- IT Response
- OT Challenges
| Vulnerability Category | IT Response | OT Challenges |
| Vulnerability Category | ||
| Code Vulnerabilities | Automated patching | Patches are mostly not available. Where available, patching requires firmware upgrades with the potential to disrupt availability. |
| Configuration vulnerabilities | Secure configurations out of the box | Hardening configurations break inter-operability with a high potential to disrupt availability |
| Weak identities | Single Sign-On, Multi-factor authentication, Privileged Access Management etc. | Identities are fragmented with different capabilities to secure depending on the vendor, often hard-coded or with inadequate role segregation. |
| Protocol / design vulnerabilities | Secure encrypted authenticated alternatives (e.g. https vs http, ssh vs telnet) | Pervasive unauthenticated and unencrypted ICS protocols, allow instructions to be sent to end nodes with only routable network access as a requirement. | Buy Now |
