ENG - Operational Technology Security - Ver2.0
ENG - Operational Technology Security - Ver2.0
Operational
Technology
Security -
Best Practices
WHITE PAPER
Operational Technology Security - Best Practices
Protecting Your
Operational Technology
Operational Technology security references not only the security solutions that will need to have
in place to protect operational technology infrastructure, its people, and the data collected. It also
references the best practices in identifying any vulnerabilities in your defenses that are protecting
your OT. In this white paper, we will cover what are the recommended best practices, including
recommended products, when identifying and, in turn, eliminating vulnerabilities in your OT security
attack surface.
Operational Technology
OT is the use of hardware and software to monitor and control physical processes, devices, and
infrastructure. OT systems are found across a large range of asset-intensive sectors, performing a
wide variety of tasks ranging from monitoring critical infrastructure (CI) to controlling robots on a
manufacturing floor. OT is used in a variety of industries including manufacturing, oil and gas, electrical
generation and distribution, aviation, maritime, rail, and utilities.
SCADA
Supervisory Control and Data Acquisition (SCADA) is a systems architecture for managing large and
complex processes. SCADA systems are normally found in utility providers such as natural gas and
electric power transmission, where control functions are distributed over a large geographic area.
ơ A central command center consists of all the servers running SCADA software.
ơ Multiple, remotely located local control systems directly control and automate process equipment.
ơ Communication systems connect the servers at the central command center to the remote
locations.
The main purpose of SCADA is data acquisition: the networks consist of multiple remote terminal units
(RTUs) that are used to collect data back at the central command center, where they can be used to
make high-level decisions.
It is, therefore, crucial to protect your organization’s employees, the most vulnerable targets, against
cyberattacks and should therefore be your highest priority. In other words, building your human firewall
with personalized automated phishing and awareness training to limit the attack surface is a critical
component of your security defense strategy.
Conclusion
Market opportunities and competitive pressures are driving oil and gas suppliers, utilities, and
manufacturers to adopt initiatives to reduce cost, drive innovation and improve sustainability. The
expanding attack surface resulting from these digital transformation initiatives that span IT and
OT creates a cyber risk that must be measured and managed. Passive monitoring identifies and
assesses vulnerabilities in both IT and OT assets if they are active on the network and will not disrupt
the operation of sensitive OT devices. Active scanning identifies and thoroughly assesses IT assets
and applications, including workstations, network devices, databases, virtual infrastructure, and the
cloud. Combining passive monitoring and active scanning, as well as phishing and awareness training,
provides a holistic view of security risks across converged IT and OT organizational environments.
Why Holm
Security?
Leading Attack Vector Coverage
The broadest coverage of attack vectors in the industry which includes both
technical and human attack vectors.
Data Privacy
Any vulnerability data we collect is stored and encrypted in data-neutral
locations so you can be assured that only you will have access to your data.