The six-step guide to stronger cybersecurity for life sciences manufacturing

  • August 08, 2023
1249942-SXA-blog-image-GettyImages-1320823462-450x250.jpg

In the highly regulated life sciences industry, any kind of security breach poses a significant risk. Life sciences companies have several important physical and technical areas to protect, including manufacturing plants, laboratory equipment, critical clinical data, product specifications, and intellectual property such as scientific know-how and trade secrets.

External disruptions — pandemics, geopolitical instability, supply chain uncertainty and chronic labor and skills shortages — are some of the many problems life sciences organizations worry about. But the potential for internal disruption is growing rapidly, too. This is because IT and operational technology (OT) departments in manufacturing businesses are often poorly aligned, resulting in increased cybersecurity vulnerabilities.

This misalignment is an unintended byproduct of industry evolution. To improve productivity and efficiency, life sciences manufacturers are increasingly integrating automation into their plants, moving functions to the cloud and adopting Industry 4.0 principles. Given the pervasive digitalization of plant operations, OT is becoming more reliant on IT functions to support its productivity.

Leaders question how and where to start securing the network. Based on the industry experience of the NTT DATA life sciences team, here's a high-level framework with six essential steps that every life sciences manufacturing company can use as a roadmap for improving their security:

Step 1: Establish governance and steering
Engagement governance plays a crucial role in achieving trusted, predictable and reliable service partnerships, especially in bridging the gap between IT and OT. The governance framework could include predefined processes characterized by regular and open communication, clear and enforced processes and well-defined roles and responsibilities to reduce risk and prevent issues. This model is typically divided into strategic, engagement and operational levels and involves stakeholders at all levels.

Step 2: Conduct an audit of assets and network visibility
Asset discovery and network visibility are the key fundamental functions to a secure posture. The reasoning is simple: “You cannot protect what you cannot see.” This step should provide insights into a detailed inventory of the assets, including their configuration status and current version, and sketch out connections mapping between assets and virtual network segment zones.

This enables life sciences organizations to validate asset lifecycles on retired and decommissioned assets, as well as identify hidden rogue assets that have never been listed on the purchased asset spreadsheet. Additionally, it helps the team segment the network for a north-south protection based on assets.

Step 3: Create a customized set of rules
Effective industrial and OT security requires the organization to establish policies and procedures that match the specific environment. A typical OT environment in any life sciences manufacturing operations has a diverse set of systems and are largely heterogenous. Consequently, OT environments need multiple, and probably customized, sets of rules. Tailoring policies and procedures to match the specific environment is crucial for an efficient security strategy.

Step 4: Conduct training for compliance and benchmarks
Promoting OT security awareness and providing training at various skill levels fosters a strong security culture. Encouraging team members to obtain professional certifications, as well as taking a deep dive into the standards and benchmarks such as those outlined in NIST’s initial public draft of its Special Publication (SP) 800-82r3, Guide to Operational Technology (OT) Security, helps create a more efficient and resilient workforce while bolstering the security of OT systems throughout the company.

Step 5: Secure access by hardening and patching
Implementing robust access control and authentication mechanisms to prevent unauthorized access is a key measure. By adopting agent-based and real-time agentless profiling and management tools on OT endpoints, coupled with additional contextual data (like asset location, criticality, owner), OT security practitioners can apply laser-like focus and filtering of information to create relevant data. This allows for accurate, efficient and consistent application of patching and other compensating controls.

The rich endpoint data coupled with metadata such as operational impact as well as third-party data (such as vulnerabilities, backup, patch and unblocked data), gives OT practitioners context specific to their exact assets. It also helps them implement firewalls and access control to limit network access to only authorized personnel.

Step 6: Implement a Zero Trust policy
According to NIST’s Special Publication (SP) – 800-207, “Zero Trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet) or based on asset ownership (enterprise or personally owned).”

Zero Trust should be a way of operation and practical. Zero Trust means the users and devices in the IT and OT environments may be potential threats or are vulnerable and at risk of a cybersecurity incident. Hence it's needed to check the authenticity of the users and validate the devices they are using by verifying their security posture on a continuous basis.

Zero Trust can be summarized into three pillars which, when combined, yield an in-depth defensive strategy that mitigates risks and limits vulnerabilities to help avoid exploiting potential:

  • Never trust, always verify
  • Continuous validation of all actions and data flows
  • Grant the least amount of privileges

A roadmap to cybersecurity

This six-step guide serves as a roadmap for life sciences companies to bolster their manufacturing cybersecurity. Establishing governance, auditing assets, creating customized rules, conducting training, securing access and implementing a Zero Trust policy can help any organization build a strong foundation to mitigate risks effectively.

By focusing on cybersecurity fundamentals and embracing industry best practices, life sciences manufacturing operations can safeguard their assets, data and intellectual property to create a positive impact on their bottom line.

Subscribe to our blog

ribbon-logo-dark
Phani Chaganti.jpg
Phani Chaganti

Phani Chaganti is Managing Director and Head of OT/IoT/Mobility Security at NTT DATA. He’s an experienced professional passionate in applying technology to support business transformation in a highly dynamic industry eco-system. Phani is a distinguished leader, who brings more than 20 years of experience bringing wireless networks and cybersecurity together. Phani is client-obsessed with the ability to change perspective of security and networks through strategic innovation, orchestration, and importantly fostering cross-functional trust. With a master’s degree in electrical engineering and a MBA, Phani understands and strives to solve the executive’s conundrum by connecting business processes, technology, and people. Hailing from a strong and niche wireless and security background, his experience spans across multiple industry segments including Automotive, Industrial, Consumer Durables, Telecom, Pharma, Med Devices and Hi Tech.

Empower Teams

As we move into 2022 and beyond, security leaders must empower their teams to have the flexibility and awareness to tackle challenges in this rapidly changing environment. CISOs can never take their eye off the technologies that dominate our field, but it’s just as essential to continue to nurture the people and processes to get the most out of those new technologies.

Related Blog Posts