{"id":3784,"date":"2023-10-30T12:57:39","date_gmt":"2023-10-30T11:57:39","guid":{"rendered":"https:\/\/www.hwgsababa.com\/?p=3784"},"modified":"2025-08-05T14:05:11","modified_gmt":"2025-08-05T12:05:11","slug":"differences-between-ot-and-it-systems","status":"publish","type":"post","link":"https:\/\/www.hwgsababa.com\/en\/differences-between-ot-and-it-systems\/","title":{"rendered":"What are the differences between OT and IT Systems?"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row el_class=&#8221;margin_top_100&#8243;][vc_column][vc_single_image image=&#8221;3695&#8243;][\/vc_column][\/vc_row][vc_row el_class=&#8221;margin_top_30&#8243;][\/vc_row][vc_column][\/vc_column][vc_column_text el_class=&#8221;paragrafo&#8221;]<span class=\"wpex-text-sm\">For those coming from IT, securing ICS systems can be frustrating at the beginning. This is because the technologies used and the ways of working are very different when it comes to OT systems. The objectives pursued in these two areas are also very different. How so? Let&#8217;s find out the differences between OT and IT systems.<\/span><\/p>\n<h3><span class=\"wpex-text-sm\" style=\"color: #0087cc\"><strong>Data protection vs. process protection<\/strong><\/span><\/h3>\n<p><span style=\"color: #0087cc\"><strong> When securing IT systems, the main focus is on protecting data <\/strong><\/span> &#8211; such as intellectual property (IP), credit card numbers, emails and Personal Identifiable Information (PII) &#8211; thus trying to prevent hackers from gaining access to what, for a company, may be a great part of its assets.<\/p>\n<p>This is in <span style=\"color: #0087cc\"><strong> sharp contrast to what happens with ICS systems, where the main objective is to protect the process <\/strong><\/span>, as they are designed for continuous processing. In some cases, following an unplanned shutdown of a plant, it can take days, weeks or even months for it to restart, causing significant damage. And it is not just an <span style=\"color: #0087cc\"><strong> econimic loss<\/strong><\/span><\/p>\n<p>Take, for example, an ICS system that controls power generation and distribution, or drinking water and wastewater systems: besides great inconvenience, their breakdown can also have serious consequences on people&#8217;s health, as well as deeply impact the society. Without going too far back in time, just think of the 2021 ransomware attack on Colonial Pipeline that halted plant operations for six days, leading to a fuel crisis and increased prices in the eastern U.S.<\/p>\n<h4><strong><span style=\"color: #c70973\">Differences between IT and OT systems: Technologies<\/span><\/strong><\/h4>\n<p>In traditional IT systems, we are used to working with protocols such as TCP, IP, UDP, DNS, DHCP, etc. Most ICS systems use one of over 100 dedicated protocols, some of which are proprietary. The most popular on the market are Modbus, DNP3, ProfiNet\/Profibus, OPC and others.<\/p>\n<p>ICS systems base its operations on the Programmable Logic Controllers or PLCs. These are used for almost any type of industrial control system, be it production, oil refining, power generation, water treatment, etc. PLCs are comparable to industrial computers, with their own proprietary Operating System. They use programming languages derived from the world of electromechanical logic, such as Ladder Logic, to control sensors, actuators, valves, alarms and other devices. Hacking ICS systems often requires familiarity with the programming of such PLCs.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3689\" src=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/10\/IT-e-OT-differences_HWG-Sababa.png\" alt=\"differences between IT e OT systems\" width=\"364\" height=\"270\" srcset=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/10\/IT-e-OT-differences_HWG-Sababa.png 287w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/10\/IT-e-OT-differences_HWG-Sababa-24x18.png 24w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/10\/IT-e-OT-differences_HWG-Sababa-36x27.png 36w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/10\/IT-e-OT-differences_HWG-Sababa-48x36.png 48w\" sizes=\"auto, (max-width: 364px) 100vw, 364px\" \/><\/p>\n<h5><span style=\"color: #0087cc\"><strong> Availability requirements<\/strong><\/span><\/h5>\n<p>Although <span style=\"color: #0087cc\"><strong> availability <\/strong><\/span> is one of most important concepts within information security, ICS systems take it to another level. As mentioned above, here the <span style=\"color: #0087cc\"><strong> attention is on protecting the process <\/strong><\/span>, rather than the data. For this reason, applying a software patch and rebooting the system may often not be an option, except for discrete time intervals, such as annual or quarterly maintenance shutdowns. This means that operating systems and applications remain unpatched with known vulnerabilities for months or even years. Therefore, SCADA or PLC engineers should carry out adequate compensatory checks to prevent intrusions, unlike an IT security administrator who would be able to apply security patches more frequently.<\/p>\n<h6><strong>\u00a0<span style=\"color: #c70973\"><strong>Differences between IT and OT systems: A different access to components<\/strong><\/span><\/strong><\/h6>\n<p>With a few exceptions, in traditional IT security, the technical team has direct physical access to system components. In ICS systems, these components may be spread over hundreds or thousands of metres (e.g. pipelines, power grid, etc.), thus making the implementation of security controls even more complicated. For example, remote field stations can become an access point to the entire ICS system.<\/p>\n<p><span style=\"color: #0087cc\"><strong> Security through obscurity <\/strong><\/span><br \/>\nRecently, especially with the advent of Industry 4.0, many ICS systems have been progressively connected to the Internet via a direct TCP\/IP connection. While the internal communication can still be managed with proprietary networks, remote access allows continuous monitoring by plant managers. However, there are still exceptions, such as some dams and other public infrastructure systems which are still off-line to protect them from the clutches of cyber attackers.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3692\" src=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/10\/IT-e-OT-cybersecurity-300x136.png\" alt=\"differences between OT and IT systems\" width=\"448\" height=\"203\" srcset=\"https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/10\/IT-e-OT-cybersecurity-300x136.png 300w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/10\/IT-e-OT-cybersecurity-24x11.png 24w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/10\/IT-e-OT-cybersecurity-36x16.png 36w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/10\/IT-e-OT-cybersecurity-48x22.png 48w, https:\/\/www.hwgsababa.com\/wp-content\/uploads\/2023\/10\/IT-e-OT-cybersecurity.png 643w\" sizes=\"auto, (max-width: 448px) 100vw, 448px\" \/><\/p>\n<p>For years, these systems benefited from <span style=\"color: #0087cc\"><strong> security through obscurity<\/strong><\/span>. What does it mean?\u00a0They were somehow safe because few people knew of their existence and even fewer understood their technologies: the protocols used were only known to technicians in the industry who had gained first-hand experience with SCADA, PLCs and HMI terminals.<\/p>\n<p>This is turning out to be a weak point, as they are being exposed on the network without having the most basic security measures implemented. An example is what happened in 2016, when the independent researcher Karn Ganeshen managed to break into a <a href=\"https:\/\/download.schneider-electric.com\/files?p_Doc_Ref=SEVD-2016-025-01\" target=\"_blank\" rel=\"noopener\">Schneider Electric building automation system<\/a> by exploiting a 0-day vulnerability and gaining <span style=\"color: #0087cc\"><strong> root <\/strong><\/span> access to the server.<\/p>\n<p>With the advent of reconnaissance tools like <a href=\"https:\/\/www.shodan.io\/\" rel=\"noopener\">Shodan<\/a>,\u00a0 these systems will no longer rely on security through obscurity. The industry is only now beginning to implement modest security measures, but one of the biggest challenges that it\u2019s facing is that many standard IT security products do not provide the same level of protection when it comes to industrial protocols. In most cases, firewalls and IDSs have to be customised to make them compatible and applicable to OT.<\/p>\n<h6><span style=\"color: #c70973\"><strong> What can we do to protect <a href=\"https:\/\/www.hwgsababa.com\/en\/industrial-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">OT environments<\/a>? <\/strong><\/span><\/h6>\n<p>Considering the differences between OT and IT systems in terms of different length of system lifecycles, and the sensitivity and safety-relevance of the OT systems and automation tools, the approach to security usually requires a combination of security technologies and services, including:<\/p>\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li style=\"list-style-type: none\">\n<ul>\n<li><strong><span style=\"color: #c70973\"><strong> OT security audit and governance <\/strong><\/span> <\/strong>\u2013 aiming at understanding the security risks and requirements for industrial infrastructures, as well as mid- and long-term cybersecurity strategy planning<\/li>\n<li><strong><span style=\"color: #c70973\"><strong>OT security solution integration <\/strong><\/span> <\/strong>to protect industrial networks, workstations and other assets<\/li>\n<li><strong><span style=\"color: #c70973\"><strong> Continuous security monitoring <\/strong><\/span> <\/strong>\u2013 for better security visibility through the analysis of the security events from multiple sources to spot out even complex cyber-attacks at their early stages<\/li>\n<li><strong><span style=\"color: #c70973\"><strong> Security training <\/strong><\/span> <\/strong>\u2013 aimed at continuous improvement of the cybersecurity skills among OT operators, cybersecurity experts as well as other non-IT teams and executives.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Discover HWG Sababa\u2019s portfolio dedicated to <a href=\"https:\/\/www.hwgsababa.com\/en\/industrial-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">Industrial Security<\/a> or <a href=\"https:\/\/www.hwgsababa.com\/en\/contacts\/\" target=\"_blank\" rel=\"noopener\"><u>request a call<\/u><\/a> with our OT specialists.[\/vc_column_text]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row el_class=&#8221;margin_top_100&#8243;][vc_column][vc_single_image image=&#8221;3695&#8243;][\/vc_column][\/vc_row][vc_row el_class=&#8221;margin_top_30&#8243;][\/vc_row][vc_column][\/vc_column][vc_column_text el_class=&#8221;paragrafo&#8221;]For those coming from IT, securing ICS systems can be frustrating at the beginning. This is because the technologies used and the ways of working are very different when it comes to OT systems. The objectives pursued in these two areas are also very different. How so? Let&#8217;s find out the&hellip;<\/p>\n","protected":false},"author":9,"featured_media":3723,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[35],"post_series":[],"class_list":["post-3784","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-ot-security-en","entry","has-media"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/posts\/3784","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/comments?post=3784"}],"version-history":[{"count":4,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/posts\/3784\/revisions"}],"predecessor-version":[{"id":249118,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/posts\/3784\/revisions\/249118"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/media\/3723"}],"wp:attachment":[{"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/media?parent=3784"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/categories?post=3784"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/tags?post=3784"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/www.hwgsababa.com\/en\/wp-json\/wp\/v2\/post_series?post=3784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}