SOLUTIONS
Preparing for your success, we
provide truly prominent OT services & solutions
Our table top service is a step-by-step method that demonstrates how a realistic attack may occur within your unique ICS environment based on your organization’s most concerning risks. Progression Systems services include collaboration between all stakeholders, including information technology (IT) and industrial control systems (ICS) security teams, to strengthen internal communication strategies and develop relationships.
OT Network Assessment
A successful cyberattack costs a lot of money. Cybersecurity has never been more important than today. If you want to protect your business from outside threats, you need a reliable internet security policy.
OT Network Protection
Today’s enterprises need a way to implement and maintain Zero Trust access for their many network types and an array of connecting things— campus computers, visitors’ devices, work-from-home laptops, IoT, OT and smart devices.
OT Network Management
Today’s modern enterprise environments are an Enterprise of Things that extends from campus to data center to cloud and no longer has a clearly defined perimeter. In other words, you can’t trust anyone.
SOLUTION
Our solution for all of
your OT needs, from start to end
Our table top service is a step-by-step method that demonstrates how a realistic attack may occur within your unique ICS environment based on your organization’s most concerning risks. Progression Systems services include collaboration between all stakeholders, including information technology (IT) and industrial control systems (ICS) security teams, to strengthen internal communication strategies and develop relationships.
OT Network Assessment
A successful cyberattack costs a lot of money. Cybersecurity has never been more important than today. If you want to protect your business from outside threats, you need a reliable internet security policy.
OT Architecture Review & Security Auditing
Evaluate Existing Security Program
• Assesses your organization’s existing cybersecurity posture,
including detection and protection capabilities
• Focuses on network architecture analysis, documentation review,
and staff interviews to improve your overall ICS security program
• Provides tactical and strategic recommendations to mature your
organization’s ICS security
OT Security Risk Assessment & Threat Modeling
Identify Risks to Industrial Assets
• Identifies vulnerabilities in hardware or software
• Provides visibility of risks to ICS environment
• Provides recommendations to mitigate risks
OT Networks & Devices Compliance Assessment
Compliance with major industry standards, including NERC CIP, NIST, the NIS Directive and ISA/IEC standards.
NERC CIP
NIST Cybersecurity Framework
NIST 800-53
20 CIS Controls
ISO Standards
ISA 99/IEC 62443
NIS Directive
NEI
C2M2
and more
OT Assets Discovery & Management
OT Asset Visibility & Management
OT asset inventory data collection
Manage configuration rules for ports & services, users, software, patches and firewall rules
Create, deploy, and audit policies across your OT environment
Get the contextual data you really need, including how important a device is, where it’s located, and who owns it
Establish visibility of assets on your OT network with a comprehensive architecture assessment
Immediately improve your security posture by understanding what contractors and vendors are doing in your environment
Regular reports of ICS assets and communications and any changes that occur
OT Network, Device and Application Vulnerability Assessment
Close Gaps In Network Defense
• Evaluates ICS environment’s existing protection, detection,
and response capabilities
• Identifies exploitable vulnerabilities in ICS environment
• Provides action items to strengthen security posture
Using real-time vulnerability data from a variety of sources, including NIST’s CVE database and ICS-CERT advisories. accurate software, hardware, firmware and patch levels. with a list of potential vulnerabilities associated with your asset inventory and whether a patch is available
OT Penetration Testing
Prevent Severe Breaches
• Leverages real-world attacker tactics, techniques, and procedures
(TTPs) gained from intelligence
• Identifies devices that could allow unauthorized access to critical
ICS assets
• Demonstrates how attackers can move through ICS environments
ATTACKS
Types of cyber attacks
on control systems
Typical ICS systems experience cyber attacks to compromise availability or safety. The primary objective of most attackers is to gain unauthorized access to steal information (intellectual property or engineering information) and the secondary objective is to have a physical impact. Attackers utilize information about an industrial system (hacked or public domain or research) to understand the process and conduct complex attacks. There is a higher risk of causing cyber-physical damage with increased threat to human life and environmental contamination. Loss of control includes unauthorized changes in control system logic to deviate from the intended outcome.
OT Network Protection
Today’s enterprises need a way to implement and maintain Zero Trust access for their many network types and an array of connecting things— campus computers, visitors’ devices, work-from-home laptops, IoT, OT and smart devices.
Applying OT Cyber security Best Practices
Progression Systems makes it easy for you to understand and adopt cybersecurity best practices such as those outlined by the NIST Cybersecurity Framework for Manufacturing, IEC 62443 and ISO 27000. For example, NIST outlines five security framework functions – identify, protect, detect, respond and recover, that should be incorporated into your operational processes to address cyber risk. Identification includes asset management and risk assessment, while detection includes continuous monitoring and insight into anomalies and events, among other functions. The Progression Systems solution makes it easy to apply best practices around multiple NIST framework functions. As examples, it automates the creation of an asset inventory, continuously monitors your OT/IoT network and ICS, and rapidly identifies vulnerabilities. It also proactively identifies cyber risks that threaten the security of your industrial control systems, including
Assets with vulnerabilities Bad configurations (NTP/DNS/DHCP, etc.)
Cleartext or weak passwords Corrupted OT packets
Device state change
IP conflicts
New connections to the enterprise network New connections to the Internet
New communications New nodes
Policy violations New remote access
Open ports on assets Non-responsive asset
Unauthorized cross level communication Unencrypted communications
OT Data Security
Ascertain the presence and operational state of encryption, obfuscation and other information security software
Enable real-time mapping of data flows between users, devices, services and applications
Understand data at rest and in motion state across the extended enterprise environment
OT Infrastructure, Endpoints, and Devices Security Design & Implementation
A visibility-first approach determines trust for the OT
Instant visualizations baseline real-time traffic
Design and simulate policies to assess potential business impact
Spans multi-domain, multi-use-case infrastructure
Enables enterprise-wide segmentation controls across diverse enforcement technologies
Continuously monitors and validates security policy compliance
Visualize east-west and north-south traffic across your hybrid cloud environment
Implement security controls through a unified policy interface
Agentless identification and inventory of all IP-connected devices in real time
Classification and continuous posture assessment of managed, unmanaged and unknown devices
Enforced least-privileged access throughout the network
Prevent unauthorized devices from joining the network
Remediate noncompliant assets natively, using network and host controls/segmentation and through third-party integrations
OT & IT Network Zero Trust Design (Access Control, Separation, Segmentation)
Today’s modern enterprise environments are an Enterprise of Things that extends from campus to data center to cloud and no longer has a clearly defined perimeter. In other words, you can’t trust anyone. A Zero Trust (ZT) architecture abolishes the idea of a trusted network inside a defined corporate perimeter. ZT mandates that enterprises create microperimeters of control around their sensitive data assets to gain visibility into how they use data across their ecosystem to win, serve, and retain customers.
OT Identity and access management Implementation
Protecting your resources while managing user access, complying with regulations and analyzing risk-based context to prevent threats is no easy feat.
Identity and Access Management (IAM) is rapidly becoming a priority for security professionals as they seek to mitigate the cost and reputational damage of compromised credentials. Identity and access management (IAM) is the practice of making sure that people and entities with digital identities have the right level of access to enterprise resources like networks and databases.
A zero-trust approach:
Establishes trust in every access request, no matter where it comes from
Secures access across your applications and network
Extends trust to support a modern enterprise across the distributed networ
RISK
Why the board should
be concerned
Lack of security for your OT systems is a source of significant risk. Effects can be extremely damaging, ranging from damage to your public image to intellectual property theft, to even injury or fatal accidents. It pays to be prepared.
OT Network Management
Today’s modern enterprise environments are an Enterprise of Things that extends from campus to data center to cloud and no longer has a clearly defined perimeter. In other words, you can’t trust anyone.
OT Security Monitoring and Threat Detection
Enhance Network Visibility
• Provide a full list of assets inside networks
• Identify the role of each components
• Identify new and inactive nodes
Enhance Industrial Visibility
• Provide a full list of PLCs in the network
• Identify process variables and changes to their values
• Analyze PLC traffic bandwidth usage
Asset Management
• Automated and up-to-date asset inventory
• Software and firmware versions
• Serial numbers
Enhance Operations - track actions and trigger events based on operational issues
• Reconnections
• Idle links
• Bandwidth limits exceeded
OT Cyber Security Intelligence
Bad actors are targeting converged OT/IoT environments with an increasing array of threats including malware, ransomware, and IoT botnets. Unfortunately, security teams often lack a consistent method of categorizing cyberattack activity directed towards OT/IoT environments, and understanding its significance.
When analysts detect potentially malicious activity, many rely on ad-hoc investigation and classification techniques to determine whether the activity is malicious, and how it relates to the overall attack chain.
Fortunately, MITRE created a MITRE ATT&CK Framework for ICS (based on its well-known MITRE ATT&CK Framework for Enterprise and Mobile) to help with this situation. The framework provides a fast and effective methodology for SOC analysts and incident responders to understand the significance of any behavior detected in OT environments. It categorizes malicious activity into 11 tactics that describe each step of the attack chain, from “Initial Access” to “Impact”. Within those 11 categories are approximately 100 separate techniques that include detailed descriptions of the specific threat represented by each technique.
OT Security Threat Hunting
The Progression Systems Threat Hunting Service helps you find undiscovered threats in your industrial control systems (ICS) networks and identify weaknesses in architecture, security controls, and policies and procedures to avoid
compromise.
OT Security Incident Responses Strategies
The Progression Systems Incident Response (IR) Service helps organizations prepare for, respond to, and recover from cyber incidents in industrial environments. Our team of experienced incident responders offers both rapid response availability and retainers to help ICS security personnel resolve crisis situations as quickly as possible.
OT Cyber Security Awareness
To minimize the risk against compromise that could lead to mis-operation or instability in the the OT environment, by requiring an appropriate level of personnel risk assessment, training, and security awareness, in support of protecting your business.
SOFTWARE
Stay tuned for our
new product
Our team is working hard to launch our new product which will hold the pillars of risk into asymptotically stable state.