IOT

Building a Secure IT/OT/IoT Infrastructure in the Real World

When IT, OT, and IoT Collide

As IT, OT, and IoT converge, the security landscape fundamentally changes. Environments that were once more or less isolated are suddenly connected, legacy systems meet modern platforms, and business‑critical processes are exposed in ways they were never designed for.

The challenge is rarely a lack of will to do the right thing — that almost always exists. The hard part is understanding how to actually do it in reality, in environments that already exist, are already in use, and cannot be rebuilt from scratch without someone becoming very, very upset.

These are a few principles that repeatedly prove to be decisive.


OT Is Not IT — and That Has to Be Okay

One of the most common mistakes is treating OT environments as if they were traditional IT. That rarely ends well.

In reality, OT often involves:

  • Systems that cannot be patched regularly — or at all
  • Limited or non‑existent authentication
  • Equipment with very long lifecycles
  • Availability requirements that outweigh almost everything else

Accepting this is not giving up on security — it is being realistic. When fundamental protections are missing, you must instead work with compensating controls.

A classic and highly effective example is network segmentation: protecting vulnerable systems by strictly limiting which flows are allowed to reach them at all.


Visibility First — Get “Eyes and Hands” into the Environment

Many organizations want to start with the perfect architecture and full segmentation. The problem is that this often takes a long time. In the meantime, you are… fairly blind.

Putting the following in place early:

  • Monitoring
  • Logging
  • Detection
  • Incident response capability

…provides immediate impact. A SOC function — internal or external — creates visibility into what is actually happening and makes it possible to act when something deviates from the norm.

This is often one of the most valuable first steps, even if the rest of the infrastructure is still far from ideal.


Network Segmentation — the Foundation Everything Else Rests On

No matter where you start, almost all roads eventually lead to segmentation.

By separating IT, OT, and IoT, creating clear zones, and allowing only necessary flows, you reduce both the likelihood of compromise and the impact when something goes wrong. Because it will. Sooner or later.

At the same time, segmentation is often complex, time‑consuming, and sometimes politically sensitive. The question is therefore not if it should be done, but how, in what order — and what should actually be segmented.

We see everything from completely horrific segmentations that protect nothing at all, to environments where segmentation is entirely absent. Knowing how to do it right is not trivial.


From Network to Identity

In many OT environments, access is still based on IP addresses, network location, and implicit trust. It works — until it doesn’t. And when it fails, it usually becomes very painful.

For some reason, many still believe that threat actors follow the rules. They don’t.

Gradually shifting toward identity‑based access is therefore a critical step:

  • Who are you?
  • Why do you need access?
  • When — and for how long?

PAM solutions, jump hosts, and strong authentication often serve as a bridge between old and new. They provide better control and also solve a very common problem: the management of shared and generic admin accounts.

If you want to do it properly, you should also use PAWs. A jump host, after all, is only marginally better than nothing at all.


Vendors Are Part of Your Security Model

In OT and IoT, vendors are often deeply embedded in the environment — sometimes more so than your own IT organization.

Without clear security requirements, you risk:

  • Insecure remote access
  • Lack of logging and traceability
  • Dependency on solutions that cannot be updated or controlled

Starting to impose long‑term security requirements is rarely easy, but absolutely necessary. Your security level will never be higher than the weakest external link.

We have seen solutions where vendors are connected in ways that make them the single largest risk factor. And when you also hear things like:

“We use the same password for all service accounts at all our customers”

— and realize that those customers are interconnected through the vendor — it becomes uncomfortable. For real.


Remote Access and the Internet — Often the Fastest Impact

In many environments, there is a historically evolved mix of:

  • Different remote access tools
  • Temporary solutions that became permanent
  • Generous outbound internet access

Mapping this and replacing it with a single, controlled solution often delivers rapid risk reduction. When outbound traffic is restricted, many unwanted remote access paths disappear automatically.

A question that often ask the customer is:

“Why does that sewing machine need access to Facebook?”

There is rarely a good answer.


Draw the Target Architecture — Even If You Can’t Build It Today

Even if you don’t have the ability to rebuild everything, it is invaluable to:

  • Sketch how you would design the environment from scratch
  • Define clear principles for zones, flows, and access
  • Use the target architecture as a compass for future decisions

This creates alignment between IT, OT, and the business — and ensures that every improvement becomes a step in the right direction, rather than an isolated point solution.


Final Thought

Understanding what actually happens when the major incident occurs is crucial. Many still believe it’s about a quick restore, and then everything goes back to normal.

It never does.

A threat actor has been inside. It is a crime scene. And if you don’t understand how they got in, they will do it again.

Trusec will run a full day of sessions with this as a topic, maybe you should attend (the event is in Swedish)

Konferens med Truesec – Processteknik


In my everyday work i recover broken enviroment, i rebuild and build new IT, OT and IoT envirment that can stand a fight against threat acttors, haredware failure and a really bad day, need to know more, ping me.

Mikael Nyström

Categories: IOT, Security

Tagged as: , , , , , , ,

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.