NIST Special Publication 800-82 is a foundational guidance document for securing Industrial Control Systems (ICS) and Operational Technology (OT). It provides a framework for protecting critical infrastructure by recommending security controls and architectural principles. VMware’s vDefend is a suite of security products for virtualized environments that, while not exclusively designed for ICS, offers capabilities that directly support and help implement many of the recommendations in NIST 800-82. Let’s explore the key concepts of both and detail how vDefend can be a crucial tool in an organization’s strategy to align with NIST 800-82.
NIST SP 800-82 provides guidance on securing ICS, including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control systems like Programmable Logic Controllers (PLCs). The key objectives of this standard are to:
The latest revision, NIST SP 800-82r3, expands the scope from ICS to the broader category of Operational Technology (OT), reflecting the increasing convergence of IT and OT environments.
VMware vDefend is a suite of security solutions designed to protect workloads in virtualized data centers and private clouds. Its primary components relevant to this discussion are:
vDefend’s capabilities align well with many of the security controls and principles recommended in NIST 800-82. The following table illustrates this mapping:
| NIST 800-82 Concept/Control | How vDefend Addresses It |
|---|---|
| Network Segmentation & Segregation | vDefend Distributed Firewall is a powerful tool for micro-segmentation. It can create logical security zones around critical ICS applications, even if they reside on the same physical host. This helps enforce the Purdue Model’s concepts of separating IT and OT networks and creating DMZs. |
| Boundary Protection | The vDefend Distributed Firewall can enforce strict access controls at the virtual network interface of each workload, acting as a critical boundary protection mechanism. It can filter traffic based on source, destination, port, and protocol, ensuring that only authorized communication is allowed. |
| Access Control | Through micro-segmentation policies, the vDefend Distributed Firewall enforces the principle of least privilege. It ensures that virtual machines and applications can only communicate with the specific systems they need to, and nothing more. This helps prevent lateral movement of threats. |
| System and Communications Protection | vDefend Advanced Threat Prevention (ATP) provides multiple layers of protection. The IDS/IPS can detect and block attempts to exploit vulnerabilities in ICS software. Malware Prevention can prevent malware from spreading within the ICS environment. |
| Continuous Monitoring & Threat Detection | The NTA capabilities of vDefend ATP provide visibility into network traffic, helping to detect anomalous behavior that could indicate a security incident. This supports the need for continuous monitoring in ICS environments. |
| Incident Response | When the NDR system flags a campaign, your security team doesn’t just get an alert; they get the ability to take immediate action. They can apply a quarantine policy using the Distributed Firewall to instantly isolate the compromised workload and stop the attack from spreading further. |
| Virtual Patching | The IDS/IPS in vDefend ATP can be used for “virtual patching.” If a vulnerability is discovered in an ICS application but a patch is not yet available or cannot be immediately applied, the IDS/IPS can be configured to block traffic that attempts to exploit that specific vulnerability. |
Consider a manufacturing plant with a virtualized SCADA system. The plant wants to align with NIST 800-82 to improve its cybersecurity posture. Here’s how vDefend could be implemented:
While NIST SP 800-82 provides the “what” and “why” of ICS security, VMware’s vDefend suite offers a powerful set of tools to address the “how.” By leveraging vDefend’s capabilities for micro-segmentation, advanced threat prevention, and security intelligence, organizations can effectively implement many of the key security controls recommended in NIST 800-82. This can significantly improve the security posture of their ICS and OT environments, reducing the risk of cyber-attacks and ensuring the continued availability and safety of their critical operations.