Feb. 6, 2023 | Cybersecurity

OT cybersecurity: ‘do no harm’ doesn’t mean ‘do nothing’

OT cybersecurity: ‘do no harm’ doesn’t mean ‘do nothing’

In our previous blog, Why operational technology may risk your cybersecurity efforts, we discussed how OT systems had been historically “closed” and how they’ve evolved over time to become more “open” and able to leverage common off-the-shelf IT technologies. With the advent of this industrywide shift, we identified a departmental clash between OT and IT personnel on how to best handle routine system maintenance and mitigate cybersecurity risks. 
 
Safety is the primary goal of any OT process environment. From a people standpoint, OT personnel support this goal with daily safety briefings and performed Process Hazard Analysis (PHA) prior to making changes. This ensures that safety is always being considered before and after performing work. 
 
On the machinery and technology side, safety is achieved with vendors who can deploy systems that are certified as being safe and secure. These systems are programmed to prevent unauthorized system changes that could lead to system downtime—or worse. This is all supported by a common phrase used by OT personnel: “Do no harm.” 

The concept of “do no harm” extends beyond physical safety 

We often hear OT professionals use this phrase as justification for why their systems are unable to be upgraded or patched. Why? Any changes might potentially infringe on the “do no harm” edict: Change could introduce instability or cause outages, and it’s more straightforward to maintain system health by simply preventing changes. This makes it difficult to innovate and digitize aging organizations. That mindset doesn’t sit well with IT personnel. 
 
IT typically takes a heavy-handed approach to force upgrades upon OT systems. But they do so without necessary planning and while performing due diligence related to OT requirements and specific vendor tweaks. Oftentimes the result is a less-than-stellar upgrade experience or unplanned system downtime. In short, “do no harm” actually leads to harm. 
 
Experiences like these further validate the OT’s rationale of “do no harm.” So, how do organizations break the cycle? Most OT-related cyberattacks could have been prevented with basic system protection measures and maintenance such as antivirus, patching, and system hardening. 

How your organization can get a better handle managing OT equipment 

1. Listen to knowledgeable OT personnel 

IT should strongly consider taking a vested interest in understanding the concerns and motivations of the OT group. Safety is paramount, and negative impact to productivity translates into lost dollars. Avoid actions that jeopardize either one. The OT group tends to have a more experienced workforce with incredible knowledge of the environment, so leverage them for insight, guidance, and opinions on how best to partner with them on managing their environment. 

2. Be patient and collaborate 

Work with OT vendors during cybersecurity program initiatives. Rather than installing corporate standard and assuming that machinery will continue to function correctly, approach the vendor and propose collaborative testing. More often than not, the vendor has seen your software package and knows the correct changes needed to allow proper functionality while maintaining overall system integrity and operation. 

3. Acknowledge differences between the two sides 

Understand the nuances between OT and IT, where separate policy development or governance processes would be valuable. Not every process works for both sides. It can be as simple as appropriate windows for taking downtime for system patching that coincide with production pauses or large initiatives such as security vetting of new vendor systems before they are deployed in the OT environment. 
 
Safety is paramount for any OT environment. But believing in “do no harm” does not mean “do nothing.” Proactive and regular maintenance of OT systems should be performed to support a strong cybersecurity strategy. Gaining a deep understanding of an OT environment, coordinating with vendors on changes, and acknowledging the subtle differences between IT and OT will lead to a better security posture and in turn, fewer outages when performing these changes. 
 
Contact our cybersecurity team and let’s discuss your OT strategy. 

The Conduit: A Product & Tech Blog

Sharing cutting edge ideas, stories, and solutions shaping design, engineering, product, and beyond. View more idea sparks here.

Dan Frein

Dan is a senior architect in West Monroe’s technology practice.

Scott Crider

Scott is a senior principal in West Monroe’s technology practice.

Action is everything. We deliver ideas. We move fast. We create for today, tomorrow, and beyond.

Want to get in on the action? Contact us.​