Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 블로그

구독

고급 OT 보안으로 국방성 건물 관리 시스템 보호

고급 OT 보안으로 국방성 건물 관리 시스템 보호

The cyberthreats to the U.S. Department of Defense’s building management systems (BMS) have grown exponentially due to the DoD's adoption of smart technologies such as IoT. These smart technologies are designed to improve the monitoring and maintenance of these systems, but they also create new attack surfaces. Here's how the DoD can use operational technology (OT) security to mitigate BMS cyberthreats through enhanced visibility, threat detections and automated risk prioritization. 

Building management systems (BMS) have become increasingly essential for the efficient functioning of U.S. military installations. These systems control and monitor a building’s mechanical and electrical equipment, including heating, ventilation, air conditioning (HVAC), fire safety and access control.

The scale of BMS deployments is particularly immense at the U.S. Department of Defense. The DoD noted in its Annual Energy Performance, Resilience and Readiness Report in 2022 that it spent $3.96 billion to power, heat and cool its buildings. In addition there are more than 500 DoD installations worldwide, with over 500,000 buildings and structures, covering millions of acres of land in the U.S, U.S territories and over 30 other countries. 

Operational technology (OT) – a broader range of technologies used to monitor and control physical processes and operations — is being increasingly deployed and connected to BMS by the DoD, making BMS a key component of OT environments in the DoD across bases and facilities. Unfortunately, this growing use of OT significantly increases the attack surface and risk for BMS, potentially putting DoD installations at heightened risk of cyberattacks. 

BMS challenges and security risks

BMS adoption brings challenges, especially when legacy systems that lack current cybersecurity capabilities are integrated with modern networks. Further complicating the picture is the integration of smart devices and internet of things (IoT) sensors with BMS, which makes BMS more vulnerable to attacks. Additionally, the unique protocols used by OT in BMS lower asset visibility and increase the risk of security breaches.

The challenges are real. A report by Kaspersky ICS CERT revealed that, in 2022, nearly half (42%) of computers in building automation infrastructures faced cyberthreats.

Where OT and BMS intersect

The integration of OT smart technologies in BMS has revolutionized the way DoD facilities operate, playing a big role in the wellbeing and safety of personnel and the security of critical data and infrastructure. Smart technologies in these BMS include:

  • Automated climate control: Smart climate control systems precisely manage temperature and air quality. They provide optimal working conditions for in-office personnel and protect sensitive equipment from environmental damage. When climate control isn’t working properly, data centers can overheat and security systems can fail.
  • Advanced security surveillance: BMS include sophisticated surveillance systems that go beyond traditional video monitoring. These can include motion detectors, thermal imaging and facial recognition technologies.
  • Energy management and sustainability: By optimizing the use of resources like electricity and water, these systems not only reduce operational costs but also minimize military installations’ environmental impact.
  • Access control systems: BMS have advanced access control mechanisms, such as biometric scanners and RFID technology, to manage entry into secure areas.
  • Emergency response and fire safety: Integrated fire detection and suppression systems within the BMS framework play a critical role in emergency response. Smart sensors can detect smoke or heat anomalies and trigger automated responses.
  • Infrastructure monitoring and maintenance: BMS also includes tools for monitoring the structural health of buildings and other infrastructure. Using sensors and IoT technology, these systems can detect potential issues like water leaks or structural weaknesses before they become critical problems.
  • Communication systems integration: BMS can help enable efficient coordination and dissemination of information across the facility. This is particularly important in scenarios where quick communication and rapid response are necessary, such as coordinating evacuation plans during emergencies or issuing alerts about security threats.

Implementing BMS OT for DoD

The DoD needs to secure its BMS against evolving OT cybersecurity threats. To help make that possible, they need a solution that provides:

  • Enhanced visibility into BMS components for accurate and real-time visibility into anomalies or vulnerabilities.
  • Robust threat detection and response mechanisms for quick identification of a range of cybersecurity threats, from common malware to sophisticated zero-day attacks.
  • Proactive maintenance and situational awareness  through continuous monitoring of system parameters, such as firmware versions, user access levels and network traffic.
  • Prioritization and management of vulnerabilities, giving you the ability to assess and prioritize vulnerabilities based on their severity and potential impact on the BMS.
  • Seamless integration with existing security systems and frameworks through a technology partnership program that creates a unified and cohesive security approach.
  • Automated policy visibility and compliance to reduce the likelihood of human error and establishment of consistent application of security policies across the BMS infrastructure.
  • Support for segmented enclaves to enhance visibility of multi-layer networks into a holistic interface.

Securing the future of DoD operations

Tenable OT Security is designed to protect BMS in DoD agencies and commercial organizations. It helps maintain operational integrity and protect against cyberthreats. It also enables the secure implementation of advanced technologies like artificial intelligence (AI) and IoT within BMS, ensuring these integrations don't compromise security. Furthermore, Tenable OT Security can help streamline security policy enforcement across various BMS environments, automating and standardizing policy applications to reduce errors and complexity. 

Tenable OT security seamlessly integrates with Tenable Security Center+, which powers the DoD-mandated Assured Compliance and Assessment Solution (ACAS) for vulnerability management. This integration strengthens the DoD's overall BMS security architecture and provides a single pane of glass view for IT and OT vulnerabilities, while also eliminating the need to add more tools to your tech stack. By adopting Tenable OT Security, the DoD can significantly enhance the efficiency and security of its BMS, safeguarding critical military infrastructure and providing uninterrupted operations. 

To discover how Tenable can help you secure your BMS and OT environments in the DoD, reach out to our sales team for a demo or delve into the additional assets below.

This is the third blog in our six-part blog series on OT in the DoD. Below are links to other blogs in the series:

자세히 알아보기

관련 기사

도움이 되는 사이버 보안 뉴스

이메일을 입력하여 Tenable 전문가에게서 적시에 알림을 받고 보안 참고 자료를 놓치지 마십시오.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

100 자산

구독 옵션 선택:

지금 구매

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

100 자산

구독 옵션 선택:

지금 구매

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

100 자산

구독 옵션 선택:

지금 구매

Tenable Web App Scanning 사용해보기

Tenable One - 위험 노출 관리 플랫폼의 일부분으로 최근의 애플리케이션을 위해 설계한 최신 웹 애플리케이션 제공 전체 기능에 액세스하십시오. 많은 수작업이나 중요한 웹 애플리케이션 중단 없이, 높은 정확도로 전체 온라인 포트폴리오의 취약성을 안전하게 스캔합니다. 지금 등록하십시오.

Tenable Tenable Web App Scanning 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Web App Scanning 구입

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

5 FQDN

$3,578

지금 구매

Tenable Lumin 사용해 보기

Tenable Lumin으로 위험 노출 관리를 시각화하여 파악하고 시간에 걸쳐 위험 감소를 추적하고 유사한 조직과 대비하여 벤치마킹하십시오.

Tenable Lumin 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Lumin 구매

영업 담당자에게 문의하여 어떻게 Tenable Lumin이 전체 조직에 대한 통찰을 얻고 사이버 위험을 관리하는 도움이 되는지 알아보십시오.

무료로 Tenable Nessus Professional 사용해보기

7일 동안 무료

Tenable Nessus는 현재 구입 가능한 가장 종합적인 취약성 스캐너입니다.

신규 - Tenable Nessus Expert
지금 사용 가능

Nessus Expert는 외부 공격 표면 스캔닝과 같은 더 많은 기능 및 도메인을 추가하고 클라우드 인프라를 스캔하는 기능을 추가합니다. 여기를 클릭하여 Nessus Expert를 사용해보십시오.

아래 양식을 작성하여 Nessus Pro 평가판을 사용해보십시오.

Tenable Nessus Professional 구입

Tenable Nessus는 현재 구입 가능한 가장 종합적인 취약성 스캐너입니다. Tenable Nessus Professional은 취약성 스캔 절차를 자동화하고 컴플라이언스 주기의 시간을 절감하고 IT 팀과 참여할 수 있도록 합니다.

여러 해 라이선스를 구매하여 절감하십시오. 연중무휴 전화, 커뮤니티 및 채팅 지원에 액세스하려면 Advanced 지원을 추가하십시오.

라이선스 선택

여러 해 라이선스를 구매하여 절감하십시오.

지원 및 교육 추가

무료로 Tenable Nessus Expert 사용해보기

7일간 무료

최신 공격 표면을 방어하기 위해 구축된 Nessus Expert를 사용하면 IT부터 클라우드까지, 더 많은 것을 모니터링하고 조직을 취약성으로부터 보호할 수 있습니다.

이미 Tenable Nessus Professional을 보유하고 계십니까?
7일간 Nessus Expert로 무료 업그레이드하십시오.

Tenable Nessus Expert 구입

최신 공격 표면을 방어하기 위해 구축된 Nessus Expert를 사용하면 IT부터 클라우드까지, 더 많은 것을 모니터링하고 조직을 취약성으로부터 보호할 수 있습니다.

라이선스 선택

여러 해 라이선스를 구매하여 비용을 더 절감하십시오.

지원 및 교육 추가