How Does Your OT Cybersecurity Stack Up? Tips and Techniques for a Safer and More Secure Operation
While protection from hackers can be complex, many IT and OT managers aren’t following the basics.

While some hackers are technically gifted individuals who can find their way into any plant OT and/or IT system using their knowledge of computers, networks and cybersecurity tools, in many cases, hackers take the easiest route to their destination — that being your data. And that easy route may actually be through your “front door,” not the proverbial “back door.”
For instance, Infosec reported that its OT Top Security Threat for 2024 is “inadequate authentication and authorization, inadequate or nonexistent authentication and authorization control measures that can allow unauthorized individuals to gain access to OT systems.”
In its 2024 X-Force Threat Intelligence Index, IBM reports cybercriminals are increasingly “logging in” with valid accounts, rather than hacking into networks. Valid accounts became the “most common entry point into victim environments” in 2023, representing 30% of all incidents IBM’s X-Force responded to. Additionally, IBM reports a 71% year-over-year increase in cyberattacks using valid credentials.
The Trouble with OT Systems and Connecting to IT
There are multiple issues with OT systems that prevent implementation of cybersecurity and integration with centralized authentication and authorization systems, says Steve Ward, director, application specialists, EMEA, Emerson Discrete Automation. OT control systems are commonly installed, used and amortized over a long period — often 10 years or more.
While cybersecurity has been an issue for many years, older OT control systems often have few or no cybersecurity capabilities. OT practitioners may not be aware of cybersecurity capabilities and even if these capabilities are present, they may not be implemented. If OT practitioners are aware of cybersecurity, they may consider that their machine or process is air-gapped from the internet, although in practice there often is a connection, and even if they are air-gapped, risks still exist. OT practitioners also must consider ease-of-use over the lifecycle of the machine or process: if cybersecurity protection is implemented, how will this affect the ability to maintain the machine in case of a failure? A password might provide some protection against some attacks, but if the password is lost then a simple failure could turn into days or weeks of downtime.
Early on when IT and OT systems became more “connected,” it was assumed that the IT system could serve as the gatekeeper for logons to the OT network, which added complexity and degraded overall network performance. According to Robert Dunlap, controls engineer for Atlas-OT, a CSIA (Control System Integrators Association) member, even if new systems are designed with enough bandwidth, the technology changes so fast that it’s very difficult to keep ahead of it and keep a plant running. “Having an IT component that grants OT access means IT/OT convergence, which is not necessarily a good idea,” Dunlap says. “Many operators use a common portal for IT and OT applications, which presents another attack vector. Each vendor has a different OT-environment provisioning method.”
“Food and beverage manufacturers must acknowledge that the core of inadequate authentication and authorization in OT systems stems from legacy infrastructure,” adds Brian Van Vleet, CSSE, Rockwell Automation. “These systems were built during an era when connectivity was limited to isolated environments, and robust security protocols were unnecessary. This outdated foundation leaves a significant gap in modern threat landscapes where cybercriminals exploit weak authentication to gain entry. To address this, we need multi-layered strategies. First, implementing role-based access control (RBAC) and multi-factor authentication (MFA) across OT environments is non-negotiable.”
While these solutions are standard in IT, their integration in OT is challenging due to system interdependencies and operational requirements. However, modern control systems increasingly support MFA tied to centralized identity systems.
HMI/SCADA OT Cybersecurity Issues: From a Supplier’s Perspective
The European Union’s Cyber Resilience Act (CRA) will lead to changes in implementation of cybersecurity in OT control systems since it will mandate that cybersecurity protections are implemented by vendors by default. However, OT practitioners may choose to disable cybersecurity protection in favor of ease-of-use and to simplify future maintenance. The challenge here is that cybersecurity is invisible until something happens, and OT practitioners are not rewarded for protecting against a nebulous threat. Yet they are blamed when there is downtime, particularly if the downtime is extended beyond an hour or so. So, uptime wins out over cybersecurity protection.
HMI/SCADA systems don’t tend to be so old as OT control systems. They are often upgraded every three to five years and are usually Windows-based, so they can be integrated with Microsoft’s Active Directory. This needs willful effort and co-operation between IT and OT teams, as well as a network link from the OT system to the IT system. While this is a best practice, many organizations have separate OT and IT teams, and this integration is not performed. Linking the HMI/SCADA system to Microsoft’s Active Directory can even compromise cybersecurity, since any air-gap will now be removed and lack of user maintenance could expose the HMI/SCADA system to remote attack. Issues with linking HMI/SCADA systems with Microsoft’s Active Directory include keeping user privileges up to date, as well as handling details of operators and maintenance engineers who may be contractors and not work for the organization.
Note that Microsoft’s Active Directory is not the only authentication mechanism available, and some users have implemented alternatives, meaning that OT systems have to conform to these providers as well as Microsoft’s, making it more complex for the vendor.
Many problematic issues are possible when securing HMI/SCADA systems. In one case, the end user’s IT team locked down the HMI/SCADA server to such an extent that they locked themselves out and had to re-install and re-configure the entire system. The lock-down process added several days to the configuration process in the first case and the accidental lockout added more time to what was a time-sensitive project. In another case, a contractor could not perform updates since the end user’s IT team could not grant the contractor permission to access the HMI/SCADA system, resulting in reduced capabilities of the HMI/SCADA system and an inability to perform continuous improvement. In another case, a user account was created for the HMI/SCADA to run system level services against, however as this was not an active user the IT team deleted the account due to inactivity, and the HMI/SCADA system stopped running for several days until the root cause could be established.
— Steve Ward, Director, Application Specialists, EMEA, Emerson Discrete Automation
Microsoft Active Directory a Solution, But Where Should It Run?
Could Microsoft Active Directory (AD) provide these logon and authentication services for the OT network, especially since many controllers and edge servers run Microsoft Windows?
“In many cases, Active Directory can consolidate control-level sign-ons, but this approach is not universal,” Van Vleet says. “Manufacturers in the food and beverage industry and beyond should consider hybrid models where IT grants access to OT systems under strict conditional policies. These policies ensure that access is limited, monitored and revocable in real-time. Emerging OT-specific identity management tools provide similar functionality tailored to industrial protocols and are worth exploring.”
Requiring IT-level resources to provide access to controls resources can have its advantages, however, the priorities and objectives of the controls user are often different from that of the traditional IT user, says Dan Ternes, controls engineer for Egan Company / Industrial Controls, a CSIA member. But when both teams understand each other’s perspectives, they can more readily benefit from each other’s experience and best practices.
Active Directory at the OT Level?
“Manufacturers can overcome the majority of the issues of inadequate authentication and authorization by deploying Active Directory in the OT environment and properly investing in OT security personnel or third-party vendors to deploy role-based security,” says Nar Vang, ICS cybersecurity engineer for TM Process and Controls, OT and ICS Cybersecurity, a CSIA member.
Using tools familiar to most IT organizations, an engineering workstation running Windows server could be used as the primary method for interacting with and managing OT devices, Ternes says. “This workstation would have controlled network access to OT devices and the requisite applications and licensing installed. Technicians access this server via Remote Desktop using Active Directory credentials. While this method can be effective in limiting access and enabling monitoring of activity to an extent, it requires well-developed Active Directory policies and management. It also still relies on the assumption that the user authenticating with an account is who they say they are.”
Van Vleet isn’t the only one suggesting role-based access control. “Role-based security practices the principle of least privilege, meaning a role is only provided just enough access to the system to complete their job duty,” Vang adds. “For example, a controls engineer is only assigned user access to an engineering workstation with programming software, but they are not allowed to modify Active Directory objects. An OT Active Directory deployment will cover a majority of authentication and authorization issues but may not cover device level (VFDs, transmitters, etc.) management and configuration access. For device level, default usernames and passwords must be updated and stored in a password vault where only the appropriate personnel can have access based on job roles.”

“Manufacturers can overcome inadequate authentication and authorization in OT systems by implementing the Zero Trust Architecture (ZTA) framework outlined in the CISA guide,” says Matt Smith, security engineer for E Tech Group, a CSIA certified member. ZTA emphasizes building security around devices and networks, including device authentication mechanisms. Manufacturers can start by identifying and categorizing their OT devices and networks to determine the appropriate level of access control and authentication. For centralized authentication and authorization, manufacturers can use Identity and Access Management (IAM) or Privileged Access Management (PAM) solutions. While many existing OT systems were not designed with security in mind, implementing ZTA and using IAM or PAM solutions can help manufacturers build robust authentication and authorization mechanisms into their OT networks.
What is Zero Trust and How Does It Work?
Zero Trust assumes that any user, regardless of location, inherently is not to be trusted. To allow a user access to systems, devices or applications, their identity, authentication, and authorization should be verified on the initial access request and continuously while they are accessing protected resources. In an IT setting, this can be accomplished with a Trust Broker acting as an intermediary between a user and the resources they are trying to access, for example, an application on a server. This Trust Broker may be one or several hardware and/or software solutions. A key part to this exchange might be an Agent service running on the server hosting the desired application. This agent communicates with the Trust Broker during the authentication process. In an OT setting, this model might encounter roadblocks as it may not be feasible or possible to install such an agent on each device to be protected. As we start to see more devices and systems designed with security in mind, an awareness of Zero Trust and the required exchanges between device, Trust Broker, and user should be considered during the development lifecycle.
— Dan Ternes, Controls Engineer, Egan Company / Industrial Controls, a CSIA member
The “Cloud” and Safe Operation
IIoT System Implementation and Certification Based on ISA/IEC 62443 Standards (ISA, May 2024) points out four example use cases for IIoT-based cloud services and industrial control:
- Cloud-based data analytics – non-operational (view data only)
- Cloud-based data analytics – operational (operator could make a change influenced by data and trends stored in the cloud
- Cloud-based operator view and manipulation (operator can view and manually manipulate the physical state of the equipment under control from the cloud zone)
- Cloud-based non-essential control (cloud can automatically send a setpoint to a controller in the edge zone, which can change/relay the setpoint to a controller, asking a physical change to equipment under control.
While ISA doesn’t make the case for or against the cloud/control applications cases 1-4 shown above, based on bad actors obtaining valid logins/passwords for cloud or plant-based equipment, what practical methods can be applied to keep these bad actors out of control loops and systems without causing negative consequences to those (e.g., staff engineers, system integrator) who should be connected?
Organizations should adopt and observe OT and manufacturing IT philosophies analogous to asset plans, says Jason Pennington, Endress+Hauser USA director of digital solutions. “Our most mature digital customers are promoting the idea that digital assets require a maintenance plan and set of policies that are regularly reviewed, included in onboarding/offboarding procedures, and administered via central services rather than ad hoc at a departmental or divisional level.”
Regarding cloud-based services, which are run by experts, a user can generally be confident that the cybersecurity provided by the cloud vendor is better than the cybersecurity that processors could implement themselves, says Emerson’s Ward. Cloud vendors implement secure protocols that protect information in transit, including user details and passwords. However, user account management remains the responsibility of the user, and they must ensure that user accounts are maintained along with a suitable password policy—and that departing users are deleted.
While ISA does not make cases for or against cloud-based integrations in industrial environments, individual enterprises and OT departments should consider the inherent risks associated with cloud-based deployments and evaluate the impact on the business if there were a breach, says TM Process and Controls’ Vang. In general, proper architecture and network segmentation can allow inherently low-risk, cloud-based platform integrations that reside mainly in the data analytics or data feeding up into the cloud category.
For cloud-based operator viewing and manipulation, an organization should question the need since there should already be onsite viewing and manipulation on the plant floor or operator room, Vang adds. If there is a valid justification, the next question should be what data must be viewed and manipulated from the cloud platform. The data sets should be reviewed along with how a cloud data breach could impact operations.
Once vetted, Vang says, intermediary industrial software/hardware must be put in place to act as a middleman to get the data from OT to the cloud platform and vice-versa. One key component of the intermediary software/hardware is that there must be manual data mapping to ensure the entire OT dataset is not exposed to the cloud. Lastly, there must be code put in place at the PLC/DCS level to disregard manipulations exceeding the system’s safe and allowable range.
Cloud or Not: It’s All About User Access Control
Atlas-OT’s Dunlap points to the basics — once a system has gone through FAT and is up and running in production, all those who had a role in setting up the system no longer need to be kept on a logon list. “Remove back doors, and that means removing all back doors,” Dunlap says. “Hacks have occurred as third-party suppliers are compromised and the attacker gains access to new parts of the supply chain. I have seen control systems for which the process licensor, the licensor’s partners, the systems integrator, terminated employees and various service providers were still provisioned. Set up configurations and/administrative actions to remove these accounts quickly.”
Dunlap suggests other steps that can be taken to keep unneeded people out of the system:
- Set up implicit deny to all users and services, including non-human users.
- There are still control systems being built that use insecure protocols. One popular vendor has systems that use a potentially compromised hash algorithm.
- Understand how network and session keys are generated and update the algorithms if possible.
- Find bad certificates and update them.
- Update older equipment to ensure that the newer is not forced into using older standards to maintain compatibility.
- If a device has a hard-coded, unchanging network key, upgrade as soon as possible.
Manufacturers can use access controls, network segmentation, behavioral analytics and multi-factor authentication (MFA) to keep bad actors out of control loops and systems with legitimate logins and passwords, says E Tech’s Smith. MFA gives the login process an additional layer of security, and network segmentation reduces the harm that a malicious actor could do if they were to get access to the system. Access controls restrict who can access the system and what they can do, while behavioral analytics identify anomalous network activity.
MFA is recommended, but this may be complicated to implement in OT situations, says Emerson’s Ward. For example, operators may not be allowed to take their mobile phones into the production environment and so MFA apps will not be accessible, and other techniques such as keyfobs and access cards may not be available to contractors and temporary workers. A disaffected user could also interfere with operations by “losing” a physical device so that they can’t work until it is replaced.

“One area of concern that is quite pervasive in our industry is the use of common patterns in system and device credentials,” says Egan’s Ternes. This is usually seen on devices that are networked but are not able to utilize systems like Active Directory to manage access. Assuming a default login is changed at all during commissioning of a device, it is often set to a common login used around the plant. Or, if not identical, it is very similar, not complex, and easy to guess. As a result, if one such account is compromised, an attacker might easily access other devices and systems once this pattern is recognized.
Safe Cloud Practices
In scenarios where cloud-based data and control applications interact with physical systems, the risks are heightened by the possibility of compromised credentials. Practical safeguards must focus on reducing the risk of misuse without hampering authorized access.
The first step is to deploy conditional access policies and behavior-based analytics, which can detect anomalies such as unusual login times or locations and restrict access automatically. Additionally, food manufacturers must adopt network segmentation strategies that isolate cloud-to-plant communication. This ensures that even if a bad actor gains entry, their movement is limited.
Another effective approach is integrating secure edge devices that act as gatekeepers between the cloud and control systems. These devices enforce protocol compliance and validate commands before they reach critical equipment. Furthermore, adopting hardware root-of-trust solutions adds another layer by ensuring that only authenticated and verified devices can connect to control loops.
— Brian Van Vleet, CSSE, Rockwell Automation
ISA/IEC 62443 Standards Define Roles in Cybersecurity
ISA/IEC 62443 differs from other information security and data security standards, focusing on cyber-physical systems that are often found in industrial environments, says Endress+Hauser’s Pennington. This standard is not a mandatory requirement in industry, but it is frequently discussed, highly regarded and regularly observed. Historically, best practices entailed simply isolating plant control networks. However, today’s connected plant environments typically preclude this option. As a result, many manufacturers have reworked products to implement secure-by-design principles, adopted firmware maintenance and patch policies and are protecting bidirectional data transfer between edge devices and central systems.
Achieving compatibility with ISA/IEC 62443 standards requires a holistic approach across hardware and software design, says Rockwell’s Van Vleet. For a controls company, this involves:
Robust product design: Controllers, sensors, and network devices must include secure boot mechanisms, signed firmware, and encrypted communication protocols.
Comprehensive testing: Products undergo rigorous vulnerability assessments to ensure resilience against known exploits.
Lifecycle support: Regular patching and updates must be guaranteed to maintain compliance over time.
OT control system vendors in following the ISA/IEC 62443 standard take several approaches in implementing secure devices, says Emerson’s Ward. Typical approaches include:
- A built-in firewall
- Trusted Platform Module (TPM) to store certificates and security details
- Signed boot (only applications signed by the installed certificates will be run)
- Timed boot (measuring how long it takes to load from boot in case a malicious payload has been added)
- Security logs to store log in attempts and download details
- Implementation of secure protocols
- Capabilities to only enable ports and protocols that are used (i.e. disabled by default)
- Techniques to prevent remote access (by ensuring local presence for certain activities like configuration or firmware updates)
- Access levels restricted by passwords
“Manufacturers can use the Zero Trust Architecture framework to get around insufficient authentication and authorization in OT systems,” says E Tech’s Smith. ZTA places a strong emphasis on securing networks and devices, including device authentication systems.
HMI/SCADA vendors running on Windows or Linux operating systems have a slightly easier life since many of the cybersecurity provisions come from the operating system or hardware layer, but they still have to implement user management and integration with Microsoft’s Active Directory or equivalents, says Ward. HMI/SCADA vendors also have to regularly update their software to deal with any new vulnerabilities, often by updating the underlying components they use (for example Microsoft’s .NET and open-source software), Ward says.
The advantages of ISA/IEC 62443 compliance are clear: improved security posture, regulatory alignment, and customer trust. However, challenges include higher development costs and the complexity of certifying diverse product lines. Ultimately, these standards provide a framework that aligns the food industry with a security-first mindset, Van Vleet says.
Building towards ISA/IEC 62443 Compliance
Vendors can provide ISA/IEC 62443 compatible hardware/software that can withstand attacks on the industrial sensor networks by modernizing their software to meet the following standards:
- Firmware/software updates for improvements in operation and security
- Authentication and authorization mechanism with controller/s and personnel avoid unauthorize configuration changes
- Encrypted network traffic so network packets are harder to decipher
The advantages to having ISA/IEC 62443 compatible controls hardware are:
- Prevent sensor/actuator tampering that could result in downtime or quality problems
- Prevent man-in-the-middle attacks on controls hardware
- Improvement in monitoring/administering and operations of controls hardware
The disadvantages to having ISA/IEC 62443 compatible controls hardware are:
- Requires trained and skilled technicians to install and confirm functionality where it required electricians to complete the job normally
- May increases maintenance budget due to different skills required to carry out instrumentation work
— Nar Vang, ICS Cybersecurity Engineer, TM Process and Controls / OT and ICS Cybersecurity
Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!