- Community Home
- >
- HPE Networking
- >
- Networking
- >
- Cybersecurity for regulated operational environmen...
Categories
Company
Local Language
Forums
Discussions
Knowledge Base
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Knowledge Base
Forums
Discussions
- Cloud Mentoring and Education
- Software - General
- HPE OneView
- HPE Ezmeral Software platform
- HPE OpsRamp
Knowledge Base
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Printer Friendly Page
- Report Inappropriate Content
Cybersecurity for regulated operational environments: Prioritizing safety
Operational cybersecurity must prioritize safety, availability, and regulatory alignment—adapting IT models to legacy systems, change control, identity, and culture.
Cybersecurity looks very different when downtime is not an inconvenience but a safety risk.
In regulated and operational environments, security decisions carry consequences that go far beyond data loss. Production lines stop. Supply chains break. Safety margins shrink. Regulatory scrutiny follows quickly. In some cases, people can be put at risk.
This reality fundamentally changes how cybersecurity must be designed, deployed, and operated.
And yet, much of the security thinking applied to these environments still comes from traditional enterprise IT. Models built for email, laptops, and cloud applications are lifted and applied to factories, plants, and control systems with little adaptation.
The result is predictable friction.
Why operational environments change the security conversation
In most enterprise environments, security failures are disruptive but survivable. Systems can be taken offline. Access can be revoked aggressively. Patches can be applied quickly. Users can wait.
Operational environments do not work that way.
Availability is paramount. Systems often run continuously for years. Maintenance windows are rare and tightly controlled. Changes are risk events in their own right.
Security teams quickly discover that controls that feel reasonable in IT can be unacceptable in OT. Blocking access may stop production. Restarting a system may require regulatory approval. Applying a patch may invalidate certification.
This does not mean security is less important. It means it must be applied differently.
Regulation shapes behavior long before technology does
In regulated industries, compliance requirements often shape security behavior more strongly than threat models.
Standards define what is allowed. Audits define what is visible. Evidence matters as much as outcomes. Controls are judged not just by effectiveness, but by their alignment with regulatory expectations.
This can create tension.
Security teams want to move quickly to reduce risk. Operations teams want stability. Compliance teams want predictability and documentation. Each group is optimizing for a different outcome.
Successful security programs in these environments recognize this early. They design controls that satisfy regulators while still improving real-world resilience. They avoid chasing theoretical perfection in favor of demonstrable control.
Legacy systems are not an edge case
One of the biggest challenges in operational environments is legacy.
Many control systems were never designed to be connected. Some cannot be patched. Others rely on protocols that predate modern security thinking. Replacing them may be technically possible, but operationally unrealistic.
These systems are not mistakes. They are the result of decades of engineering decisions optimized for reliability and longevity.
Security architecture that assumes wholesale replacement will fail immediately.
Instead, mature organizations focus on containment rather than elimination. Reducing exposure. Limiting access. Monitoring behavior. Accepting that some risk must be managed rather than removed.
Segmentation is necessary but not sufficient
Network segmentation remains a foundational control in operational environments. Separating critical systems from less sensitive ones reduces blast radius and limits lateral movement.
But segmentation alone does not solve the trust problem.
Access within segments is often broad. Credentials are shared. Authentication is weak. Once inside, users or systems may have more freedom than intended.
This is where identity and access discipline becomes increasingly important. Not replacing segmentation, but complementing it.
The combination of segmentation and precise access control is far more effective than on its own.
Identity is harder in OT but more important
Identity is often cited as a weakness in operational environments. Many systems were not built with modern authentication in mind. Users may share accounts. Service access is implicit.
These challenges are real. But they do not make identity irrelevant. They make it critical.
Even when strong authentication is not possible at the endpoint, identity can still be enforced around it. Who is allowed to connect? From where? Under what conditions? For how long?
Organizations that apply identity controls at access points rather than endpoints often make meaningful progress without disrupting operations.
Change control is a security control
In operational environments, change control is one of the most powerful security mechanisms available.
Every change is planned. Reviewed. Documented. Approved. This discipline exists for safety and reliability, but it also creates a strong foundation for security.
When security teams align with change management processes rather than working around them, trust improves quickly. Controls are seen as part of safe operation rather than external interference.
This alignment is one of the most consistent indicators of mature security programs in regulated environments.
The cultural gap is often the real risk
Many security challenges in OT environments are cultural rather than technical.
IT security teams often speak in terms of threats and controls. Operations teams speak in terms of uptime and safety. Each group may underestimate the priorities of the other.
When security is perceived as something imposed rather than integrated, resistance grows. Workarounds appear. Visibility decreases.
The most effective organizations invest time in translation. Shared language. Joint ownership. Mutual respect for constraints.
Security improves not because controls are stronger, but because cooperation is.
Incident response looks different when systems cannot stop
Traditional incident response playbooks assume systems can be isolated or shut down quickly. In operational environments, that assumption may be dangerous.
Response plans must consider safety implications. Regulatory notification requirements. Physical processes. Manual overrides.
Practicing these scenarios in advance is essential. Tabletop exercises that include operations, safety, legal, and leadership teams build confidence and reduce panic when incidents occur.
Preparedness matters more than speed.
Vendors and third parties expand the attack surface
Operational environments rely heavily on third parties. Equipment suppliers. Maintenance providers. Integrators. Remote support teams.
These relationships are essential, but they also introduce risk.
Remote access for vendors is often persistent. Credentials may be shared across customers. Visibility into activity is limited.
Mature organizations address this by tightening access conditions rather than eliminating access entirely. Time-limited access. Strong authentication where possible. Monitoring focused on behavior rather than presence.
Third-party access is treated as an operational necessity, not blind trust.
Boards care about operations more than tools
At the board level, conversations about operational cybersecurity are usually pragmatic.
The questions are simple. What could stop us from operating? How likely is it? How prepared are we?
Boards are less interested in individual tools and more concerned with resilience. Can the organization continue to operate safely under stress? Can it recover? Can it explain its decisions to regulators and stakeholders?
Security programs that frame their value in these terms gain support quickly.
What maturity really looks like
Maturity in regulated and operational environments does not look like perfection.
It looks like clarity.
Clear understanding of what matters the most. Clear ownership of risk. Clear processes for change and response. Clear communication between teams.
It looks like an incremental improvement rather than a radical transformation. Controls that fit operational reality. Security decisions that respect safety and availability.
Most importantly, it looks like trust. Between security and operations. Between leadership and teams. Between policy and practice.
Security that respects reality
Cybersecurity in regulated and operational environments cannot be copied from enterprise IT. It must be designed with reality in mind.
That reality includes legacy systems. Safety constraints. Regulatory oversight. Human factors.
Organizations that accept this reality early make better decisions. They prioritize what matters. They build resilience gradually. They avoid brittle solutions that look good on paper but fail under pressure.
In these environments, good security is rarely flashy.
It is disciplined. Integrated. And quietly effective.
And in a world where disruption carries real-world consequences, that may be the most important outcome of all.
Meet the author:
Jaye Tillson, CTO Security
Jaye_Tillson
Jaye Tillson is a Field CTO and Distinguished Technologist at HPE Aruba Networking (formerly Axis Security), boasting over 25 years of invaluable expertise in successfully implementing strategic global technology programs. With a strong focus on digital transformation, Jaye has been instrumental in guiding numerous organizations through their zero-trust journey, enabling them to thrive in the ever-evolving digital landscape. Jaye's passion lies in collaborating with enterprises, assisting them in their strategic pursuit of zero trust. He takes pride in leveraging his real-world experience to address critical issues and challenges faced by these businesses. Beyond his professional pursuits, Jaye co-founded the SSE Forum and co-hosts its popular podcast called 'The Edge.' This platform allows him to engage with a broader audience, fostering meaningful discussions on industry trends and innovations. In his leisure time, Jaye indulges in his passions for motor racing, savoring delectable cuisine, and exploring the wonders of the world through his travels.
- Back to Blog
- Newer Article
- Older Article
-
AI-Powered
23 -
AI-Powered Networking
89 -
Analytics and Assurance
4 -
Aruba Unplugged
7 -
Cloud
9 -
Corporate
3 -
customer stories
4 -
Data Center
41 -
data center networks
19 -
digital workplace
2 -
Edge
4 -
Enterprise Campus
9 -
Events
5 -
Government
10 -
Healthcare
2 -
Higher Education
2 -
Hospitality
4 -
Industries
1 -
IoT
8 -
Large Public Venue
1 -
Location Services
3 -
Manufacturing
1 -
midsize business
1 -
mobility
17 -
Network as a Service (NaaS)
12 -
Partner Views
4 -
Primary Education
1 -
Retail
1 -
SASE
21 -
SD-WAN
12 -
Security
165 -
small business
1 -
Solutions
7 -
Technical
5 -
Uncategorized
1 -
Wired Wireless WAN
129 -
women in technology
2
- « Previous
- Next »