• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
5 reasons why it security tools don't work for ot

5 Reasons Why IT Security Tools Don’t Work For OT

You are here: Home / General Cyber Security News / 5 Reasons Why IT Security Tools Don’t Work For OT
June 6, 2023

Attacks on critical infrastructure and other OT techniques are on the increase as digital transformation and OT/IT convergencecontinue to speed up. Drinking water therapy facilities, vitality providers, factories, and chemical crops — the infrastructure that undergirds our each day life could all be at risk. Disrupting or manipulating OT techniques stands to pose actual physical harm to citizens, environments, and economies.

Yet the landscape of OT security equipment is far significantly less produced than its facts technology (IT) counterpart. In accordance to a new report from Takepoint Exploration and Cyolo, there is a noteworthy deficiency of self-confidence in the tools frequently employed to safe remote obtain to industrial environments.

Figure 1: New study reveals a substantial hole across industries concerning the level of problem about security threats and the degree of self-assurance in present methods for industrial secure remote accessibility (I-SRA).

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The common security tactic of industrial environments was isolation – isolation not just from the internet but also from other inner methods. But now, with OT systems opening to the globe and cyberthreats surging, the lack of OT-distinct security equipment has emerged as an urgent problem. In this void, IT remedies are frequently cobbled together in an attempt to satisfy OT needs but, as you might hope, the final results are ordinarily lackluster.

Security solutions developed for IT environments merely can’t satisfy the demands of OT and industrial realities, for various important good reasons.

Motive 1: OT prioritizes availability over confidentiality

Although IT and OT each seek to make certain confidentiality (the defense of delicate data and property), integrity (the fidelity of data in excess of its lifecycle), and availability (the accessibility and responsiveness of resources and infrastructure), they prioritize unique parts of this CIA triad.

  • It really is highest priority is confidentiality. IT bargains in data, and the stakeholders of IT problem by themselves with defending that data — from trade insider secrets to the own information of customers and buyers.
  • OT’s highest precedence is availability. OT procedures function heavy-obligation products in the actual physical realm, and for them, availability implies basic safety. Downtime is basically untenable when shutting off a blast furnace or industrial boiler tank.

For the sake of availability and responsiveness, most OT parts were not developed to accommodate security implementations at all.

This marks a fundamental change in the pretty DNA of IT and OT environments, which straight away renders IT security applications difficult to apply.

Purpose 2: OT units run on usually-up legacy units

For an individual living in the IT earth, it may perhaps be challenging to envision an surroundings that even now runs on Windows XP or an eighties-period mainframe, but that is the plain actuality of the OT world. No matter whether for financial gain or basic safety, OT units are normally up and running at whole capability. This is why OT parts are created for a great deal for a longer period lifestyle cycles.

Practically all IT-centered tools demand downtime for set up, updates, and patching. These things to do are commonly a non-starter for industrial environments, no make a difference how substantial a vulnerability might be. All over again, downtime for OT programs means putting protection at risk.

In addition, the legacy techniques that energy the OT globe generally can’t connect with modern-day security or authentication tools, restricting the usefulness of these platforms from the really start. Without a security option like Cyolo, which retrofits legacy purposes to assist present day security protocols, IT instruments will be severely restricted in their capacity to safe OT systems.

Purpose 3: IT equipment practically constantly have to have a relationship

IT security methods typically involve exterior relationship mainly because servers and applications need to exchange information with each and every other (and with users) to complete their critical operation. OT systems, by contrast, usually have unique requirements for how and when they can be linked to the internet (indeed, even in our age of electronic transformation). IT instruments are unable to always be configured to satisfy these demands.

The nuance is that IT and OT programs can interface with each individual other without forming a long term connection. This way, OT environments can be positioned to realize the gains of automation, production facts, and other digital transformation efforts without the need of producing unnecessary accessibility points for destructive actors.

Reason 4: OT techniques are highly variable

The IT earth has largely standardized all over the TCP/IP protocol, but the OT world lacks such consensus. OT units use a large wide variety of conversation protocols, which are normally determined by the initial tools company.

For illustration, if an OT operator purchases programmable logic controllers (PLC) from several distinctive vendors, each company has very likely taken a diverse method to assembly IEC-61131 criteria. For that reason, OT engineers have to understand and keep as many types of program and protocols as they have distributors.

Even within just OT, protocols are usually incompatible with just about every other, and they are surely incompatible with widespread protocols utilized in IT-centered security equipment. It is doubtful that any IT resource will include the overall spectrum of OT use circumstances for a offered atmosphere.

Motive 5: OT methods are delicate

As a functionality of their variability and normally-on nature, OT techniques are conveniently disrupted by the most fundamental IT processes and security very best methods.

  • Even passive scanning can knock fragile OT devices offline, and by the time scanning is scaled down and restricted to offline devices, security coverage shrinks underneath an appropriate level.
  • Logon banners that ordinarily operate on endpoints will crack the vehicle-login system for critical OT methods.

Simply because visibility is more durable to realize in OT environments, it can be complicated to forecast the implications of deploying a new software. For this cause, OT systems typically require much more in depth testing and validation prior to a new software is executed.

OT environments ought to have OT options

It is really frequently reported that tactic precedes tooling — and this is legitimate. IT and security groups working in OT areas have to consider the time to fully grasp and embrace OT philosophies and needs, and collaborate with OT stakeholders to define best methods.

That stated, the correct resources however make a difference in a huge way. The cybersecurity current market can be noisy and misleading. Jointly, IT and OT stakeholders have to request the correct thoughts in advance of committing to a precise software or vendor.

The OT globe justifies the gains of contemporary security controls devoid of jeopardizing the safety of employees, functions, or bystanders. Not only will the correct options harden security postures from tomorrow’s attacks, they will place security to contribute to innovation relatively than stand in its way.

To master additional about the prime challenges presently facing OT security specialists, read the total report from Takepoint Investigation and Cyolo.

Located this post interesting? Observe us on Twitter  and LinkedIn to study far more exclusive material we post.


Some pieces of this write-up are sourced from:
thehackernews.com

Previous Post: «zero day alert: google issues patch for new chrome vulnerability Zero-Day Alert: Google Issues Patch for New Chrome Vulnerability – Update Now!
Next Post: Over 60K Adware Apps Posing as Cracked Versions of Popular Apps Target Android Devices over 60k adware apps posing as cracked versions of popular»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.