web Application Scanning and Tenable.cs Cloud Security.

Tenable.io BUY

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now

Try Tenable.io Web Application Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web Application Scanning trial also includes Tenable.io Vulnerability Management, Tenable Lumin and Tenable.cs Cloud Security.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable.io Container Security

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Try Tenable Lumin

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable.io Vulnerability Management, Tenable.io Web Application Scanning and Tenable.cs Cloud Security.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable.cs

Enjoy full access to detect and fix cloud infrastructure misconfigurations and view runtime vulnerabilities. Sign up for your free trial now. To learn more about the trial process click here.

Your Tenable.cs Cloud Security trial also includes Tenable.io Vulnerability Management, Tenable Lumin and Tenable.io Web Application Scanning.

Contact a Sales Rep to Buy Tenable.cs

Contact a Sales Representative to learn more about Tenable.cs Cloud Security and see how easy it is to onboard your cloud accounts and get visibility into both cloud misconfigurations and vulnerabilities within minutes.

Try Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training