OT vs IT Security
Operational Technology (OT) refers to the hardware and software that monitors and controls physical processes - SCADA systems, PLCs, RTUs, DCS, and safety instrumented systems. Information Technology (IT) refers to traditional computing infrastructure - servers, networks, databases, and business applications. Securing these two environments requires fundamentally different approaches.
Key Differences
IT Security Priorities
CIA order: Confidentiality → Integrity → Availability
Patching: Regular, often automated
Lifecycle: 3-5 year refresh cycles
Downtime tolerance: Reboots accepted for updates
Impact of breach: Data loss, financial, reputational
OT Security Priorities
CIA order: Availability → Integrity → Confidentiality
Patching: Rare, requires plant shutdowns
Lifecycle: 15-25 year equipment lifecycles
Downtime tolerance: Zero - systems must run 24/7
Impact of breach: Physical damage, explosions, environmental disaster, loss of life
The IT/OT Convergence Problem
Historically, OT systems were isolated ("air-gapped") from corporate IT networks and the internet. Digital oilfields break this isolation by connecting SCADA to historians, cloud platforms, and dashboards - creating pathways that attackers can exploit.
Expanded Attack Surface
Every connection between OT and IT is a potential entry point. Cloud connectivity, remote access VPNs, vendor support connections, and USB drives all introduce risk.
Legacy Systems
Many OT systems run on Windows XP or older operating systems that no longer receive security patches. Replacing them is prohibitively expensive and operationally disruptive.
Cultural Gap
OT engineers prioritise uptime and reliability; IT security teams prioritise patching and access control. These priorities often conflict, and neither team fully understands the other's constraints.
