Advertisement
In an environment where we’re seeing increasing demand for connectivity between operational technology (OT) and IT, security teams have to dispel the air gapping myth to acknowledge that IT influences can exploit OT connections.
The air gapping approach was used for a long time to prevent any impact on ICS systems. But it’s wishful thinking to believe it is a reality considering that today, any system managed by an actual user requires end-to-end connectivity. There are three core steps organizations need to take in order to evolve beyond the air gapping myth, so that they can better identify potential attacks and provide stronger security for SCADA networks.