Build connections between IT and OT security to boost plant operations

Sarah Kolberg
In IT, there’s an ongoing battle between emerging attack methods and the security solutions that can counteract them. A pioneer in cybersecurity, IT has been dealing with cyberthreats since the 1970s when Creeper, the first computer virus, joined the scene. 

In OT, it’s a different story. Historically, cybersecurity hasn’t been a priority in operational technology. But awareness levels are rising as the number of cyberattacks in the industry increases. This is good news, especially since industry regulations and IT/OT convergence demand that cybersecurity find its way into industrial plants. To secure operations, IT and OT must be able to align strategies and approaches. But first, there are obstacles to overcome.

 

IT and OT view security differently

Security expectations differ between information technology and operational technology. While data integrity is the highest priority in IT security, OT security focuses on system availability and safety to ensure continuous, interference-free operations.

Despite differences in expertise and terminology, these two worlds need to come together. This means finding a common language to clearly formulate system needs and requirements, which can be challenging.

Overcoming operational technology obstacles is key to improved cybersecurity

Because operational technology poses distinct hurdles and special requirements, OT security solutions must take a tailored approach to ensure protection and operational continuity.

Supporting outdated equipment

Legacy infrastructures and long technology lifecycles pose significant challenges to OT security. It’s not uncommon to find plant devices and systems that have run continuously for the last 20 years. OT systems also weren’t designed to connect to the network.

Modern IT security solutions can overwhelm such structures, making it critical to develop security concepts that protect legacy systems.


Bypassing obsolete software

OT software is sometimes outdated and often highly specific, communicating via protocols that are atypical for IT; it can be difficult to determine which components communicate with each other. But you can only secure what you know is there.

The first step toward improving OT security involves creating transparency that offers insight into machine status.


Being sensitive to vulnerable systems

OT runs on highly vulnerable systems. The smallest change can lead to a big system failure. For example, instruments like penetration tests could result in disruptions or failures and are not always an option.

It’s important that OT security solutions and measures do not jeopardize operations: Interruptions can have far-reaching, costly consequences.

 

IT and OT must work together to create OT security solutions

OT systems vary from plant to plant, which is why one-size-fits-all solutions don’t typically work. To develop suitable OT cybersecurity solutions, IT managers need to better understand OT systems. Often, processes that are common in IT, such as risk analyses, need to be reconsidered for OT.

OT security solutions must adapt to your plant’s requirements. Before new technology can be introduced, OT systems often require extensive planning and physical modifications. This can be time-consuming and costly. Security solutions that are easy to integrate and operate without significant upheaval are preferred; they simplify implementation and reduce impact on existing operations.
 

OT security solution: Post-Connect NAC from macmon

macmon’s Network Access Control (NAC) is designed to support the unique requirements of OT and IT.


For example, while the IEEE 802.1X standard is widely adopted in IT for robust cybersecurity, its reliance on a RADIUS server poses challenges for OT environments. It can be complicated to maintain the RADIUS server, and OT staff may not have the expert ise to manage these systems. In addition, OT systems and machines don’t always support the IEEE standard.


macmon’s NAC solution is an OT security solution that addresses these unique constraints and ensures cybersecurity without compromising operational stability. It also offers an SNMP-based solution, utilizing a protocol that is familiar to industrial plants. Post-Connect NAC enables passive monitoring and reactive functionality so compliance guidelines can be implemented step by step without jeopardizing operations. Security-relevant events can be handled differently based on specific requirements.
 

As a manufacturer- and infrastructure-agnostic solution, it can work in any environment and doesn’t require new purchases. It can be fully implemented within a day, connecting you to network insights and strengthening your OT environment.

Learn more about macmon NAC.

 

Related Links

What a Recent Survey Says About OT Security and How It Can Improve

Securing OT: Follow Secure by Design principles

IT Security vs. OT Security: What Are The Key Differences?