- IT Response
- OT Challenges
Vulnerability Category | IT Response | OT Challenges |
Vulnerability Category | ||
Code Vulnerabilities | Automated patching | Patches are mostly not available. Where available, patching requires firmware upgrades with the potential to disrupt availability. |
Configuration vulnerabilities | Secure configurations out of the box | Hardening configurations break inter-operability with a high potential to disrupt availability |
Weak identities | Single Sign-On, Multi-factor authentication, Privileged Access Management etc. | Identities are fragmented with different capabilities to secure depending on the vendor, often hard-coded or with inadequate role segregation. |
Protocol / design vulnerabilities | Secure encrypted authenticated alternatives (e.g. https vs http, ssh vs telnet) | Pervasive unauthenticated and unencrypted ICS protocols, allow instructions to be sent to end nodes with only routable network access as a requirement. | Buy Now |