Intelligent CISO Issue 77 | Page 37

f

e

a

t

u

r

e

What are the security risks associated with peripheral devices and removable media , and why can ’ t they be fully eliminated in certain sectors ?
As attack vectors , peripheral devices and removable media present some tricky challenges for security professionals . According to research , crucial parties are writing more code for USB drop attacks , and the consequences for the victims can be catastrophic , especially if they operate critical infrastructure .
Depending on the business , defenders will have to cover anything from vendor laptops , USB sticks and printers to Bluetooth-connected devices such as headphones and keyboards . Where power exchange or data transport occurs , threat actors are ready to invade . However , removable media cannot be fully eliminated , as it is essential for multiple sectors like nuclear , energy , manufacturing and others , to use it for updates and maintenance of critical systems residing in airgapped environments .
Even a device that has previously been given the all-clear can be compromised between user sessions .
How can critical infrastructure be protected from the cybersecurity risks posed by peripheral devices and removable media ?
Sertan Selcuk , VP for METAP and CIS , OPSWAT , answers our questions about the cybersecurity risks posed by peripheral devices and removable media , and how organisations can mitigate these threats while maintaining critical infrastructure operations .
Even a quick glance at the industries named here should invoke visions of cataclysm should a USBdrop attack succeed , with financial losses at one end of the spectrum and compromised health and safety at the other . While USB drives can be easily leveraged for attacks , other devices still come with opportunities for compromise at various points along the supply chain .
If they are connected to the corporate environment without rigorous screening , then infiltration has already occurred . The devices we take for granted can be homes for malware and other threats . It is only by implementing multilayered protection measures that we can keep critical infrastructure safe .
At the very least , each device should be thoroughly inspected before it can join a network . This should be done regardless of its history . Even a device that has previously been given the all-clear can be compromised between user sessions . When picturing critical infrastructure , we often visualise machinery humming away , keeping the lights on
WWW . INTELLIGENTCISO . COM 37