As cybersecurity strategies evolve, so do the threats posed by emerging technologies, particularly quantum computing. In response to these challenges, the US Department of Homeland Security (DHS) and the Cybersecurity and Infrastructure Security Agency (CISA) have initiated proactive steps to facilitate the transition to post-quantum cryptography within Operational Technology (OT) environments. This initiative is part of Secretary of Homeland Security Alejandro N. Mayorkas’ March 2021 vision for enhancing cybersecurity resilience.
Quantum computing has the potential to disrupt traditional security methods, such as encryption, which protect data and control access to sensitive information. OT systems use cryptography to secure their communications and manage user access. Even though OT systems don’t rely on cryptography as heavily as IT systems (like office networks or personal devices), they’re still at risk, especially when connected to these IT networks.
As quantum computing advances, these systems are increasingly exposed to risks such as unauthorized access, disruption of vital operations, and attacks targeting old, outdated software and equipment.
OT systems, responsible for critical industrial processes, face challenges in the face of quantum computing advancements. Specific vulnerabilities include:
The DHS-CISA document urges stakeholders to “prioritize segmentation for outdated OT software and platforms needing lengthy updates.”
Transitioning to PQC is not merely an option but a necessity for OT systems. Here are proactive steps that organizations can take to ensure a smooth migration:
See also: HIPAA Compliant Email: The Definitive Guide
As quantum computing becomes more advanced, it’s essential for organizations that rely on OT systems to act now. By proactively implementing the guidance provided by DHS and CISA, organizations can better protect their critical infrastructure from emerging quantum threats. This transition requires a commitment to continuous improvement and adaptation, ensuring that OT systems are resilient against current and future cybersecurity challenges.
Post-quantum cryptography are cryptographic algorithms designed to protect against the potential threats quantum computers pose. Unlike traditional cryptographic methods, which may be vulnerable to quantum attacks, PQC aims to protect sensitive data and systems from quantum capabilities.
The main threats include unauthorized access to OT networks through compromised encryption, manipulation of data during transmission (e.g., machine-in-the-middle attacks), and the potential for attackers to exploit vulnerabilities in legacy systems that lack quantum-resistant protections.
Organizations can perform a risk assessment that evaluates their current cryptographic methods, identifies dependencies on public-key infrastructure, and examines the potential impact of a quantum-enabled breach on their OT systems and operations.