Protecting the Systems that Sustain Us: Securing Critical Infrastructure During Cybersecurity Awareness Month
嗯,用户让我总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。 首先,我需要通读整篇文章,抓住主要信息。文章主要讲的是Critical Infrastructure(关键基础设施)的网络安全问题。提到了CISA的关注点,以及IT和OT融合带来的风险。还有具体的攻击案例,比如挪威的水电站和美国明尼阿波里斯市的攻击事件。 接下来,文章讨论了保护关键基础设施的挑战,比如老旧系统、管理结构分散、依赖第三方供应商等等。然后列出了几个安全缺口,比如资产管理有限、补丁困难、恢复能力不足等。 最后,文章强调了在网络安全意识月的重要性,呼吁持续关注和投资于关键系统的保护。 现在我要把这些信息浓缩到100字以内。要涵盖关键基础设施的重要性、面临的威胁、融合的风险、挑战以及解决方案。 可能的结构是:关键基础设施的重要性→面临的威胁→IT/OT融合的风险→保护挑战→解决方案和呼吁行动。 所以,总结的时候要提到关键基础设施是现代社会的基础,面临网络攻击威胁,特别是IT和OT融合带来的风险。组织需要加强安全措施来应对这些挑战,并投资于保护这些系统。 检查一下字数是否在限制内。确保用简洁的语言表达所有要点。 </think> 文章探讨了关键基础设施在网络安全中的重要性及其面临的威胁。随着信息技术(IT)与运营技术(OT)的融合,关键设施如能源、交通和医疗等成为网络攻击的目标。文章指出老旧系统、管理分散及第三方依赖等问题增加了风险,并强调需加强资产管理和补丁更新以提升韧性。 2025-10-30 13:0:1 Author: www.trustwave.com(查看原文) 阅读量:20 收藏

2 Minute Read

To close out Trustwave’s, A LevelBlue Company, Cybersecurity Awareness Month 2025 coverage, we will take a look at securing critical infrastructure, one of the focus areas for the Cybersecurity and Infrastructure Security Agency (CISA).

For our complete coverage, please see: Cybersecurity Awareness Month 2025: The Value of MSSPs and Cybersecurity Awareness Month 2025: 4 Steps to Build a Cyber Strong America.

As CISA notes, these critical services form the backbone of modern society, yet they are under constant threat from cyberattacks. When critical infrastructure is disrupted, the businesses and communities that depend on it suffer as well.

Organizations across the public and private sectors that own, operate, or support critical infrastructure are on the front lines of defending against these growing threats.

The State of Critical Infrastructure Security

Critical infrastructure facilities face a complex and expanding web of cyber risks, amplified by the growing convergence of information technology (IT) and operational technology (OT). Trustwave SpiderLabs’ 2024 Public Sector Threat Landscape: Trustwave Threat Intelligence Briefing and Mitigation Strategies report examines how threat actors target these systems — and offers actionable recommendations to strengthen resilience.

The integration of IT and OT brings operational efficiencies but also introduces new vulnerabilities. Many organizations still assume their OT systems are isolated or “air-gapped”, leading to complacency in patching and updating legacy systems. In reality, this outdated mindset is leaving many critical systems dangerously exposed.

The Threat Landscape

Recent events underscore how unprepared many infrastructure operators remain. According to the Center for Strategic & International Studies (CSIS), dozens of cyberattacks have targeted critical infrastructure and government systems around the world, including:

  • On April 7, 2025, hackers (believed to be pro-Russian) took control of a hydropower facility in Bremanger, Norway, opened a flood gate, releasing ~500 litres of water per second for four hours before the attack was detected and stopped. No injuries were reported. This is significant because a cyber event caused physical manipulation of a water/energy infrastructure asset — a clear example of IT/OT convergence risk.
  • From July 25-29, 2025 - A “deliberate, coordinated digital attack” on the city of St. Paul disrupted core city systems, including public WiFi, payments portals, and employee networks. The governor activated the National Guard because the incident exceeded the city's response capacity.
  • In February 2025, Italian authorities reported that about 20 websites, including banks, airports, and transport infrastructure, were targeted by alleged pro-Russian hackers.

The Challenges of Securing Critical Infrastructure

The Trustwave SpiderLabs team highlights that critical infrastructure is uniquely difficult to protect due to its diversity, encompassing everything from small utilities to national agencies, and its reliance on decades-old technology. Cost concerns, operational priorities, and fragmented management structures often result in outdated, under-secured environments.

Because these systems are interdependent, a disruption in one area, such as power or water delivery, can cascade across multiple sectors, compounding the impact on communities. Many facilities have also evolved into patchworks of mismatched equipment and systems over time, prioritizing uptime and output over security.

Meanwhile, as IT and OT networks become more integrated, attackers gain new opportunities to move laterally within connected environments. The reliance on third-party vendors further expands the attack surface, especially when those partners are compromised.

The rapid adoption of automated, machine-to-machine communications in critical infrastructure brings additional risks. These systems, not originally designed with cybersecurity in mind, can be manipulated to disrupt or damage physical assets.

Key IT/OT Security Gaps Identified

Trustwave SpiderLabs’ research uncovered several common weaknesses across critical infrastructure environments:

  • Limited Asset Management: Many organizations lack full visibility into their OT systems, leaving vulnerabilities undetected.
  • Patching Difficulties: Legacy OT systems often can’t be easily taken offline, leading to delays or avoidance of applying essential security updates.
  • Resilience and Response: Building redundancy into critical systems is vital for maintaining operations during an attack and minimizing downtime.

Staying Resilient

As we recognize Cybersecurity Awareness Month, it’s a reminder that protecting the systems that sustain our daily lives — from water and energy to healthcare and finance — requires ongoing vigilance, collaboration, and investment.

By understanding the evolving threat landscape and addressing the intersection of IT and OT security, organizations can take proactive steps to safeguard not just their operations but also the well-being of the communities that rely on them.


文章来源: https://www.trustwave.com/en-us/resources/blogs/trustwave-blog/protecting-the-systems-that-sustain-us-securing-critical-infrastructure-during-cybersecurity-awareness-month/
如有侵权请联系:admin#unsafe.sh