HOME

TheInfoList



OR:

Operational technology (OT) is hardware and
software Software consists of computer programs that instruct the Execution (computing), execution of a computer. Software also includes design documents and specifications. The history of software is closely tied to the development of digital comput ...
that detects or causes a change, through the direct monitoring and/or control of industrial equipment,
asset In financial accounting, an asset is any resource owned or controlled by a business or an economic entity. It is anything (tangible or intangible) that can be used to produce positive economic value. Assets represent value of ownership that can b ...
s, processes, and events''.'' The term has become established to demonstrate the technological and functional differences between traditional
information technology Information technology (IT) is a set of related fields within information and communications technology (ICT), that encompass computer systems, software, programming languages, data processing, data and information processing, and storage. Inf ...
(IT) systems and
industrial control system An industrial control system (ICS) is an electronic control system and associated instrumentation used for industrial process control. Control systems can range in size from a few modular panel-mounted controllers to large interconnected and in ...
s (ICS) environment, the so-called "IT in the non-carpeted areas".


Examples

Examples of operational technology include: *
Programmable logic controllers A programmable logic controller (PLC) or programmable controller is an industrial computer that has been ruggedized and adapted for the control of manufacturing processes, such as assembly lines, machines, robotic devices, or any activity that ...
(PLCs) * Supervisory control and data acquisition systems (SCADA) * Distributed control systems (DCS) * Remote Terminal Unit (RTU) *
Computer numerical control Computer numerical control (CNC) or CNC machining is the Automation, automated control of machine tools by a computer. It is an evolution of numerical control (NC), where machine tools are directly managed by data storage media such as punched ...
(CNC) systems, including computerized machine tools * Scientific equipment (e.g. digital
oscilloscope An oscilloscope (formerly known as an oscillograph, informally scope or O-scope) is a type of electronic test instrument that graphically displays varying voltages of one or more signals as a function of time. Their main purpose is capturing i ...
s) *
Building Management System Building automation (BAS), also known as building management system (BMS) or building energy management system (BEMS), is the automatic centralized control of a building's HVAC (heating, ventilation and air conditioning), electrical, lighting, ...
(BMS) and building automation systems (BAS) * Lighting controls both for internal and external applications * Energy monitoring, security and safety systems for the built environment * Transportation systems for the built environment


Technology

The term usually describes environments containing
industrial control system An industrial control system (ICS) is an electronic control system and associated instrumentation used for industrial process control. Control systems can range in size from a few modular panel-mounted controllers to large interconnected and in ...
s (ICS), such as
supervisory control and data acquisition SCADA (an acronym for supervisory control and data acquisition) is a control system architecture comprising computers, networked data communications and graphical user interfaces for high-level supervision of machines and processes. It also cove ...
(SCADA) systems,
distributed control system A distributed control system (DCS) is a computerized control system for a process or plant usually with many control loops, in which autonomous controllers are distributed throughout the system, but there is no central operator supervisory contro ...
(DCS),
remote terminal unit A remote terminal unit (RTU) is a microprocessor-controlled electronic device that interfaces objects in the physical world to a distributed control system or SCADA (supervisory control and data acquisition) system by transmitting telemetry d ...
s (RTU) and
programmable logic controller A programmable logic controller (PLC) or programmable controller is an industrial computer that has been ruggedized and adapted for the control of manufacturing processes, such as assembly lines, machines, robotic devices, or any activity that ...
s (PLC), as well as dedicated networks and organization units. The built environment, whether commercial or domestic, is increasingly controlled and monitored via 10s, 100s, and 1,000s of Internet of Things (IoT) devices - and Industrial Internet of Things (IIoT). In this application space, these IoT devices are both interconnected via converged technology edge IoT platforms and or via "cloud" based applications.
Embedded System An embedded system is a specialized computer system—a combination of a computer processor, computer memory, and input/output peripheral devices—that has a dedicated function within a larger mechanical or electronic system. It is e ...
s are also included in the sphere of operational technology (e.g. smart instrumentation), along with a large subset of scientific data acquisition, control, and computing devices. An OT device could be as small as the
engine control unit An engine control unit (ECU), also called an engine control module (ECM), is a device that controls various subsystems of an internal combustion engine. Systems commonly controlled by an ECU include the fuel injection and ignition systems. The ...
(ECU) of a car or as large as the distributed control network for a national electricity grid.


Systems

Systems that process operational data (including electronic, telecommunications, computer systems and technical components) are included under the term operational technology. OT systems can be required to control valves, engines, conveyors and other machines to regulate various process values, such as temperature, pressure, flow, and to monitor them to prevent hazardous conditions. OT systems use various technologies for hardware design and communications protocols, that are unknown in IT. Common problems include supporting legacy systems & devices and numerous vendor architectures and standards. Since OT systems often supervise industrial processes, most of the time availability must be sustained. This often means that real time (or near-real time) processing is required, with high rates of reliability and availability. Laboratory systems (heterogenous Instruments with embedded computer systems or often non standardized technical components used in their computer systems) are commonly a borderline case between IT and OT since they mostly clearly don't fit into standard IT scope but also are often not part of OT core definitions. This kind of environment may also be referred to as industrial information technology (IIT).


Protocols

Historical OT networks utilized proprietary protocols optimized for the required functions, some of which have become adopted as 'standard' industrial communications protocols (e.g.
DNP3 Distributed Network Protocol 3 (DNP3) is a set of communications protocols used between components in process automation systems. Its main use is in utilities such as electric and water companies. Usage in other industries is not common. It was ...
,
Modbus Modbus (or MODBUS) is a client/server data communications protocol in the application layer. It was originally designed for use with programmable logic controllers (PLCs), but has become a ''de facto'' standardization, standard communication pr ...
,
Profibus Profibus (usually styled as ''PROFIBUS'', as a portmanteau for Process Field Bus) is a standard for fieldbus communication in automation technology and was first promoted in 1989 by BMBF (German department of education and research) and then u ...
,
LonWorks LonWorks or Local Operating Network is an open standard (ISO/IEC 14908) for networking platforms specifically created to address the needs of control applications. The platform is built on a protocol created by Echelon Corporation for networking ...
, DALI,
BACnet BACnet is a communication protocol for building automation and control (BAC) networks. It is defined by ANSI/ASHRAE 135 and ISO 16484-5. BACnet was designed to allow communication of building automation and control systems for applications such ...
, KNX, EnOcean and OPC-UA). More recently IT-standard network protocols are being implemented in OT devices and systems to reduce complexity and increase compatibility with more traditional IT hardware (e.g. TCP/IP); this however has had a demonstrable reduction in security for OT systems, which in the past have relied on air gaps and the inability to run PC-based malware (see
Stuxnet Stuxnet is a Malware, malicious computer worm first uncovered on June 17, 2010, and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsibl ...
for a well-known example of this change).


Origins

The term operational technology as applied to industrial control systems was first published in a research paper from Gartner in May 2006 (Steenstrup, Sumic, Spiers, Williams) and presented publicly in September 2006 at the Gartner Energy and Utilities IT Summit. Initially the term was applied to power utility control systems, but over time was adopted by other industrial sectors and used in combination with IoT. A principal driver of the adoption of the term was that the nature of operational technology platforms had evolved from bespoke proprietary systems to complex software portfolios that rely on IT infrastructure. This change was termed IT OT convergence. The concept of aligning and integrating the IT and OT systems of industrial companies gained importance as companies realized that physical assets and infrastructure was both managed by OT systems but also generated data for the IT systems running the business. In May 2009 a paper was presented at the 4th World Congress on Engineering Asset Management Athens, Greece outlining the importance of this in the area of asset management Industrial technology companies such as GE, Hitachi, Honeywell, Siemens, ABB and Rockwell are the main providers of OT platforms and systems either embedded in equipment or added to them for control, management and monitoring. These industrial technology companies have needed to evolve into software companies rather than being strictly machine providers. This change impacts their business models which are still evolving


Security

From the very beginning security of operational technology has relied almost entirely on the standalone nature of OT installations, security by obscurity. At least since 2005 OT systems have become linked to IT systems with the corporate goal of widening an organization's ability to monitor and adjust its OT systems, which has introduced massive challenges in securing them. Approaches known from regular IT are usually replaced or redesigned to align with the OT environment. OT has different priorities and a different infrastructure to protect when compared with IT; typically IT systems are designed around 'Confidentiality, Integrity, Availability' (i.e. keep information safe and correct before allowing a user to access it) whereas OT systems require 'realtime control and functionality change flexibility, availability, integrity, confidentiality' to operate effectively (i.e. present the user with information wherever possible and worry about correctness or confidentiality after). Other challenges affecting the security of OT systems include: * OT components are often built without basic IT security requirements being factored in, aiming instead at achieving functional goals. These components may be insecure by design and vulnerable to cyber-attacks. * Vendor dependency: Due to the general lack of knowledge related to industrial automation, most companies are heavily dependent on their OT vendors. This leads to
vendor lock-in In economics, vendor lock-in, also known as proprietary lock-in or customer lockin, makes a customer dependent on a vendor for products, unable to use another vendor without substantial switching costs. The use of open standards and alternati ...
, eroding the ability to implement security fixes. * Critical assets: Because of OT's role in monitoring and controlling critical industrial process, OT systems are very often part of national critical infrastructures. As such they may require enhanced security features as a result.


Common vulnerabilities

OT often control and monitor important industrial processes, critical infrastructure, and other physical devices. These networks are vital for the proper functioning of various industries, such as manufacturing, power generation, transportation and our society. Most common vulnerabilities and attack vectors should be addressed, whereof : # Legacy systems and outdated technology: Many OT networks still rely on older hardware and software that may not have been designed with security in mind, making them more susceptible to cyber attacks. # Lack of segmentation: Inadequate network segmentation can lead to a compromised device in one part of the network, which may allow an attacker to access other parts of the network, increasing the overall risk. # Insufficient authentication and access control: Weak authentication mechanisms and access controls can enable unauthorized users to gain access to sensitive systems and data. # Insecure communication protocols: Many OT networks use proprietary or legacy communication protocols, which may lack encryption or other security features, making them vulnerable to eavesdropping and data tampering. # Limited visibility and monitoring: OT networks often lack comprehensive monitoring and visibility tools, which makes it difficult to detect and respond to potential security incidents. # Insider threats: Malicious insiders or negligent employees can exploit their access to OT networks to cause harm or steal sensitive data. # Integration with IT networks: The increasing convergence of IT and OT networks can introduce new vulnerabilities and attack vectors, as vulnerabilities in one network can potentially be exploited to compromise the other. # Supply chain risks: Compromised hardware or software components in the OT network can introduce vulnerabilities that attackers can exploit. # Physical security: OT networks involve physical devices and infrastructure that can be susceptible to physical attacks, such as tampering or theft. # Lack of cybersecurity awareness and training: Many organizations do not adequately train their employees on the importance of cybersecurity, leading to an increased risk of human error and insider threats. To protect against these risks, organizations should adopt a proactive, multi-layered security approach, including regular risk assessments, network segmentation, strong authentication, and access controls, as well as continuous monitoring and incident response capabilities.


Critical infrastructure

Operational technology is widely used in refineries, power plants, nuclear plants, etc. and as such has become a common, crucial element of critical infrastructure systems. Depending on the country there are increasing legal obligations for Critical Infrastructure operators with regards to the implementation of OT systems. In addition certainly since 2000, 100,000's of buildings have had IoT building management, automation and smart lighting control solutions fitted These solutions have either no proper security or very inadequate security capabilities either designed in or applied. This has recently led to bad actors exploiting such solutions' vulnerabilities with ransomware attacks causing system lock outs, operational failures exposing businesses operating in such buildings to the immense risks to health and safety, operations, brand reputation and financial damage


Governance

There is a strong focus put on subjects like IT/OT cooperation or IT/OT alignment in the modern industrial setting. It is crucial for the companies to build close cooperation between IT and OT departments, resulting in increased effectiveness in many areas of OT and IT systems alike (such as change management, incident management and security standards) A typical restriction is the refusal to allow OT systems to perform safety functions (''particularly'' in the nuclear environment), instead relying on hard-wired control systems to perform such functions; this decision stems from the widely recognized issue with substantiating software (e.g. code may perform marginally differently once compiled). The
Stuxnet Stuxnet is a Malware, malicious computer worm first uncovered on June 17, 2010, and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsibl ...
malware is one example of this, highlighting the potential for disaster should a safety system become infected with malware (whether targeted at that system or accidentally infected).


Sectors

Operational technology is utilized in many sectors and environments, such as: * Oil and gas * Power and utilities * Chemicals manufacturing * Water treatment * Waste management * Transportation * Scientific experimentation * Critical manufacturing * Building management and automation * Building lighting controls and automation * Mining and mineral processing


References

{{Reflist Control engineering