OTORIO Enables Integration of OT Assets in the Automotive Industry
The automotive industry needs to identify and mitigate security threats to their production line. They need to prevent cyber risks that stem from employee or third party accidents or from the malicious activity of threat actors. This way, they can keep their employees safe and prevent disruptions to business continuity.
OTORIO enables integration of OT assets in the automotive industry
A global automotive manufacturer was looking for ways to enable safe OT integrations of lines, machines, and assets into the production floor.
The client lacked the security personnel and knowledge to operate complex cyber security solutions to manage their supply chain risk. The process of validating the cybersecurity policies delayed the introduction of new machines into the production shop floor. Because there was no process to track changes in assets and configurations, critical actions to reduce the risk to the production floor were neglected. We saw that separate systems were handling different security aspects in the OT network and there was only a partial understanding of risk prioritization.
The customer, a manufacturer of commercial vehicles, needed to automate many of their manual security tasks. In addition, they wanted a reliable way to monitor third parties, who might introduce security threats to their production line and possibly increase their attack surface.
OTORIO was tasked with:
OTORIO promoted this organization’s business continuity with efficient offline cyber risks monitoring. The client saved time by replacing manual and less comprehensive verification processes with a quick and automated scanning process and gained the tools and strategies to monitor third party security issues.
OTORIO provided the client with spOT so they could scan devices as an integral part of their own security process. They now have unique and sensitive, asset stand-alone discovery, that provides full visibility on each asset within the machine. spOT also enables smart analytics, threat intelligence, known vulnerabilities discovery and remediation guidelines, and patch impact predictions. The tool automatically generates security and compliance reports and provides vendor/supplier statistics. They are now in a better position to comply with industry standards and enforce policies.
The client has control over the tested policies and the vulnerabilities that are checked, based on OTORIO’s threat intelligence research.
We enabled the client to gain tighter control of third-parties that are introduced to the production network. We gave guidelines for the validation and enforcement of configuration baselines. We supervised, verified, and collected vendor-based operational-related statistics. This was done with a simple setup that didn’t require any network changes.