Sicherheit für operative Technologien (OT): Wie das Cyberrisiko bei Konvergenz von IT und OT reduziert werden kann
Bedrohungen identifizieren und potenzieller Angriffe stoppen – durch Beseitigung von IT- und OT-Cybersecurity-Silos
Operative Technologien (OT) werden seit den späten 1960er Jahren in der Fertigung, in Versorgungsunternehmen und in anderen Industrien eingesetzt. Die längste Zeit ging man davon aus, dass diese Technologien vor Angriffen „sicher“ sind, da die meisten OT-Geräte nicht mit externen Netzwerken verbunden waren.
However, in today’s modern industrial and manufacturing facilities, air-gapping is no longer effective, increasing the likelihood of cyberattacks.

Es gibt dokumentierte Fälle von Angriffen, die sich auf nahezu alle vertikalen Produktionsbereiche und kritischen Infrastrukturen auswirken, die man sich vorstellen kann.- „Whitepaper: Vorhersage eines OT-Angriffs“
In manufacturing, for example, OT assets are used in both discrete manufacturing such as automobile production and the pharmaceutical industry, and continuous manufacturing such as water purification and oil production. In these settings, programmable logic controllers (PLCs) or distributed control systems (DCSs) control OT devices
Historically, these devices were physically separated from networks through air-gapping, a security measure to prevent OT devices from connecting to anything else or being exposed to the outside world.
Heute führt die Konvergenz von OT- und IT-Geräten sowie die zunehmende Abhängigkeit vom Internet der Dinge (IoT) jedoch dazu, dass Air-Gapping nicht mehr ausreicht, um OT-Umgebungen abzusichern.
Now, a cyberattack that begins in an IT network can easily traverse into an unsecured OT environment, pushing cybersecurity teams to give OT environments increased attention.
This knowledge base outlines OT cybersecurity challenges and solutions to create a better understanding of OT-related cyber risks and provides recommendations about how to keep your organization safe in this ever-changing and rapidly evolving converged IT and OT world.
Erfahren Sie mehr über diese Themen:
Industrielle Cybersecurity für moderne OT-Umgebungen
Durch die zunehmende Konvergenz zwischen IT und OT entstehen neue Herausforderungen und Risiken für industrielle Cybersecurity. Take a closer look at these challenges and how to mitigate OT security threats.
Mehr erfahrenTenable Connect community for operational technology
Cybersecurity für operative Technologien aufrechtzuerhalten, funktioniert anders als im Bereich herkömmlicher IT-Sicherheit. Benötigen Sie Hilfe? Tenable Connect is the No.1 place to talk about OT, ask questions and share tips.
Mehr erfahrenFrequently Asked OT Questions
Do you have questions about industrial cybersecurity, operational technology or how to keep your OT environment secure? In diesen häufig gestellten Fragen erhalten Sie Antworten.
Mehr erfahrenHow to Choose the Right OT Security Solution
Denken Sie über den Erwerb einer OT-Sicherheitslösung nach? Sie wissen nicht, wo Sie anfangen sollen oder welche Lösung für Ihr Unternehmen am besten geeignet ist? Berücksichtigen Sie diese 6 wesentlichen Fragen in Ihren Überlegungen.
Mehr erfahrenEnd-to End OT Visibility and Other OT Blogs
End-to-end visibility and risk prioritization for all assets are key to securing your converged IT/OT environment. Learn more about the role of exposure management and other important topics in these OT blogs.
Mehr erfahrenSchnelle 2-Minuten-Tipps für OT
Haben Sie zwei Minuten Zeit? In these videos, learn more about automated OT asset discovery, industrial control planes, industrial controllers and more, all in just two minutes.
Mehr erfahrenTenable OT Security: Einheitliche IT/OT-Sicherheit
Schützen Sie Ihr Industrienetzwerk vor Cyberbedrohungen, böswilligen Insidern und menschlichem Fehlverhalten
Tenable OT Security can help you identify threats and predictively prioritize cybersecurity risks and other security vulnerabilities to maximize the safety and reliability of your modern OT environment.
Tenable OT Security bietet:
- Vollständigen Einblick in die konvergente Angriffsoberfläche
- Eine Multi-Detection Engine, die hochriskante Ereignisse und Aktivitäten erfasst, die Ihre OT-Umgebung beeinträchtigen könnten
- Einblick in Ihrer Infrastruktur – vom Netzwerk bis hinunter auf die Ebene einzelner Geräte
- Predictive Prioritization for every asset in your ICS network so you can find vulnerabilities and understand risk level
- Nachverfolgung von benutzerbasierten Änderungen oder Malware im Netzwerk oder auf einem Gerät
Industrielle Cybersecurity für OT-Umgebungen
Angreifer, die es auf Industriebetriebe und kritische Infrastruktur abgesehen haben, nehmen in erster Linie industrielle Controller ins Fadenkreuz. So, how do you keep your ever-expanding attack surface safe?
Tenable OT Security offers a comprehensive security solution for IT and OT security. It can help protect your industrial networks from threats, malicious insiders and other risks with capabilities such as:
- 360-Grad-Sichtbarkeit für umfassenden Einblick in konvergente IT/OT-Umgebungen und Aktivitäten industrieller Steuerungssysteme (Industrial Control System, ICS)
- Eine Multi-Detection Engine, die hochriskante Ereignisse und Verhaltensweisen aufspürt, die Ihr Unternehmen gefährden
- Automatisierte Warnmeldungen bei Richtlinienverstößen und Erkennung der Abweichungen von einer Baseline des Netzwerkverkehrs
- Signatur-Updates, die Crowdsourcing-Daten zur Erfassung neuer Angriffe nutzen
- Passive Erkennung und patentierte Active Querying-Technologie zur Ermittlung von Bedrohungen für Ihr Netzwerk und Ihre OT-Geräte
- Stets aktuelle und detaillierte Bestandsliste mit Risikodaten, die Ihnen helfen, Schwachstellen zu priorisieren und Wartungstätigkeiten zu planen
- Konfigurationskontrolle mit Berichten über Änderungen an OT-Assets, einschließlich speicherprogrammierbarer Steuerungen (SPS), Prozessleitsystemen (PLS) und Mensch-Maschine-Schnittstellen (Human Machine Interfaces, HMI)
Mind the Gap: Roadmap zur Angleichung von IT- und OT-Sicherheit
In OT-Umgebungen sind OT-Geräte zunehmend vernetzt, sodass sich bei der Absicherung Ihres industriellen Netzwerks neue Herausforderungen ergeben. Air-gaps alone are no longer effective because today's industrial attack surface now encompasses both IT and OT. This makes lateral attacks a growing threat. If attackers find a weak link on either side, they can use it as a gateway into your entire organization, quickly gaining access to both information and operations.
An integrated IT/OT security strategy can detect attacks earlier and help your team more effectively identify, investigate and address vulnerabilities and threats across your attack surface.
This white paper explores:- How OT and IT are increasingly converging
- What’s happening in your expanding attack surface and attack vectors
- Issues contributing to a disconnect between IT and OT security practices
- Security and compliance best practices for industrial networks
- Benefits of a converged IT/OT security strategy
Unbeabsichtigte Konvergenz: Ein Leitfaden für den sicheren IT/OT-Betrieb
Operative Technologien spielen in kritischen Infrastrukturen und Industrieumgebungen eine wichtige Rolle. In addition to routers, servers, computers and switches used in traditional IT environments, to operate plants and factories, industries also use OT devices such as distributed control systems (DCSs), programmable logic controllers (PLCs), and human-machine interfaces (HMIs).
While threats that begin in IT can laterally move into your OT environment, OT threats aren’t necessarily the same as IT security risks. Deshalb benötigen Sie auch andere Sicherheitstools und Betriebsrichtlinien, um Ihre OT-Umgebung abzusichern.
This white paper explores:
- Welche Faktoren zunehmende IT/OT-Konvergenz antreiben
- Why air-gapping OT systems is not effective
- Was unbeabsichtigte Konvergenz ist und welche Folgen sie haben kann
- Näheres über Bedrohungsakteure, die versuchen, in Ihre Systeme einzudringen
- How you can plan ahead for OT security including more visibility, better situational analysis and reduction of cyber risk
Top Three Use Cases for Automated OT Asset Discovery and Management
Most ICS networks lack basic security controls and the ability to automatically manage assets like you’d find in more traditional IT environments.
Bedauerlicherweise sind sich Angreifer dessen bewusst – und aus diesem Grund werden ICS-Netzwerke zunehmend zum Ziel von Angriffen.
As your organization looks for ways to defend your ICS systems, automated asset discovery and automated asset management are critical. If you don’t have an up-to-date and accurate ICS asset inventory, you can’t effectively manage OT risks. If you don’t know your risks, you can’t secure your environment.
As your ICS network grows and your IT and OT networks continue to evolve, effective asset management is an increasingly important component of your overall cybersecurity strategy.
This white paper explores:
- Incident response strategies
- How to decrease resolution time and ensure operational continuity
- Compliance with key industry regulations
Cybersecurity in kritischen Infrastrukturen Aktive Absicherung Ihrer industriellen Umgebung im neuen Zeitalter des Misstrauens
Within your industrial control system environment, if you’re using network monitoring only, you may miss a device attack. Network monitoring only gives you about 50% visibility into your converged IT/OT environment and those blind spots put you at risk for being infected for days — or even months — without your knowledge.
Effective OT cybersecurity is more than network monitoring. By adding device-based security measures to your exposure management program, you’ll have better situational awareness about your actual cyber risks so you can plan remediation and defense strategies accordingly.
This white paper explores how to:
- Improve controller integrity by quickly discovering device changes made through physical connections
- Wie Sie Assets erfassen können – auch solche, die nicht über das Netzwerk kommunizieren
- Wie Sie Daten zum „letzten als funktionierend bekannten Zustand“ beibehalten, damit Sie ganzheitliche Backup- und Wiederherstellungsstrategien umsetzen können
- Wie Sie alle routbaren Komponenten Ihres Netzwerks überwachen können
Tenable connect community: Your go-to resource for OT
Tenable Connect community is a place to share common interests in OT security and exchange ideas. Tenable Connect is a great resource to help you make the most of your Tenable products and access fresh ideas about how to keep your OT environment secure.
Hier einige Beispiele für Diskussionen, die derzeit stattfinden:
Avoid Scanning Fragile Devices
There are many fragile devices on each network that cannot be included in active scanning, due to the sensitive nature of such devices. Operational Technology (OT) is the most common category of sensitive devices.
WeiterlesenSecuring Operational Technology from Cyberattacks
Threat actors are increasing attacks on water and wastewater systems (WWS). These attractive OT targets are complex to protect.
Weiterlesen3 Ways to Handle Insider Threats in OT Infrastructure
With blurred lines between IT and OT, the newest threat may come from where you least expect it — inside your organization.
Weiterlesen6 Fragen, die Sie bei der Auswahl einer OT-Sicherheitslösung stellen sollten
When it’s time to choose an OT cybersecurity solution, you want to know if you’re choosing one that meets all of your organization’s unique and specific requirements and if it’s flexible and scalable for future requirements you may have.
To reduce exposures in your OT environment, the solution you choose should support your specific OT devices, including non-disruptive asset discovery (even in older network assets), alerts on critical vulnerabilities, and support for secure OT/IT alignment.
Knowing the right questions to ask upfront can prevent future headaches and ensure you choose the best solution to secure your OT and IT environments. Here are six important questions to consider when evaluating OT security solutions:
-
Ist die Lösung anbieterunabhängig?
Die Lösung sollte all Ihre Protokolle und spezifischen Geräte unterstützen.
-
Bietet die Lösung mehrere Erkennungsmethoden?
The solution should provide coverage both to the network and devices on the network.
-
Erkennt die Lösung bekannte CVEs (Common Vulnerabilities and Exposures) und gibt diesbezüglich Warnmeldungen aus?
Eine Plattform, die die Erfassung von bekannten CVEs in Ihre Sicherheitsrichtlinie einbezieht, beschleunigt die Erkennung.
-
Unterstützt die Lösung neben operativer Technologie auch Informationstechnologie?
The solution should work in conjunction with your already-deployed IT security products such as your security information event management (SIEM) tool, next-generation firewalls (NGFWs) and diode-based firewalls.
-
Unterstützt die Lösung eine sichere Abstimmung von IT und OT?
Jede Umgebung erfordert eigens auf sie ausgelegte Lösungen.
-
Ist die Lösung aus Sicht der Hardware oder aus Sicht der Betriebsumgebung für den Einsatz in einer OT-Umgebung konzipiert?
Die Lösung sollte konfigurierbar sein, damit sie Ihre Anforderungen hinsichtlich des Netzwerks und der physischen Architektur erfüllt.
Trends mit Folgen für die OT-Sicherheit
Whether intentional or accidental, there are several trends increasing attack vectors across OT environments. Here are some common OT trends and how they can impact your organization:
-
Vorsätzliche Konvergenz von IT und OT
By uniting IT and OT and eliminating siloed infrastructures, you may reduce costs and improve operational efficiencies.
-
Unbeabsichtigte Konvergenz von IT und OT
If your organization doesn’t have a convergence strategy, but your employees use IT assets (such as laptops, thumb drives etc.) in OT environments, it can inadvertently create an accidental IT/OT convergence that increases organizational risks.
-
Industry 4.0
Industry 4.0 includes the introduction of IoT tech used to monitor and/or control OT environments and/or assets.
-
Verstärkte Zusammenarbeit
IT and OT teams are collaborating with each other more than ever before. Information and expertise silos are beginning to come down and, in some cases, IT and OT function on the same team.
Because today's cybercriminals can attack from all sides — and attacks laterally creep across IT to OT and vice versa — keep an eye on these trends to ensure comprehensive OT security.
Ein beispielloses Lagebild Ihrer gesamten OT-Umgebung
Tenable OT Security protects your industrial network from malicious insiders, cyber threats and human error. The solution provides deep situational awareness about all the threats that put your OT network at risk so you can maximize the visibility, security and control of your operational technology environment.
Tenable OT Security Blog Bytes

Resiliente OT-Umgebungen schaffen: Schutzmaßnahmen für Stromversorger
One in 10 cyberattacks around the world in 2022 targeted energy organizations, making it the fourth most-attacked industry. With this growing number of attacks on critical infrastructure, it's important to understand how attackers can take advantage of industrial control systems and the role vulnerability management best practice plays in reducing risk, mitigating damage and preventing the shutdown of essential services.

So meistern Sie OT-Herausforderungen: Asset-Inventarisierung und Schwachstellenbewertung
With the convergence of IT and OT devices in industrial environments, comprehensive asset discovery and vulnerability identification and remediation is complex and challenging. In many environments, most OT systems are legacy, customized, or proprietary, which increases cyber threats and complicates mitigation. Responsive and accurate vulnerability detection requires active monitoring and querying of all of your OT devices.

Operational Technology in the DoD: Ensuring a Secure and Efficient Power Grid
To uphold its national defense mission, the U.S. Department of Defense depends on critical infrastructure to manage everything from illuminating command centers to fueling advanced weapons systems. At the heart of this infrastructure are OT devices, including the hardware and software necessary to monitor and control physical processes and systems like the power grid. Unfortunately, the power grid is vulnerable to cyberattacks, and the consequences of an attack could be dire.

Navigating Security Challenges Around OT in the DoD’s Manufacturing Lines
Operational technology has a direct impact on the Department of Defense's manufacturing lines and can play a vital role in improving supply chain management and logistics. As DoD (DoD) integrates OT devices into the Defense Industrial Base (DIB), it introduces new cyber risks and security challenges. Yet, ensuring OT system security is paramount to mobilization, deployment and the sustainability of military operations.

How To Secure Your IT, OT and IoT Assets With an Exposure Management Platform
To stay ahead of today's evolving threat landscape, especially in converged IT/OT environments, your organization needs end-to-end visibility and the ability to prioritize risk across all of your assets — IT, OT and IoT. An exposure management platform like Tenable One enables comprehensive visibility that's critical to ensuring your teams can monitor, analyze and safeguard every component of your digital infrastructure effectively.
OT Security On Demand
Experts Share Ways To Improve Manufacturing Sector IT/OT Security
Manufacturers are facing increased cyber attacks, and evolving cyber threats can negatively impact the factory floor, making it challenging to mature your cybersecurity posture and ensure operational resilience. This webinar explores steps you can take to improve both and avoid becoming a target of a cyberattack.
Learning more about
- Common manufacturing security challenges
- Best practices to mature your cyber hygiene
- Best practices to mature your cyber hygiene
- Lessons learned from recent cyber incidents
Ops or Security? Who Should Own OT Security And Why?
As OT cybersecurity becomes increasingly complex, it can quickly shift OT security responsibilities within your organization. Without a clear plan that details who is responsible for what, you can quickly and unintentionally increase cyber risk. This webinar explores steps you can take to evaluate and mature your existing OT security practices, with insight from industry experts.
Erfahren Sie mehr über diese Themen:
- Why and how to take control of your OT security
- Why OT security is challenging
- Insights from a recent GigaOm Radar for Operational Technology (OT) Security report
- Takeaways from real-world issues that affect IT-OT attack surfaces
OT Security Trends – From the Boardroom to the Industrial Floor
Critical infrastructure faced a range of new and updated cybersecurity regulations in 2023, leading many organizations to rapidly increase their adoption of OT/ICS security best practices. Moving forward, however, new trends also require the same intense focus. This webinar explores recommendations from OT/ISC security experts about these trends and how you can address them.
Erfahren Sie mehr über diese Themen:
- New OT/ICS attack methods and defense measures
- Changes in the cyber insurance market evolving from new regulations
- Which business drivers increase OT/IoT/IIoT adoption
Understanding Key Principles, Challenges and Solutions of Securing OT and Industrial Control Systems
Cybersecurity professionals understand how important it is to ensure IT devices are protected from cyber risk; however, they can overlook OT and industrial control system (ICS) security. This webinar, which features ICS security experts, takes a closer look at OT/ICS security best practices.
Erfahren Sie mehr über diese Themen:
- Unique OT assets and IT/OT convergence complexities
- How to assess OT threats, including new risks
- Best practices to manage OT cybersecurity
- How to decrease the impact of an OT attack
- Basics for a robust OT/ICS security program
Schnelle 2-Minuten-Tipps zum Schutz operativer Technologien
Die Notwendigkeit einer automatisierten Asset-Erfassung
If you don’t know which assets exist within your OT environment, you can’t protect them. This video explores how Tenable OT Security's automated asset discovery tools will help you overcome challenges created by using a mix of manual processes for asset discovery and management. In two minutes, learn how Tenable OT Security:
- Reduces manual labor, time and expense
- Improves your incident response and recovery processes
- Increases program accuracy and efficiencies
- Addresses compliance requirements
- Helps you implement a reliable and effective vulnerability management process
Die Bedeutung der Steuerungsebene
ICS networks employ two types of protocols: data plane protocols to manage physical parameters for ongoing processes and control plane protocols to manage engineering activities. In just two minutes, learn:
- Warum Ihre industrielle Steuerungsebene (Industrial Control Plane, ICP) schwer zu überwachen ist
- How a lack of security controls impacts your industrial control plane
- What potential problems can arise when you don’t monitor your ICP
- How Tenable OT Security can help
Warum industrielle Steuerungen die wichtigsten zu schützenden Assets in ICS-Netzwerken sind
Controllers are the brains of your industrial network, but they are surprisingly vulnerable. That’s because they were designed decades ago with either few protections or none at all, creating OT security risks, which leave you vulnerable for attacks. In two minutes, learn:
- Why networks are often under-protected
- Who can make changes to logic
- Welche potenziell katastrophalen Folgen eine Fortsetzung des Betriebs hätte und wie es bei böswilligen oder irrtümlichen Änderungen um die Sicherheit bestellt ist
- Wie Tenable OT Security vor nicht autorisierten Änderungen schützen kann
Proaktive Sicherheit an beiden Fronten in industriellen Steuerungsumgebungen
Ist Ihre OT-Sicherheitslösung passiver oder aktiver Natur? Vollständiger Schutz besteht nur, wenn Sie Ihr Netzwerk überwachen und zudem die Geräte aktiv abfragen. Eine detaillierte Asset-Inventarisierung und Echtzeit-Informationen sind kritische Komponenten für den Schutz Ihrer konvergenten IT/OT-Umgebung. In two minutes, learn:
- Warum es vielleicht schon zu spät sein könnte, wenn Sie passiv abwarten, bis sich Bedrohungen im Netzwerk abzeichnen
- Wo Ihre blinden Flecken liegen könnten
- Wie Sie sicher und effektiv einen umfassenden Überblick über Ihre gesamte Industrieumgebung gewinnen
Die größten Bedrohungen für industrielle Steuerungssysteme
Angriffe auf industrielle Steuerungssysteme sowie auf Umgebungen mit kritischer Infrastruktur nehmen weiter zu. Wenn Ihr ICS-Netzwerk oder die Infrastruktur kompromittiert werden, kann dies großflächige Schäden anrichten und Leben gefährden. Do you know the top threats to guard against? In two minutes, learn:
- Warum ICS-Systeme heute anfälliger für Angriffe sind als jemals zuvor
- Wie bei Ihnen Kollateralschäden entstehen können, auch wenn Ihr Unternehmen gar nicht das eigentliche Angriffsziel war
- Welche Arten von Bedrohungen in Ihrem Netzwerk vorliegen könnten
- Welche die größten Hindernisse für die Absicherung Ihrer Steuerungen sind
Tenable OT Security: Industrietaugliche Sicherheit für industrielle Systeme
In modern industrial and critical infrastructure environments, an increasing number of devices are now connected to your networks, many of which are internet-facing. This changing OT environment means traditional ways of protecting OT devices, like air-gapping or air walls, are no longer effective.
From malicious insiders and human errors, it’s increasingly challenging to effectively discover, investigate and remediate all the threats lurking against industrial and critical infrastructure environments. Genau aus diesem Grund nehmen OT-Angriffe immer weiter zu.
Effektive OT-Sicherheit setzt vollständige Transparenz, Sicherheit und Kontrolle in Bezug auf alle Bedrohungen voraus, die Ihr Unternehmen gefährden. Tenable OT Security ist die erste einheitliche, risikobasierte Lösung der Branche für konvergente IT/OT-Umgebungen.
Erkennung und Eindämmung von Bedrohungen
Use a multi-detection engine to find potential high-risk events on your network and alert your team so they can respond quickly.
Adaptive Bewertung
Erfassen Sie mehr Informationen als bei passivem Monitoring allein und gewinnen Sie beispiellosen Einblick in Ihre Infrastruktur, ohne Betriebsabläufe zu beeinträchtigen.
Risikobasiertes Schwachstellenmanagement
With Predictive Prioritization, prioritize risks within your ICS network, to mitigate them before attackers exploit vulnerabilities.
Konfigurationskontrolle
Get a full history of device configuration changes over time, complete with a back-up snapshot of your last known good state for faster recovery.
Vollständige Sichtbarkeit
Messen und verwalten Sie all Ihre IT- und OT-Risiken auf einer einzigen Plattform, sodass Sie vollständigen Einblick in Ihre konvergente Angriffsoberfläche gewinnen – unterstützt durch native Integration mit führenden IT-Sicherheitstools.
Enterprise-Management
Get clear situational awareness across your distributed environment, complete with reporting, vulnerability management and centralized security.
Frequently asked questions about OT Security
Was ist operative Technologie (OT)?
Operational technology (OT) represents all of the hardware and software to manage, monitor and control physical devices and processes. Some OT examples are distributed control systems (DCSs), programmable logic controllers (PLCs) and human-machine interfaces (HMIs) etc. Industrial control systems have used OT for manufacturing, transportation and utilities since the 1960s.
Unlike information technology (IT), OT in those industries was not originally connected to outside networks. These devices were primarily air-gapped (physical isolation from unsecured networks) for security; however, air-gapping is no longer effective in today’s connected world, and vulnerabilities in an OT system can leave critical infrastructure at risk of sabotage.
Was ist Sicherheit für operative Technologien (OT)?
Operational technology security includes all the measures you can take to protect your organization’s hardware and software to monitor and manage your physical devices and processes from internal attacks, external attacks or other cyber risks.
Historically, OT involved closed systems. In those closed systems, air-gapping (physical isolation from unsecured networks) was the primary form of security. In today’s highly connected environment, OT security solutions include IT/OT security integration, passive and active threat detection, detailed asset inventory, risk-based vulnerability management and configuration control.
What’s the difference between IT and OT?
There are a few key differences between IT and OT. Information technology is used to store, manage, process and protect information, while operational technology is used to manage, monitor, and control physical devices and processes. IT generally has a stable environment, with a focus on security, a short lifecycle with frequent updating and standard operating systems. OT, on the other hand, may operate in adverse environmental conditions, with a focus on uptime. It also has a long lifecycle with infrequent updating and proprietary operating systems.
Traditionally, IT and OT have been separate. However, today, IT and OT are more interconnected than ever before, creating new attack surfaces and requiring new cybersecurity measures to protect both.
Was ist OT-Infrastruktur?
OT infrastructure refers to physical equipment and processes that operational technology manages, monitors and controls. It is used in a variety of industries including manufacturing, oil and gas, electrical generation and distribution, aviation, maritime and rail, as well as to control critical infrastructure such as emergency services, water treatment plants, electrical grids and traffic management systems. As part of all these industries and services, OT infrastructure is ubiquitous. It includes valves, pumps, switches, generators, pipelines, fans, PLCs, remote terminal units (RTUs), industrial robots and more.
Was ist Industrial Security Management?
Industrial security management is the processes used to ensure your industrial control systems (ICS) are safe and secure. Security management practices include visibility, security and control elements. Zum Schutz von Industrieanlagen ist es notwendig, potenzielle Risiken signifikant zu reduzieren und die Sicherheit sämtlicher Assets, einschließlich industrieller Automatisierungsnetzwerke, zu gewährleisten – auf kostengünstige Weise und mit möglichst geringem Störpotenzial. It’s important to design and manage ICS security so it does not conflict with other important requirements such as performance output, uptime, and workforce-friendliness. Im Hinblick auf das Sicherheitsmanagement in der Industrie stellt die Absicherung von Automatisierungsnetzwerken heutzutage die größte Herausforderung dar.
What is ICS security?
Industrial control system security (ICS) encompasses all of the processes, hardware and software used to keep ICS safe and secure. ICS security solutions include detailed visibility, asset inventory, passive and active threat detection, risk-based vulnerability management and configuration control. Industrial control systems are a main component of operational technology. ICS includes different types of devices, controls, systems and networks that manage industrial processes. Maintaining ICS safety to decrease risks from internal and external threats is key to keeping most kinds of industrial operations up and running.
Was ist ein Air-Gap?
An air-gap is a physical separation between the OT environment and the rest of the world. No data comes into the OT device from the outside and no data goes out from the OT network.
What is a SCADA system?
A supervisory control and data acquisition (SCADA) system is a control system used to communicate with and collect data from industrial machines, sensors and end devices, often at distributed sites. SCADA then transmits data to computers to process it and make it available to operators and other employees. Your staff can use the analyzed information to make important decisions and quickly control virtually any activity that might occur.
Warum ist OT-Sicherheit wichtig?
OT security is important because without complete visibility and security for both your OT and IT assets you can’t effectively mitigate your overall cyber risk. The industry relies heavily on automation to ensure high efficiency and minimal down time, while meeting exacting engineering standards. This creates unique and evolving risks for industrial and critical infrastructure organizations. Cyberattacks that target OT, or that begin in IT and laterally move into your OT environment, can destroy your operations, change products and put people’s lives at risk. In addition, the modern level of connectivity between operating technology systems and information technology systems increases your attack surface. Gaps in OT security can lead to a breach that can then be used to access your IT system. A successful attack on IT can disrupt more of your operations and put proprietary information at risk.
Was ist IT/OT-Konvergenz?
IT-OT convergence is the intersection of IT and OT devices and systems within the same environment, whether intentional or accidental. The convergence of OT and IT systems can optimize your production processes, encourage innovation and help your organization become more sustainable. However, it can also increase your attack surface by providing more access points for bad actors to enter your network and disrupt operations. Without complete visibility into all of your assets and security threats, you can’t protect your organization from cyber risks.
Beseitigen Sie blinde Flecken in Ihrer konvergenten IT/OT-Umgebung mit Tenable OT Security
Get comprehensive visibility into your industrial environment. Actively query your OT devices in their native protocols and get a more complete understanding of your modern attack surface.
- Tenable Nessus