logo
Beyond Firewalls: How To Fix Identity Gaps In Operational Technology

Beyond Firewalls: How To Fix Identity Gaps In Operational Technology

Forbes30-06-2025
Peter Hill is the chief executive officer of Gathid.
In cybersecurity, few environments are as mission-critical—and as misunderstood—as operational technology (OT).
Unlike traditional IT, which is built for centralization, cloud integration and continuous monitoring, OT is defined by air-gapped networks, legacy software and physical consequences. OT engineers aren't focused on IAM workflows or federated identities. Their priorities are uptime, safety and compliance with engineering standards that often predate the cloud.
That siloed mindset, while understandable, is becoming increasingly risky.
As critical infrastructure becomes more digital, bridging the IT-OT divide has become one of cybersecurity's most urgent—and overlooked—priorities.
When Identity Is Off The Grid
While IT teams have matured their identity governance practices—deploying automated provisioning, SSO and conditional access—OT environments remain fragmented. Each site or facility often runs its own isolated identity domain, with local directories, standalone user accounts and access policies maintained by engineers who don't report to IT or security.
Consider a typical OT setup: a company with dozens of geographically dispersed plants, each with its own network and Active Directory instance. Credentials are created locally. Systems authenticate users only within that environment. If someone logs into a terminal at Site A, it may not matter if they were terminated from the corporate HR system a week ago—Site A likely doesn't know.
This disconnection between corporate identity systems and on-the-ground reality creates one of their most persistent and underrecognized access risks: local identities that outlast their intended use.
These aren't theoretical problems. They're systemic and persistent and often go unnoticed—until they're exploited.
Why OT Teams Push Back (And Why They're Not Wrong)
Security teams often propose tighter integration between IT and OT systems. OT engineers often resist: 'Don't touch anything. We're air-gapped for a reason.'
This isn't fear of change. It's adherence to a critical safety protocol.
Introducing new data or configurations into an OT environment—whether it's a patch, an IAM sync or a policy update—risks interfering with sensitive control systems. The result could be downtime, equipment failure or even physical harm.
So, OT teams do what makes sense in their world: They isolate. At best, they may allow data to be passed out, but rarely in. In many environments, the only way to extract identity data is to physically walk it out—on a USB stick, if necessary.
And that's the paradox: OT systems are air-gapped for safety, but the people using them are not. They shift roles, join projects and leave companies. If their identity data in OT isn't updated accordingly, you end up with active access and no accountability.
A New Approach: Digital Twins And Knowledge Graphs
Traditional IAM tools aren't built for the OT. They depend on live integrations, API access and real-time syncing—all nonstarters in these environments. What's needed is a model that delivers insight without direct system access.
This is where digital twins and knowledge graphs come into play.
A digital twin is a virtual model of your identity ecosystem. It consolidates user, system and access data without modifying the live environment.
In OT, this means taking snapshots of local identities, loading them into the twin and analyzing them in a safe, isolated environment. You get the visibility you need, without the risk.
A knowledge graph maps relationships between users, systems, roles and policies. It highlights conflicting roles, orphaned service accounts and mismatched access paths.
In OT, this approach can help you take actions to ensure broader coverage and better performance:
• Detect redundant or risky access
• Map local identities to the broader organization
• Spot discrepancies between HR records and OT access points
• Prioritize remediation without needing to standardize every system
Together, digital twins and knowledge graphs bring clarity to complexity, without forcing convergence.
The Leadership Imperative: Visibility Without Disruption
For CISOs and CIOs, this isn't just a technical challenge—it's a leadership imperative.
In boardrooms and security committees, the question has shifted from 'Are we compliant?' to 'Can we prove we're secure—right now?'
That proof depends on visibility. And in the OT world, visibility has long been the missing piece.
By modeling identity environments without altering them, security leaders can uncover risk and align systems for better compliance and performance:
• Surface hidden access risks
• Align physical and digital access
• Demonstrate compliance to auditors and regulators
• Enable OT teams to act on their own terms
Just as important, this approach respects OT's operational boundaries. You're not forcing system changes. You're enabling insight and giving ownership so teams act with confidence.
It's Not About Control—It's About Collaboration
The future of OT identity security isn't about forcing integration or dismantling air gaps. It's about building shared understanding—so when someone leaves the company, every system knows. When a role changes, access adjusts. And when asked 'Who has access, and why?' security leaders can answer with confidence and evidence.
The solution isn't more control. It's better modeling and mapping—revealing what already exists so organizations can fix gaps without disrupting what works.
Because in OT, what you don't touch can still hurt you. But what you can see, you can secure.
Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

SIGA to Host Business Update Call on August 5, 2025 Following Release of Second-Quarter 2025 Results
SIGA to Host Business Update Call on August 5, 2025 Following Release of Second-Quarter 2025 Results

Yahoo

time44 minutes ago

  • Yahoo

SIGA to Host Business Update Call on August 5, 2025 Following Release of Second-Quarter 2025 Results

NEW YORK, July 29, 2025 (GLOBE NEWSWIRE) -- SIGA Technologies, Inc. (SIGA) (Nasdaq: SIGA), a commercial-stage pharmaceutical company, today announced that management will host a webcast and conference call to provide a business update at 4:30 P.M. ET on Tuesday, August 5, 2025. Participating in the call will be Diem Nguyen, Chief Executive Officer, and Daniel Luckshire, Chief Financial Officer. A live webcast of the call will also be available on the Company's website at in the Investor Relations section of the site, or by clicking here. Please log in approximately 5-10 minutes prior to the scheduled start time. Participants may access the call by dialing 1-800-717-1738 for domestic callers or 1-646-307-1865 for international callers. A replay of the call will be available for two weeks by dialing 1-844-512-2921 for domestic callers or 1-412-317-6671 for international callers and using Conference ID: 1130215. The archived webcast will be available in the Investor Relations section of the Company's website. About SIGA SIGA is a commercial-stage pharmaceutical company and leader in global health focused on the development of innovative medicines to treat and prevent infectious diseases. With a primary focus on orthopoxviruses, we are dedicated to protecting humanity against the world's most severe infectious diseases, including those that occur naturally, accidentally, or intentionally. Through partnerships with governments and public health agencies, we work to build a healthier and safer world by providing essential countermeasures against these global health threats. Our flagship product, TPOXX® (tecovirimat), is an antiviral medicine approved in the U.S. and Canada for the treatment of smallpox and authorized in Europe, the UK, and Japan for the treatment of smallpox, mpox (monkeypox), cowpox, and vaccinia complications. For more information about SIGA, visit Contacts:Suzanne Harnettsharnett@ and Investors Media Jennifer Drew-Bear, Edison GroupJdrew-bear@ Holly Stevens, CG Lifehstevens@

Boeing posts smaller loss as jet deliveries rise
Boeing posts smaller loss as jet deliveries rise

Yahoo

time44 minutes ago

  • Yahoo

Boeing posts smaller loss as jet deliveries rise

(Reuters) -Boeing reported a smaller second-quarter loss on Tuesday as the U.S. planemaker ramped up jet production and deliveries, recovering from a regulatory crisis and a major strike that halted most production last year. Shares of the company rose 1.5% in premarket trading. After years of grappling with quality issues and production delays on its flagship 737 MAX, Boeing has cautiously ramped up monthly output this year. In May, the company produced 38 737s. Production has been stable since then, according to the company. "As we continue to execute our Safety & Quality Plan, there's more stability in our operations," CEO Kelly Ortberg said in a letter to Boeing employees on Tuesday. The U.S. Federal Aviation Administration had capped the production of Boeing's best selling 737 MAX jets following a mid-air panel blowout in a nearly new jet in January 2024. "We plan to seek FAA approval to increase to rate 42 when our key performance indicators (KPIs) show that we're ready," Ortberg added. It has delivered 206 737 MAX jets through the first half of the year. Wall Street closely tracks aircraft deliveries, because planemakers collect much of their payment when they hand over jets to customers. Boeing also increased 787 production at its plant in Charleston, South Carolina, from five aircraft a month to seven a month. Through the first half of the year, the planemaker has booked 668 orders, or 625 net orders after cancellations and conversions. An improvement in deliveries marks a pivotal step in Boeing's effort to rebound from years of production disruptions and crises that piled on debt, highlighting the urgency of accelerating output to restore financial stability. The planemaker posted a net loss of $612 million, or 92 cents per share, for the quarter through June, compared with $1.44 billion, or $2.33 per share, a year earlier. However, the planemaker continues to face pressure from supply chain disruptions that have delayed production and limited its ability to meet surging aerospace demand. It posted a loss of nearly $12 billion in 2024 due to challenges across its major business units including charges on its defense programs. It also remains exposed to U.S. President Donald Trump's sweeping tariffs, which could increase parts costs and further strain an already fragile supply chain. Boeing's revenue for the quarter through June rose 35% to $22.75 billion. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store