IAM OT Security Risks Call for Strategic Defenses

0
180

Today’s technology requires today’s identity and access management (IAM). In the past, operational technology (OT) systems were physically and logically separated from a company’s enterprise corporate business environment and the external world. That served as a control to protect them from common cyberattacks. Starting in the 1970s, serial-based analog processes controlled, managed and monitored these OT systems and their infrastructure through serial-based analog processes. These ran using proprietary protocols, software and products. Robust physical security controls managed worker access to these environments and limited the exposure to outside threats.  

Over the past few years, companies have transformed their OT environments. Modern digital OT technologies use similar techniques and concepts as those in corporate IT systems. For example, they now connect OT systems using standard TCP/IP network protocols and network technologies such as firewalls, switches and routers. Developers make industrial applications that can run on common operating systems connected to Internet of Things (IoT) devices or robotics. In addition, companies…

Read More…

Актуальные книги на английском