Huntress Acquires Inside Agent: A New Era for Identity ProtectionFree Trial
Back to Blog
Emerging Threats

OT/ICS Security: Bridging the IT-OT Divide

I spent the first half of my career in IT security and the last decade increasingly focused on operational technology. The cultural divide between IT and OT is wider than the technical one, and until…

30 Mar 20262 min read0 views

Introduction

I spent the first half of my career in IT security and the last decade increasingly focused on operational technology. The cultural divide between IT and OT is wider than the technical one, and until organizations bridge that gap, their critical infrastructure will remain vulnerable.

Why OT Security Is Different

In IT, the security priority is confidentiality, then integrity, then availability (CIA). In OT, it is reversed: availability first, then integrity, then confidentiality (AIC). A water treatment plant does not care if someone reads the sensor data — they care if someone changes the chlorine dosage or shuts down the pumps. This fundamental difference in priorities shapes every security decision.

OT systems have decades-long lifecycles. The PLC controlling a manufacturing line might run Windows XP Embedded and have been installed in 2008 with no patches since 2012. It cannot be patched because the vendor no longer supports it, and it cannot be replaced because the cost of retooling the production line is $10 million. You have to secure it as it is, not as you wish it were.

The Convergence Problem

IT and OT networks used to be air-gapped — physically separated with no data flow between them. That era is over. Modern OT environments require connectivity for remote monitoring, predictive maintenance, supply chain integration, and data analytics. Every connection is a potential attack path from the IT network (which faces the internet) into the OT network (which controls physical processes).

The Purdue model provides a reference architecture for segmenting IT and OT: Level 0-1 is the physical process and controllers, Level 2 is supervisory control, Level 3 is manufacturing operations, Level 3.5 is the demilitarized zone between IT and OT, and Levels 4-5 are enterprise IT. The DMZ between Level 3 and Level 4 is the critical security boundary — all traffic between IT and OT should pass through it, and nothing should traverse it without inspection.

Practical Security Steps

Network visibility is the foundation. You cannot secure what you cannot see. Deploy passive network monitoring (Claroty, Nozomi Networks, Dragos) that can identify OT assets, map communication flows, and detect anomalies without interfering with sensitive industrial protocols. Active scanning is risky in OT — a malformed packet can crash a PLC that has been running for years.

Implement strong authentication at the IT-OT boundary. Multifactor authentication for all remote access into OT networks. Separate credentials for OT access — do not use the same Active Directory accounts for IT and OT access, because an IT-side compromise immediately extends into OT.

Build relationships between IT security and OT engineering teams. They speak different languages, have different priorities, and work under different constraints. Joint tabletop exercises, cross-training programs, and shared incident response plans are investments that pay dividends when an incident occurs.

Comments

Keep Reading

Explore Related Topics and Insights

Insider Threat Detection Without Becoming Big Brother
EMERGING THREATS

Insider Threat Detection Without Becoming Big Brother

Insider threat programs have a PR problem. Announce that you are monitoring employee behavior and you will get pushback from HR, legal, works councils, and the employees themselves. And they are not w…

S

Spakto Team

30 Mar 2026
Read article →
Cloud Security Posture Management: Choosing and Deploying CSPM
CLOUD SECURITY

Cloud Security Posture Management: Choosing and Deploying CSPM

When I ran a cloud security assessment for a logistics company last year, we found 847 misconfigurations across their AWS and Azure environments. Seventeen of them were critical — including an S3 buck…

S

Spakto Team

30 Mar 2026
Read article →
Secure Code Review: What Senior Engineers Actually Look For
APPLICATION SECURITY

Secure Code Review: What Senior Engineers Actually Look For

Automated tools find about 40% of security vulnerabilities in code. The other 60% — business logic flaws, race conditions, authorization bypasses, and subtle injection vectors — require human eyes. Af…

S

Spakto Team

30 Mar 2026
Read article →
Threat Hunting: Moving From Reactive to Proactive Security
THREAT INTELLIGENCE

Threat Hunting: Moving From Reactive to Proactive Security

Your SIEM generates alerts. Your EDR generates alerts. Your firewall generates alerts. You triage them, you respond to them, you close them. And then one day you discover that an attacker has been in…

S

Spakto Team

30 Mar 2026
Read article →
Securing the Software Build Pipeline: From Code to Production
APPLICATION SECURITY

Securing the Software Build Pipeline: From Code to Production

Your CI/CD pipeline is the most privileged system in your organization. It has access to source code, secrets, production credentials, cloud provider APIs, and the ability to deploy code that your use…

S

Spakto Team

30 Mar 2026
Read article →
Building a Security Culture That Outlasts Your CISO
EMERGING THREATS

Building a Security Culture That Outlasts Your CISO

I have seen security programs thrive under one CISO and collapse under their successor. I have seen organizations where security is everyone's responsibility and organizations where it is "the securit…

S

Spakto Team

30 Mar 2026
Read article →
Zero-Day Markets: The Economics of Vulnerability Trading
EMERGING THREATS

Zero-Day Markets: The Economics of Vulnerability Trading

A zero-day exploit for iOS full-chain remote code execution with persistence is worth between $1 million and $2.5 million on the private market. An Android equivalent fetches $2 to $2.5 million. A Chr…

S

Spakto Team

30 Mar 2026
Read article →
Quantum Computing and Cryptography: Preparing for Q-Day
EMERGING THREATS

Quantum Computing and Cryptography: Preparing for Q-Day

Q-Day — the day a quantum computer can break RSA-2048 and ECC in practical time — is not here yet. Estimates range from 2030 to 2040, with considerable uncertainty. But if you wait for Q-Day to start…

S

Spakto Team

30 Mar 2026
Read article →