“The hardest part about an OT environment is its size and scale of uniqueness. A single manufacturing warehouse could have thousands of little OT components serving different functions, and each one could be an attack surface,” says Patrick Perry, public sector field CTO at Zscaler.
It’s crucial that enterprises understand their OT systems and shift toward a more proactive mindset when it comes to securing them. Otherwise, the financial losses and operational disruptions can be devastating.
Common Hurdles in Securing OT Environments
Perry notes that OT systems are not as mystifying as people may think. It doesn’t help that many organizations struggle with complete knowledge or visibility of their OT environments.
Organizations must improve training and education to foster a level of comfort in understanding how an OT architecture works in a modern-day enterprise and how it integrates with the larger IT ecosystem, Perry says: “’How do I manage it? How do I control it? And, more important, how do I assess if it’s doing something wrong?’”
Misguided architecture is another common issue for OT systems. Sometimes, organizations think a solution that comes out of a box with 15 components requires all components to function within the greater enterprise system, making assumptions that don’t fit with the reality of operational needs today.
DISCOVER: Enterprises can modernize their physical security infrastructure today.
That can be particularly detrimental given the legacy architecture present in some environments.
“In legacy OT environments, where patching is difficult, the most impactful step is to address cybersecurity fundamentals and hygiene, such as securing misconfigured identities, removing default passwords and implementing robust authentication,” says Meir Asiskovich, senior director of OT security at Tenable.
The Importance of a Zero-Trust Security Foundation
Despite the complexities of these interconnected systems, Perry says, there are familiar standards and frameworks that organizations can and should rely on.
“If I could completely rearchitect a security architecture for an organization that had everything — whether it’s OT, IT, people and machine entities, AI, all of that kind of stuff — I still am grounded in the concepts of zero trust. That’s where I would start,” he adds.
Of course, zero trust is just the starting point. Organizations should work to reduce their attack surface and understand that every part of the environment, no matter how small or seemingly irrelevant, needs to have a form of identity that can be managed.
