Big Cover - 2021-06-24T163649.318 (1)

OT Assessment

The danger of cyber attacks on OT environments has materialized in numerous episodes. How can you defend yourself from these threats?

Is your factory safe from cyber attacks?

Technology Advisory

Multi-cloud, Cybersecurity, Governance and Compliance for our Clients’ business

Find out more

One of the most worrying aspects of the enormous increase in cyber attacks is represented by their propagation towards targets which, until a few years ago, were considered immune from such problems.

Industrial environments were considered safe from these kinds of threats, thanks to their highly specific nature. One of the keystones was the isolation of industrial environments from traditional IT environments, as there was a virtually complete division between the latter and the world of industrial automation (“Operation Technology”, OT). The systems were, indeed, physically isolated (“air-gapped”, in technical terminology), without any connectivity with the traditional IT environment.

However, advances in processing technology has progressively introduced “intelligence” into all automation systems. Initiatives such as “Industry 4.0” will actually make the total digitization of manufacturing environments a salient characteristic. What’s more, the integration of the IT and OT networks, driven by the need to optimize corporate processes, has eliminated any real division between these two areas. Indeed, the most commonly used term in specialist documentation to describe these complex IT+OT+IoT is CPS (Cyber-Physical Systems).

Unfortunately, the mixture of IT, OT and networking has also led to the concrete possibility in the industrial world of the myriad attacks taking place on the Internet being launched against these environments as well. We must also remember how digital automation underlies the control systems not only of factories, but also of some of the core infrastructure of our technological society: power stations, distribution networks for fuel and water etc. etc. As a consequence, the cyber threat also looms over the technological foundations of our civilization.

Financial services

Lutech Group’s innovative solutions for financial institutions, guaranteeing security, scalability and performance.

@1xBG BIG COVER Settori - Financial Find out more

OT Security: mission impossible?

The European cybersecurity strategy

An action plan designed to improve the IT security and resilience of national services and infrastructure

Big Cover - 2021-03-11T124805.787 (1) Go to ideas

The threat of cyber attacks on OT environments has, indeed, materialized in numerous episodes, some serious enough to attract media attention (for example the colossal black-out of 2017 in Ukraine, caused by the NotPetya malware).

How can you defend yourself from these threats? IT security teams, who have tried to transfer decades of experience in the fight against IT threats, soon learned that the OT environment is much more complicated than the world of IT.

For example, industrial environments are a world populated by hundreds of different and proprietary communication protocols, computing systems whose main priority is not the confidentiality of data but rather uninterrupted operation, so much so that they may often not be turned off or restarted for months or even years at a time. As a consequence, the firmware or software is often not able to be updated with patches for even longer periods. All this in a context where the concept of security is often considered to be a low priority compared to safety. Despite these difficulties, attempts have been made to adapt the security methodologies already successfully applied in the world of IT. And underlying any activities to improve security there must be the fundamental phase of understanding, as deeply as possible, the environment to protect: we are talking about the assessment stage.

Assessment: visibility first and foremost


Effective monitoring of IT systems thanks to log management and SIEM

Big Cover - 2020-10-29T121657.440 (1) Go

Assessments are one of the best-known activities performed by cybersecurity professionals, particularly in the vulnerability research field. In the world of industrial security too, assessments often focus on identifying vulnerabilities, but there are other peculiar aspects.

The first relates to the fact that the numerous and complex nature of OT devices makes it always necessary to supplement the technological assessment with a round-table “discovery” process. This is to highlight technological islands strongly segmented from the rest of the systems, or else connected with protocols so unusual as to make their correct identification difficult, even to the most sophisticated OT traffic analysis systems.

The second peculiarity consists of the strong preference for completely passive analysis technologies. The reasons are numerous: there is a desire to eliminate any possibility of interference with the OT systems (remember that we are always working in production environments, test systems are rare in the industrial world); the timing of certain systems can feature very long periods (for example actuators which operate with very long time intervals), which therefore require long “observation” times. For these reasons, technologies which record the various traffic flows passively, without interference with the systems and which can therefore be left in operation for long periods, are undoubtedly the most suitable choice.

It is also useful to highlight how these peculiarities of the passive analysis systems combine perfectly with the concept of continuous monitoring, advocated both by IT and OT best practices. This means that these solutions can also be used for permanent monitoring activities, outside of the assessment period, which can typically last from a few weeks to a few months, depending on the complexity and specific nature of the infrastructure to be analyzed.

The assessment must then continue with investigation of all aspects related to external connectivity (Internet, cloud etc.). In this phase, the assessment of the OT systems blends into that of the IT sphere, in particular as regards remote access (VPN and similar).

Another very important side which has to be dealt with is that relating to the supply chain. The technology supply chain of OT systems must be analyzed and verified in order to limit the risks of attacks/infiltration which compromise security by passing through privileged connections that these suppliers usually have with customers.

Finally, the technical assessment cannot leave out examination of the operational context, meaning the set of policies, procedures, standards and methods of governance. While these are not strictly technological assessments, they are essential for correctly assessing and understanding the management of the OT (and IT) systems from an operational and security perspective.


OT cybersecurity is quickly becoming an element of the highest priority in the diaries of security officers at both industrial companies and firms operating in the field of critical infrastructure. It has nevertheless been highlighted how just the analysis of these environments puts up numerous challenges for companies undertaking them. Significant know-how, both technical and methodological, is required, ranging from IT and OT to IoT systems, with expertise and experience taking in both security and knowledge of industrial and IT environments. 

Contact Lutech’s Advisory team

We invite you to read the marketing policy disclaimer.

Please enter a value
Please enter a value
Please enter a valid email address
Please enter a valid phone number
Please enter a value
Please enter a value
Please enter a value

By clicking the "Confirm" button, I declare that I have read and understood the Marketing Disclaimer

I agree to receive commercial and promotional communications relating to services and products as well as information messages relating to marketing activities, as explained in the aforementioned Disclaimer

Please select an option

An error has occurred, please try again later

Thank you for your interest!
We have received your contact request; we will be in touch shortly to further discuss your business requirements.

Case histories


Vision & Trends on Digital Transformation