Loading
Blog
Recent ActivityRecent Activity

What are the Secure Connectivity Principles for Operational Technology?

Learn how the Secure Connectivity Principles for OT help protect industrial systems from cyber threats while maintaining operational safety.

Share This:

LinkedInLinkedIn
XX
FacebookFacebook
PrintPrint
EmailEmail
Experienced engineer inspecting operational server racks in computer network security data center. Supercomputers providing processing and memory resources for different workloads

Industrial control systems were once considered safer from hackers because they weren’t connected to the internet. Today, that’s changed due to increased digitalization and IT/OT convergence. This has resulted in more interconnected OT networks that help meet business and customer needs and expectations.

Because these connections can create risks, the UK National Cybersecurity Centre (NCSC) in partnership with several other international cyber agencies, including the Federal Bureau of Investigation (FBI) and Cybersecurity Infrastructure Security Agency (CISA), released the Secure Connectivity Principles for Operational Technology (OT). These goals are designed to help you connect your systems while limiting operational risk.

This blog will highlight the importance of the Secure Connectivity Principles for OT, what they mean, and examples of the principles at play.

Why the Secure Connectivity Principles for OT Matter

Following these principles can help provide confidence that connections that your plant makes do not adversely impact the safety or functionality of your operations. These guidelines can serve as a strategic roadmap and provide a way to walk the line between innovation and safety, without compromising the dependability of your facility.

The IT/OT Convergence 

For decades, IT and OT lived in two different worlds—but today, those worlds are merging. 

  • The benefit: IT/OT convergence allows real-time analytics and predictive maintenance to help you fix machines before they break.
  • The problem: Many factory systems rely on obsolete or legacy technology that was never designed for modern security.
  • Where vulnerabilities arise: Connecting these older machines to modern networks often introduces risks that the original equipment wasn’t built to handle.

The Consequences in OT Environments 

The stakes are higher in an OT environment because the risks are physical.

  • Safety and physical harm: A security breach in OT can potentially cause equipment malfunction or cause physical harm to workers.
  • Environmental impact: An intrusion could cause a failure in safety mechanisms that lead to chemical leaks or environmental damage.
  • Service disruption: For operators of essential services, a shutdown can disrupt the community and national infrastructure.

Active Threats 

Industrial systems are no longer too niche for hackers to find. They've become active targets for state-affiliated actors, opportunistic hacktivists, and anyone scanning for exposed infrastructure. If your control systems are visible to internet scanning tools, they could be found and targeted.

Handala’s cyberattack against Stryker is a great example of this. The pro-Iranian hacktivist group wiped data from more than 200,000 systems and devices linked through Microsoft Intune. This resulted in disruptions that affected servers, mobile devices, and other systems connected to the administrative-based console.

The Secure Connectivity Principles for OT Defined 

Here is a breakdown of the principles and what they mean. 

Principle What it means
Principle 1: Balance the risks and opportunities  Start making risk-informed connectivity decisions around your operational and business use cases that account for legacy hardware and support supply chain gaps. This can include creating trusted zones and allowing secure communication between them.
Principle 2: Limit the exposure of your connectivity Shrink your attack surface by forcing all traffic to be outbound-only and using just-in-time access to minimize the window for potential attack.
Principle 3: Centralize and standardize network connections Reduce the risk of misconfiguration by replacing one-off bespoke tunnels with repeatable, centralized, and categorized access patterns.
Principle 4: Use standardized and secure protocols When supported by your operations, move beyond simple connectivity by enforcing authenticated, encrypted protocols and validating data structures to block malicious payloads. Also secure data when it’s in transit and at rest.
Principle 5: Harden your OT boundary Secure your perimeter with a defense in depth layer of non-obsolete boundary devices, phishing-resistant multi-factor authentication, and hardware-enforced unidirectionality.
Principle 6: Limit the impact on compromise Reduce your “blast radius” by using segmented zones and micro-segmentation to trap breaches locally and help prevent unauthorized lateral movement. 
Principle 7: Ensure all connectivity is logged and monitored Enable your secure operations center (SOC) to detect anomalies and break-glass activity by transforming stagnant into a correlated, real-time detection system.
Principle 8: Establish an isolation plan Help protect your organization’s operational continuity by defining and testing strategies to selectively “sever the link” during a crisis without compromising safety.

Examples of the Secure Connectivity Principles for OT in Play

These hypothetical examples show how a manufacturing plant can move from a high-risk setup to the desirable end states.

Scenario A: Remote Vendor Maintenance

A plant may need an external vendor to troubleshoot a specialized machine. But relying on a traditional “always on” VPN can create unnecessary exposure by giving that vendor a direct path into the entire factory network.

Following Principle 2 and Principle 5, the plant removes direct inbound port exposure. Instead, they use a brokered connection hosted in a secure gateway in a separate iDMZ. This helps create a more tightly controlled setup grounded in multiple security principles.

Before the technician logs in, the plant applies Principle 1 by verifying a formal business case to ensure a connection is required. Access is managed through Principle 2 as just-in-time connectivity. 

Once the session begins, the plant enforces Principle 5 and only allows the vendor to only service the specific machine. Throughout the session, the security team maintains full visibility by following Principle 7 to monitor every action quickly to detect any unauthorized behavior.

The result of this multi-layered approach is that security no longer relies on a single password. By requiring phishing-resistant multi-factor authentication (MFA) and granting access only during scheduled maintenance, the plant is protected even if a vendor’s credentials are stolen. 

Scenario B: Helping Protect Legacy Product Lines

A facility relies on an obsolete programmable logic controller (PLC) that’s 15 years old. It works perfectly for production but can no longer receive security updates. This makes it a sitting duck if a hacker enters the network.

Using Principle 6, the plant implements micro-segmentation to contain this risk. They place the PLC in its isolated network zone with a hardware firewall to ensure it is physically and logically separated from the rest of the facility. 

By enforcing Principle 5, the plant applies the rule of least privilege and helps ensure the PLC is only allowed to talk to the specific operator station it needs to function. For constant oversight, the security team follows Principle 7 to log and monitor all traffic entering or leaving this zone, allowing them to spot any unusual communication patterns immediately.

Now, the PLC is segmented so it can only talk to the specific operator station it needs to function. If a different piece of technology gets infected with malware, the infection is then trapped and cannot move laterally to the legacy product line. 

Putting the Secure Connectivity Principles for OT Into Practice 

The Secure Connectivity Principles for OT provide a strategic roadmap. But turning them into action across a complex OT environment requires the right combination of tools, expertise, and ongoing support.

That’s where SecureOT™ solution suite comes in. Our comprehensive solution suite is built for OT environments and helps organizations align with these principles through the following: 

Industrial OT Cybersecurity – Rockwell Automation SecureOT
 Industrial OT Cybersecurity – Rockwell Automation SecureOT
Industrial OT Cybersecurity – Rockwell Automation SecureOT
SecureOT combines OT‑nativedesigned software, expert services, and global scale to reduce risk, improve uptime, and simplify compliance for industrial operations.
Learn More

Deep Asset Visibility 

SecureOT™ Platform identifies assets across vendors down to the device level—collecting over 1,000 characteristics per asset. This gives you the contextual foundation to make risk-informed connectivity decisions that Principle 1 calls for. Especially if legacy systems are part of the equation.

System Hardening and Segmentation 

SecureOT Platform directly supports the Secure Connectivity Principles for OT since you can implement automated patching, identify and enact configuration management, and plan network segmentation directly within the platform. Our consultative services can design and deliver network segmentation aligned with your operational and risk profiles.

24/7 Managed Detection and Response 

Security Monitoring and Response provides continuous, OT threat monitoring through our dedicated security operations center (SOC). This allows organizations to meet the recommendations of Principle 7. 

In addition, integrating our Managed Secure Remote Access solutions allows us to capture “human to machine” data at the point of entry. Whether a technician is logging in remotely or an automated process is running on the floor, our portfolio helps verify  that actions are correlated and analyzed in real time. This means your teams can spot anomalies before it impacts production.

Vulnerability Management 

With OT-safe scanning, contextual risk prioritization, and closed-loop remediation built into a single platform, SecureOT Platform can help you proactively identify and address vulnerabilities without the need to disrupt production.

Rockwell Automation was recognized as a global leader in OT cybersecurity services from Frost & Sullivan.
Rockwell Automation was recognized as a global leader in OT cybersecurity services from Frost & Sullivan.
Learn More
Not sure where your OT security stands today?

Take our Cybersecurity Preparedness Assessment to help evaluate your current posture, identify gaps, and build a prioritized roadmap.

Take the assessment

FAQ: Secure Connectivity Principles for OT

Which agencies are involved in the Secure Connectivity Principles for OT?

The agencies who were involved in developing the Secure Connectivity Principles for Operational Technology include:

  • UK National Cyber Security Centre (NCSC)
  • Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)
  • Canadian Centre for Cyber Security (Cyber Centre)
  • US Cybersecurity and Infrastructure Security Agency (CISA)
  • US Federal Bureau of Investigation (FBI)
  • Germany Federal Office for Information Security (BSI)
  • Netherlands National Cyber Security Centre (NCSC-NL)
  • New Zealand National Cyber Security Centre (NCSC-NZ)
Are these mandatory requirements?

No, these principles are goals or desirable end states. They provide a framework for organizations to design and manage secure systems as the threat landscape evolves.

How do these principles relate to existing frameworks like NIST CSF or IEC62443?

The Secure Connectivity Principles for OT complement these existing frameworks. They’re a higher-level interpretation of what secure OT connectivity may look like. 

Do these principles apply to both IT and OT teams?

Yes, these principles apply to both IT and OT teams because secure connectivity sits at the intersection of their responsibilities. These principles act as a conduit and a common language that allow these different teams to reach their shared goals. 

Which principles should I prioritize first?

What’s right for your organization ultimately depends on your environment, existing technology, and your business goals. However, most implementations can follow a logical flow based on the level of protection they offer your most critical operations. This may include:

  • Build your foundation and prioritize vendor-neutral asset inventory: Before you can apply any principle, you must have a clear, definitive view of your OT architecture. This requires a holistic, vendor-neutral asset inventory so you know exactly what is on your network. 
  • Then, start with Principle 1: Documentation and establishing a formal business case based on risks are the first steps for OT connectivity. Establish trusted and non trusted zones, what assets need to talk to what, and what is the target security level and tolerable level of operational and business risk.
  • Then, focus on Principle 2: Identifying and reducing the number of internet-facing assets is an opportunity to reduce your attack surface. 
  • Next, implement Principle 5: Hardening your boundary with tools like phishing-resistant MFA is one of the most effective ways to help protect sensitive control actions.
What is the first step if we have limited resources?

You should prioritize your systems based on their impact on safety and operations. Focus first on the devices that maintain critical functions or have the highest risk of causing unsafe conditions or service outages if they fail. 

How should we handle obsolete (legacy) products?

Use network segmentation and trusted boundary controls like an iDMZ to keep obsolete products isolated from external risks. This provides protection while you figure out your businesses long term modernization and migration efforts to reduce reliance on these unsupported systems.

Published May 13, 2026

Topics: Cybersecurity
Subscribe to Rockwell Automation

Receive the latest news, thought leadership and information directly to your inbox.

Subscribe now

You may also be interested in

Loading
Loading
Loading
Loading
  1. Chevron LeftChevron Left Rockwell Automation Home
  2. Chevron LeftChevron Left Com...
  3. Chevron LeftChevron Left News
  4. Chevron LeftChevron Left Blogs
  5. Chevron LeftChevron Left What are the Secure Connectivity Principles for Operational Technology?
Please update your cookie preferences to continue.
This feature requires cookies to enhance your experience. Please update your preferences to allow for these cookies:
  • Social Media Cookies
  • Functional Cookies
  • Performance Cookies
  • Marketing Cookies
  • All Cookies
You can update your preferences at any time. For more information please see our {0} Privacy Policy
CloseClose