境外黑客通过SharePoint漏洞入侵美国核武器工厂
Foreign hackers breached a US nuclear weapons plant via SharePoint flaws

原始链接: https://www.csoonline.com/article/4074962/foreign-hackers-breached-a-us-nuclear-weapons-plant-via-sharepoint-flaws.html

最近的网络安全事件,例如堪萨斯城发生的事件,表明一个关键漏洞超出了典型的IT系统,扩展到操作技术(OT)——控制公用事业、制造业和环境控制的系统。这凸显了联邦政府在安全方法上的危险脱节。 虽然在实施针对IT网络的“零信任”安全方面已经取得进展(专注于验证每个用户和设备),但OT安全框架却滞后。目前,存在着独立的“扇形图”来概述IT和OT零信任实施的控制措施。 美国国防部正在制定一个OT特定的图表,最终目标是将两者整合,以实现全面的、全网络范围的零信任安全。这种统一的方法对于保护关键基础设施和解决IT和OT环境之间不同安全标准的更广泛系统性问题至关重要。

相关文章

原文

Such access, Sovada adds, could also affect distribution control systems that oversee quality assurance, or supervisory control and data acquisition (SCADA) systems that manage utilities, power, and environmental controls. “It’s broader than just an IT vulnerability,” she says.

The Kansas City incident highlights a systemic problem across the federal enterprise: the disconnect between IT and OT security practices. While the federal government has advanced its zero-trust roadmap for traditional IT networks, similar frameworks for operational environments have lagged, although recent developments point to progress on that front.

“There’s an IT fan chart that maps all of the controls for zero trust, segmentation, authentication, and identity management,” Sovada says. “But there’s also an OT fan chart being developed by the Department of Defense that will define comparable controls for zero trust in operational technology. The goal is to marry the two, so that zero trust becomes comprehensive across all network types.”

联系我们 contact @ memedata.com