Industrial control systems were once considered safer from hackers because they weren’t connected to the internet. Today, that’s changed due to increased digitalization and IT/OT convergence. This has resulted in more interconnected OT networks that help meet business and customer needs and expectations.
Because these connections can create risks, the UK National Cybersecurity Centre (NCSC) in partnership with several other international cyber agencies, including the Federal Bureau of Investigation (FBI) and Cybersecurity Infrastructure Security Agency (CISA), released the Secure Connectivity Principles for Operational Technology (OT). These goals are designed to help you connect your systems while limiting operational risk.
This blog will highlight the importance of the Secure Connectivity Principles for OT, what they mean, and examples of the principles at play.
Why the Secure Connectivity Principles for OT Matter
Following these principles can help provide confidence that connections that your plant makes do not adversely impact the safety or functionality of your operations. These guidelines can serve as a strategic roadmap and provide a way to walk the line between innovation and safety, without compromising the dependability of your facility.
The IT/OT Convergence
For decades, IT and OT lived in two different worlds—but today, those worlds are merging.
- The benefit: IT/OT convergence allows real-time analytics and predictive maintenance to help you fix machines before they break.
- The problem: Many factory systems rely on obsolete or legacy technology that was never designed for modern security.
- Where vulnerabilities arise: Connecting these older machines to modern networks often introduces risks that the original equipment wasn’t built to handle.
The Consequences in OT Environments
The stakes are higher in an OT environment because the risks are physical.
- Safety and physical harm: A security breach in OT can potentially cause equipment malfunction or cause physical harm to workers.
- Environmental impact: An intrusion could cause a failure in safety mechanisms that lead to chemical leaks or environmental damage.
- Service disruption: For operators of essential services, a shutdown can disrupt the community and national infrastructure.
Active Threats
Industrial systems are no longer too niche for hackers to find. They've become active targets for state-affiliated actors, opportunistic hacktivists, and anyone scanning for exposed infrastructure. If your control systems are visible to internet scanning tools, they could be found and targeted.
Handala’s cyberattack against Stryker is a great example of this. The pro-Iranian hacktivist group wiped data from more than 200,000 systems and devices linked through Microsoft Intune. This resulted in disruptions that affected servers, mobile devices, and other systems connected to the administrative-based console.
The Secure Connectivity Principles for OT Defined
Here is a breakdown of the principles and what they mean.