In the 1700s, the first industrial revolution started with a need for industrial controls. The conversion of steam energy into usable energy was dangerous, however, after a decade, the new power source energy was able to be tamed.
In the fourth industrial revolution, the developments in the automation world led to developing the controls on physical systems. Operational Technology cybersecurity is used for software, hardware, practices, personnel, and services meant for OT infrastructures, people, and data.
However, with the current tech trends and the need for big data to collect and analyze, cybersecurity is needed to protect the OT (Operational Technology).
As per Gartner firm analyst:
OT is defined as “Hardware and software that detects or causes a change through the direct monitoring and/or control of physical devices, processes, and events in asset-centric enterprises, particularly in production and operations.”
A clear distinction is made between OT and ICS.
The different OT Cybersecurity Frameworks needed in different sectors are: –
- In 2009, the U.S. Nuclear Regulatory Commission (NRC) are revising the security requirements in nuclear power plants.
- The Not-for-profit corporation North American Electric Reliability Corporation imposes the CIP standards (Critical Infrastructure Protection) for North American electricity infrastructure.
- In 2010, the Cyber Security Plan for Nuclear Power Reactors was developed by the industry.
- The American Water Works Association (AWWA) created the cybersecurity Guidance and Assessment toll.
- NIST is also involved in cybersecurity framework and for its currently released profiles for process-based and discrete-based manufacturing.
- In 2016, NIS Directive by the European Union as been performed for the network and information security systems (Directive (EU) 2016/1148).
- In 2017, the European Union Agency for Cybersecurity (ENISA) published a Mapping of OES Security Requirements for Specific sectors to be provided for sector guidance.
- In 2020, a new cybersecurity strategy was adopted by the EU for the NIS directive review.
- A comprehensive approach to critical infrastructure protection was adopted by the Australian Government. The security of critical Infrastructure Act 2018 became law.
- CIC Compliance Strategy was created by the Australian Government’s Critical Infrastructure Centre to outline the obligations of owners/operators.
OT is also one of the big contributors to the economical and safe delivery of clean water, energy, and wastewater treatment.
Source:- OT