Zero Trust in OT vs IT Networks

OT Networks are not IT Networks. Applying the same solution for OT security that you use to solve IT security will result in IT security results - breaches, hacks, and ransomware. The goals and the operation of the two network types are very different, as shown below.

IT

  • CrossCross
    Focused on protecting data and preventing data breaches.
  • CrossCross
    Cost center
  • CrossCross
    Spending money
  • CrossCross
    Lifecycle of 3-5 years
  • CrossCross
    Patch Tuesday

OT

  • Black CheckboxWhite Checkbox
    Keeping the plant or facility running.
  • Black CheckboxWhite Checkbox
    Production center
  • Black CheckboxWhite Checkbox
    Making Money
  • Black CheckboxWhite Checkbox
    Lifecycle of 30-50 years
  • Black CheckboxWhite Checkbox
    Forever Vulnerabilities

OT networks under attack

IBM’s Security X-Force Threat Intelligence Index 2023 reports that manufacturing was the most attacked OT industry. Manufacturing’s low tolerance for downtime makes the sector attractive for ransomware.

Top attack vectors in the space are phishing and exploitation of public applications, leading to the installation of backdoors, malware, and ransomware with the goal to extort the victim. The report highlighted the major vulnerability of the lack of proper segmentation between OT and IT networks. When the same security solutions are used for OT as are in IT, it gives attackers a clear path to critical OT resources when the extensive library of IT vulnerabilities is inevitably exploited (stolen credentials, lateral movement, CVEs, etc.).

Proportion of IR Cases by OT-Related Industry Source: X-Force

OTZTA

Want to be a member?

The OTZTA was formed by best-in-breed Zero Trust solution providers who protect OT networks from the increasingly AI-powered cyber threat landscape. Visit our members (link to member page) to learn more.