View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update |
|---|---|---|---|---|---|
| 0010422 | 10000-002: Security | Spec | public | 2025-07-08 15:19 | 2025-07-08 22:44 |
| Reporter | Paul Hunkar | Assigned To | Paul Hunkar | ||
| Priority | normal | Severity | minor | Reproducibility | always |
| Status | assigned | Resolution | open | ||
| Product Version | 1.05 | ||||
| Target Version | 1.05.06 RC1 | ||||
| Summary | 0010422: Describe difference in IT vs OT security concern | ||||
| Description | Since IT is becoming more involved in OT security, it is important to include a section describing the varying priority of security concern for IT installation vs OT installations. for OT the running process is most important, even momentary down time can be fatal. | ||||
| Tags | No tags attached. | ||||
| Commit Version | |||||
| Fix Due Date | |||||
|
|
The following is a propose start to the text 4.3 OT vs IT – differences in security requirements Figure 2 - IT vs OT Security priority |
|
|
|
|
|
NIST Special Publication NIST SP 800-82r3 Guide to Operational Technology (OT) Security As OT systems adopt IT solutions to enable corporate business systems connectivity and remote access capabilities and are designed and implemented using industry-standard computers, operating systems (OSs), and network protocols, they have begun to resemble IT systems. This integration supports new IT capabilities, but it provides significantly less isolation for OT from the outside world than predecessor systems, creating a greater need to secure OT systems. The increasing use of wireless networking places OT implementations at greater risk from adversaries who are in relatively close physical proximity but do not have direct physical access to the equipment. While security solutions have been designed to deal with these issues in typical IT systems, special precautions must be taken when introducing these same solutions to OT environments. In some cases, new security solutions that are tailored to the OT environment are needed. Although some characteristics are similar, OT also has characteristics that differ from traditional information processing systems. Many of these differences stem from the fact that logic executing in OT has a direct effect on the physical world. Some of these characteristics include significant risk to the health and safety of human lives, serious damage to the environment, and severe financial issues, such as production losses, negative impacts to the Nation’s economy, and the compromise of proprietary information. OT has unique performance and reliability requirements and often uses OSs and applications that may be considered unconventional to typical IT personnel. Furthermore, the goals of safety and efficiency sometimes conflict with security in the design and operation of OT systems. |
| Date Modified | Username | Field | Change |
|---|---|---|---|
| 2025-07-08 15:19 | Paul Hunkar | New Issue | |
| 2025-07-08 15:19 | Paul Hunkar | Status | new => assigned |
| 2025-07-08 15:19 | Paul Hunkar | Assigned To | => Paul Hunkar |
| 2025-07-08 22:34 | Paul Hunkar | Note Added: 0023098 | |
| 2025-07-08 22:39 | Paul Hunkar | Note Added: 0023099 | |
| 2025-07-08 22:39 | Paul Hunkar | File Added: ITvsOT.jpg | |
| 2025-07-08 22:44 | Paul Hunkar | Note Added: 0023100 |