Cyber ranges allow the testing and integration of many kinds of technologies. ‘Digital twins’ is a specific approach that is useful for testing and validating the behavior of a network or cyber system in a safe and controlled environment. Some particularly meaningful use cases for digital twin arrangements include testing operational technologies in industry 4.0 solutions, space environments, military applications, or smart cities.
It is easy to overspend on many technologies, and cybersecurity is no exception. “Throwing money at the problem” is rarely the best solution. Cyber range technology, and the digital twins approach in particular, allows organizations to test their cybersecurity arrangements in a small scale yet robustly, to identify potential vulnerabilities and shortcomings without necessarily duplicating a full-scale IT system merely for testing purposes.
A digital twin, traditionally defined, is a virtual representation of a physical object or system that is created by using data and simulation models to replicate the real-world characteristics and behavior of the object. Digital twins are used to monitor, analyze, and optimize the performance of the physical counterpart in real-time.
For instance, IBM exemplifies the use case of a digital twin as :”The object being studied — for example, a wind turbine — is outfitted with various sensors related to vital areas of functionality. These sensors produce data about different aspects of the physical object’s performance, such as energy output, temperature, weather conditions and more. This data is then relayed to a processing system and applied to the digital copy.”
Even in an all-digital context, the concept of ‘twin’ is still useful. A cyber range can be used as a ‘digital twin’ to simulate and test the behavior of a network or cyber system in a controlled environment. Using a cyber range as a digital twin enables organizations to test and validate the behavior of their network or cyber system in a safe and controlled environment, without the risk of damaging the real system.
Using a digital twin setup allows the testing of a cyber system in a number of ways: Running defensive operations, simulating offensive attacks, testing different AI-related scenarios, and many more. Taking a granular approach to testing their systems helps the organization make the most of their investment in whatever technology they are looking to deploy – and defend against breaches and attacks.
For instance, to obtain a sufficient amount of testing data and experience, one does not necessarily need to build a full digital twin such as a 20,000-workstation network; merely 20 sample workstations might do just as well. (In other cases though, especially space applications, it is usually a good idea to build a full digital twin for testing purposes.)
Process-wise, a digital twin of a network or cyber system can be established and tested through the use of a cyber range as follows:
CybExer has experience from integrating all the best known commercial cybersecurity vendors’ products into our cyber ranges, allowing the stakeholder teams to maximize their usefulness. We have also integrated some of the most complex operational technology systems for preproduction testing.