Skip to main content

Posts

NCSC Secure Connectivity Principle 7: Ensure All Connectivity is Logged and Monitored

InfoSec Made Easy OT Security Leadership | NCSC Guidance Series Why logging and monitoring is your last line of defense in OT — and what effective OT visibility actually requires All security controls, however well-designed, carry the possibility of failure. Boundaries can be breached. Segmentation controls can be circumvented. Authentication mechanisms can be defeated. Protocols can be exploited. There is no configuration of preventive controls that provides absolute certainty that an OT environment will never be compromised. This is not a counsel of despair — it is a statement of operational reality that serious security programs accept and design around. Principle 7 of the NCSC's Secure Connectivity Principles for Operational Technology is the control that remains effective even when every other control has been bypassed: comprehensive logging and monitoring. When an attacker defeats your boundary, navigates your segmentation, and reaches a critical OT ass...
Recent posts

NCSC Secure Connectivity Principle 6: Limit the Impact of Compromise

InfoSec Made Easy OT Security Leadership | NCSC Guidance Series Assume breach, contain the blast radius — designing OT environments to survive compromise There is a maturity progression in how organizations think about security. The first stage is prevention — the belief that with enough controls, attacks can be stopped at the perimeter. The second stage is detection — the recognition that prevention is never perfect, and that the ability to detect when something has gone wrong is as important as trying to prevent it. The third stage, which the most mature security programs operate at, is resilience — designing systems so that when a compromise occurs, its impact is contained, its blast radius is limited, and recovery is achievable without catastrophic operational disruption. Principle 6 of the NCSC's Secure Connectivity Principles for Operational Technology operates squarely in that third stage. It does not assume that the boundary controls in Principle 5...

NCSC Secure Connectivity Principle 5: Harden Your OT Boundary

InfoSec Made Easy OT Security Leadership | NCSC Guidance Series Why the OT boundary is your primary defensive line — and what it takes to make it hold In most OT environments, the devices and systems inside the network were not designed to defend themselves. Legacy PLCs, older SCADA components, and even relatively modern field devices often lack the security capabilities needed to withstand direct attack — they have no meaningful authentication for incoming commands, no ability to detect or respond to malicious traffic, and limited logging capabilities that would allow forensic investigation after a compromise. Their security was always intended to be provided by the environment around them, not by themselves. This reality makes the OT boundary the primary line of defense. If the boundary holds, the internal systems are protected despite their own security limitations. If the boundary fails, those internal systems are exposed with minimal ability to detect or r...

NCSC Secure Connectivity Principle 4: Use Standardised and Secure Protocols

InfoSec Made Easy OT Security Leadership | NCSC Guidance Series Why the protocols your OT systems use to communicate are as important as the networks they run on Most cybersecurity professionals spend a great deal of time thinking about network architecture — firewalls, segmentation, DMZs, access controls. These are important, and the preceding principles in this series address them directly. But there is a layer of security that sits beneath network controls and is often overlooked in OT environments: the protocols that devices use to communicate with each other. Even a well-segmented, carefully controlled OT network can be undermined by protocols that allow unauthenticated commands, lack encryption, or permit malicious data injection that bypasses perimeter controls. Principle 4 of the NCSC's Secure Connectivity Principles for Operational Technology addresses this layer explicitly. It requires organizations to evaluate the security properties of the protoco...

NCSC Secure Connectivity Principle 3: Centralise and Standardise Network Connections

InfoSec Made Easy OT Security Leadership | NCSC Guidance Series Why OT connectivity complexity is a security problem — and how structured architecture solves it Walk through the network diagram of most mature OT environments and you will find the same story told in topology: an accumulation of connectivity decisions made over years and decades, each individually justified at the time, collectively creating a tangle of access paths, vendor tunnels, remote monitoring links, and business system integrations that no single person fully understands. Each connection was added to solve a specific operational problem. No one was tasked with managing the cumulative result. This is the problem that Principle 3 of the NCSC's Secure Connectivity Principles for Operational Technology directly addresses. The connectivity models of OT systems are inherently complex, involving multiple stakeholders, evolving business requirements, and layers of integration that build up o...