iTWire TV 705x108notfunny

Thursday, 20 June 2024 11:19

A safe approach to secure remote access for modern OT networks

By Leon Poggioli, ANZ regional director, Claroty

GUEST OPINION: The increasing integration of Operational Technology (OT) and Information Technology (IT) in industrial operations is becoming more and more prominent. This convergence offers numerous benefits, including enhanced automation and improved efficiency. However, it also introduces significant cybersecurity challenges, especially concerning remote access.

With the rise of AI-powered systems and the push for digital transformation in the OT environment, the need for secure remote access has become more critical than ever before. Historically, OT networks had less technology, automation, and external connectivity compared to IT networks.  However, with the arrival of AI, modern manufacturing has become more efficient. According to the WEF, implementing AI in manufacturing alone could boost the global GDP by 2% per year. Consequently, organisations that fail to modernize their OT environments risk falling behind competitors who leverage this technological advantage.

Even public utilities that lack the same competitive pressure of the open market are facing public scrutiny regarding the cost of living. As a result, OT networks are now becoming more like IT networks, which introduces new cybersecurity risks. 

At first glance, the obvious solution to mitigate these risks would be to take the same IT cybersecurity controls and transfer them across to the OT world. However, this approach is not feasible for several reasons.

  1. Impact of downtime - OT networks have a higher risk associated with downtime - which can affect safety and production.
  2. Diverse protocols -  OT systems use a wide range of protocols that differ significantly from those in IT environments.
  3. Specific remote use cases - Remote access requirements for OT users are unique and necessitate tailored controls.

To illustrate one example, let’s consider remote access. A typical corporate remote access user is granted specific access to their corporate applications, with the primary risk being data exfiltration by a malicious insider or an attacker who has hijacked the user's credentials

In contrast, an OT user logging in to monitor production systems or make specific changes to the process control network could be an internal operator or an external third-party vendor specialist logging in to diagnose a fault or make necessary adjustments. These scenarios highlight the need for a Remote Platform Access Management (RPAM) solution that supports OT workflows, enhances operational efficiency, and enforces comprehensive security controls.

OT users often manage large environments and require simple access to the systems they need access to, when they need them. The use of cumbersome jump boxes and VPNs can complicate access and add administrative overhead. As a result, many OT environments see the deployment of unsanctioned remote access protocols by users who feel constrained by the available IT-sanctioned methods. In some cases, IT departments may even insist on not providing remote connectivity, further exacerbating the issue.

Administrators must control user access down to specific servers and time windows, often based on a specific permit to work. This requirement poses a challenge for traditional VPNs and jump boxes. Additionally, access must be secure to minimize the risk of unauthorised users gaining access to OT systems and making malicious changes that could impact production or safety. VPNs and third-party remote access systems with minimal oversight of changes made and control over specific servers accessed leave critical systems vulnerable.

As OT networks enable digital transformation, now is the time to reassess how internal teams and external vendors remotely access its environments.  By providing IT-sanctioned remote access explicitly designed for the OT remote access use case, organisations can safely enable OT digital transformation while improving usability, control, and security.  This opportunity has led to the development of secure remote access platforms, empowering customers to safeguard their digital future for OT networks. 

Read 1247 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here




EXL AI IN ACTION VIRTUAL EVENT 20 MARCH 2025

Industry leaders are looking to transform their businesses and achieve measurable outcomes with AI.

As organisations across APAC navigate the complexities of AI adoption, this must-attend event brings together industry leaders, real-world demonstrations, and visionary panel discussions to bridge the gap between proof-of-concepts and enterprise-wide AI implementation.

Learn how to overcome common challenges in deploying AI at scale.​

Unlock cost savings, efficiency, and better customer experiences with AI.

Discover how industry expertise and data intelligence enable practical AI deployment.

Register for the event now!

REGISTER!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Share News tips for the iTWire Journalists? Your tip will be anonymous

Subscribe to Newsletter

*  Enter the security code shown: img0

WEBINARS & EVENTS

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments