Principles of Operational Technology (OT) Security Guide
This publication defines principles for operational technology (OT) cyber security and best practices to mitigate cyber threats. It was developed by the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) in cooperation with the following international partners:?
Critical infrastructure organisations provide vital services, including supplying clean water, energy, and transportation, to the public. These organisations rely on operational technology (OT) to control and manage the physical equipment and processes that provide these critical services. As such, the continuity of vital services relies on critical infrastructure organisations ensuring the cyber security and safety of their OT.
Due to the extensive integration of OT in the technical environments of critical infrastructure organisations, and the complex structure of these environments, it can be difficult to identify how business decisions may affect the cyber security of OT, including the specific risks attributed to a decision. Decisions may include introducing new systems, processes, or services to the environment; choosing vendors or products to support the technical environment; and developing business continuity and security-related plans and playbooks. This document is designed to assist organisations make decisions for designing, implementing, and managing OT environments to ensure they are both safe and secure, as well as enable business continuity for critical services.This document is designed to assist organizations making decisions for designing, implementing, and managing OT environments to ensure they are safe and secure, as well as enable business continuity for critical services. The guidance is of moderate technical complexity and assumes a basic understanding of OT cyber security.
The 6 Key Principles For OT Cybersecurity
The document describes the 6 principles that guide the creation and maintenance of a safe, secure critical infrastructure OT environment. This includes:
How To Use This Document
The authoring agencies recommend an OT decision maker apply the six principles presented in this document to help determine if the decision being made is likely to adversely impact the cyber security of the OT environment. If a decision impacts or breaks one or more of the principles of OT cyber security outlined in this document, then it will likely introduce a vulnerability to the OT environment. Such a decision therefore needs to be examined more closely to make sure the right cyber security controls are put in place and that the residual risk after the controls are put in place is acceptable, or, alternatively, the proposal is reconsidered. Quickly filtering decisions to identify those that impact the security of OT will enhance the making of robust, informed, and comprehensive decisions that promote safety, security and business continuity when designing, implementing, and managing OT environments.
The authoring agencies recommend OT decision makers read and understand each principle. This document is intended to be useful for all personnel who need to filter decisions affecting OT, from the leadership of an organisation (including the executives and board members making strategic decisions) down to the technical personnel making tactical and operational decisions.
Technical founder who is working on a couple mvp’s with A level classmates
4 个月Critical infrastructure protection is no longer just a best practice—it’s an absolute necessity. ?? As OT systems bridge the gap between digital operations and essential services like energy, water, and transportation, ensuring their security becomes paramount. ??? The principles shared by the Australian Signals Directorate provide a solid framework to mitigate rising cyber threats. The emphasis on segmentation, supply chain security, and human factors reflects a holistic approach to OT security. It’s great to see collaborative efforts like these driving forward global cybersecurity standards! ??
OK Bo?tjan Dolin?ek
Ingeniero de Sistemas y apasionado de la aviación civil.
5 个月Great resource, and great joint effort of all entities involved! As an engineer in the aviation sector, we have traditionally air gapped our networks, but as new technology requires ever increasing connectivity, it's very useful to see guides like this help us keep OT networks separate from IT. Thank you for the post.
Full Stack Developer | Software Developer | Scrum Master | Business Intelligence (BI)
5 个月What a great resource!
Analista Generico - Especializado en Software
5 个月Estoy de acuerdo