Securing remote access to operational technology (OT) (E&T Webinar Team)
"In an Operational Technology environment, JML processes are different compared to a regular operations" explained Alistair Macrae, ICS Cyber Security Consultant at Claroty during the 'Securing remote access to operational technology (OT)' webinar organised by the E&T Webinar Team. He explained that in an OT environment, role-based access controls are time bound and solutions need to be able to keep up swiftly to changing access requests. Typically, when third party engineers access an OT environment, their access needs to be controlled to ensure ingress/egress traffic is accurately monitored. Reverse-tunnel concepts help can help play a role session integrity against and when used alongside frameworks like the perdu-model, you can better analyse where gateway/entry nodes should be placed on…