Summary
Klaus Mochalski and Marcel Fischer (BxC Security) discuss the need for machine identities in OT. Find out whether Zero Trust can be implemented in OT and how automated certificate management prevents costly downtime.
Sound Bites
Klaus Mochalski: “For a long time, and even today, there have been relatively few experts who truly combine all these skills. People who, on the one hand, know how to program a control system, how such a machine works, and what the requirements are—but who, at the same time, are well-versed not only in IT, but also in IT security and the right mindset.”
Marcel Fischer: “I think the problem lies much more in the mindset. Because as a production engineer, I simply have a completely different set of requirements. It doesn’t have to be new, it doesn’t have to be fancy—it just has to work, and it has to do so sustainably.”
Klaus Mochalski: “But I’ve always felt that authentication is actually the more critical issue, that it helps me more with many of my problems. [...] My feeling is that things have shifted a bit in IT."
Marcel Fischer: “My production protocols are kept relatively rudimentary because their only requirement was to say, ‘I need to get signals from A to B as lightly as possible with as little overhead as possible so that I can meet my real-time requirements.’”
Klaus Mochalski: “I believe the risk-based approach is absolutely central today. It’s also well understood that I view my OT security risk as a completely normal business risk, assess it, evaluate it critically, and then approach it with a focus on risk reduction once I’ve assessed it.”
Marcel Fischer: “But now we want to build use cases on top of that, and unfortunately, these use cases are increasingly ending up in the cloud, for example. [...] That means I suddenly have an MES system that’s in the cloud. And of course, that means I suddenly have to drill holes in the perimeter [...] because I suddenly have to allow communication with cloud services.”
Marcel Fischer: “That means my approach has to be: how can I use automation to prevent certificates from expiring in the first place, without losing sight of security considerations. But first and foremost, it’s purely a matter of availability, ensuring the machine stays up and running.”
Chapters
00:00 Introduction to OT security and Marcel Fischer’s background
05:27 Differences between OT and IT authentication practices
09:41 Challenges of securing cloud-connected OT systems
11:13 The feasibility of implementing Zero Trust in greenfield vs brownfield projects
12:31 Practical steps for improving security with existing systems and certificates
16:33 Lifecycle management of certificates and automation solutions
23:10 Recommendations for mid-sized companies