Networking
1854360 Members
7125 Online
104102 Solutions
New Article
Jaye_Tillson

Cybersecurity for regulated operational environments: Prioritizing safety

Operational cybersecurity must prioritize safety, availability, and regulatory alignment—adapting IT models to legacy systems, change control, identity, and culture.

AdobeStock_249144558_800_0_72_RGB.jpg

Cybersecurity looks very different when downtime is not an inconvenience but a safety risk.

In regulated and operational environments, security decisions carry consequences that go far beyond data loss. Production lines stop. Supply chains break. Safety margins shrink. Regulatory scrutiny follows quickly. In some cases, people can be put at risk.

This reality fundamentally changes how cybersecurity must be designed, deployed, and operated.

And yet, much of the security thinking applied to these environments still comes from traditional enterprise IT. Models built for email, laptops, and cloud applications are lifted and applied to factories, plants, and control systems with little adaptation.

The result is predictable friction.

Why operational environments change the security conversation

In most enterprise environments, security failures are disruptive but survivable. Systems can be taken offline. Access can be revoked aggressively. Patches can be applied quickly. Users can wait.

Operational environments do not work that way.

Availability is paramount. Systems often run continuously for years. Maintenance windows are rare and tightly controlled. Changes are risk events in their own right.

Security teams quickly discover that controls that feel reasonable in IT can be unacceptable in OT. Blocking access may stop production. Restarting a system may require regulatory approval. Applying a patch may invalidate certification.

This does not mean security is less important. It means it must be applied differently.

Regulation shapes behavior long before technology does

In regulated industries, compliance requirements often shape security behavior more strongly than threat models.

Standards define what is allowed. Audits define what is visible. Evidence matters as much as outcomes. Controls are judged not just by effectiveness, but by their alignment with regulatory expectations.

This can create tension.

Security teams want to move quickly to reduce risk. Operations teams want stability. Compliance teams want predictability and documentation. Each group is optimizing for a different outcome.

Successful security programs in these environments recognize this early. They design controls that satisfy regulators while still improving real-world resilience. They avoid chasing theoretical perfection in favor of demonstrable control.

Legacy systems are not an edge case

One of the biggest challenges in operational environments is legacy.

Many control systems were never designed to be connected. Some cannot be patched. Others rely on protocols that predate modern security thinking. Replacing them may be technically possible, but operationally unrealistic.

These systems are not mistakes. They are the result of decades of engineering decisions optimized for reliability and longevity.

Security architecture that assumes wholesale replacement will fail immediately.

Instead, mature organizations focus on containment rather than elimination. Reducing exposure. Limiting access. Monitoring behavior. Accepting that some risk must be managed rather than removed.

Segmentation is necessary but not sufficient

Network segmentation remains a foundational control in operational environments. Separating critical systems from less sensitive ones reduces blast radius and limits lateral movement.

But segmentation alone does not solve the trust problem.

Access within segments is often broad. Credentials are shared. Authentication is weak. Once inside, users or systems may have more freedom than intended.

This is where identity and access discipline becomes increasingly important. Not replacing segmentation, but complementing it.

The combination of segmentation and precise access control is far more effective than on its own.

Identity is harder in OT but more important

Identity is often cited as a weakness in operational environments. Many systems were not built with modern authentication in mind. Users may share accounts. Service access is implicit.

These challenges are real. But they do not make identity irrelevant. They make it critical.

Even when strong authentication is not possible at the endpoint, identity can still be enforced around it. Who is allowed to connect? From where? Under what conditions? For how long?

Organizations that apply identity controls at access points rather than endpoints often make meaningful progress without disrupting operations.

Change control is a security control

In operational environments, change control is one of the most powerful security mechanisms available.

Every change is planned. Reviewed. Documented. Approved. This discipline exists for safety and reliability, but it also creates a strong foundation for security.

When security teams align with change management processes rather than working around them, trust improves quickly. Controls are seen as part of safe operation rather than external interference.

This alignment is one of the most consistent indicators of mature security programs in regulated environments.

The cultural gap is often the real risk

Many security challenges in OT environments are cultural rather than technical.

IT security teams often speak in terms of threats and controls. Operations teams speak in terms of uptime and safety. Each group may underestimate the priorities of the other.

When security is perceived as something imposed rather than integrated, resistance grows. Workarounds appear. Visibility decreases.

The most effective organizations invest time in translation. Shared language. Joint ownership. Mutual respect for constraints.

Security improves not because controls are stronger, but because cooperation is.

Incident response looks different when systems cannot stop

Traditional incident response playbooks assume systems can be isolated or shut down quickly. In operational environments, that assumption may be dangerous.

Response plans must consider safety implications. Regulatory notification requirements. Physical processes. Manual overrides.

Practicing these scenarios in advance is essential. Tabletop exercises that include operations, safety, legal, and leadership teams build confidence and reduce panic when incidents occur.

Preparedness matters more than speed.

Vendors and third parties expand the attack surface

Operational environments rely heavily on third parties. Equipment suppliers. Maintenance providers. Integrators. Remote support teams.

These relationships are essential, but they also introduce risk.

Remote access for vendors is often persistent. Credentials may be shared across customers. Visibility into activity is limited.

Mature organizations address this by tightening access conditions rather than eliminating access entirely. Time-limited access. Strong authentication where possible. Monitoring focused on behavior rather than presence.

Third-party access is treated as an operational necessity, not blind trust.

Boards care about operations more than tools

At the board level, conversations about operational cybersecurity are usually pragmatic.

The questions are simple. What could stop us from operating? How likely is it? How prepared are we?

Boards are less interested in individual tools and more concerned with resilience. Can the organization continue to operate safely under stress? Can it recover? Can it explain its decisions to regulators and stakeholders?

Security programs that frame their value in these terms gain support quickly.

What maturity really looks like

Maturity in regulated and operational environments does not look like perfection.

It looks like clarity.

Clear understanding of what matters the most. Clear ownership of risk. Clear processes for change and response. Clear communication between teams.

It looks like an incremental improvement rather than a radical transformation. Controls that fit operational reality. Security decisions that respect safety and availability.

Most importantly, it looks like trust. Between security and operations. Between leadership and teams. Between policy and practice.

Security that respects reality

Cybersecurity in regulated and operational environments cannot be copied from enterprise IT. It must be designed with reality in mind.

That reality includes legacy systems. Safety constraints. Regulatory oversight. Human factors.

Organizations that accept this reality early make better decisions. They prioritize what matters. They build resilience gradually. They avoid brittle solutions that look good on paper but fail under pressure.

In these environments, good security is rarely flashy.

It is disciplined. Integrated. And quietly effective.

And in a world where disruption carries real-world consequences, that may be the most important outcome of all.

Meet the author:

Jaye Tillson, CTO Security

0 Kudos
About the Author

Jaye_Tillson

Jaye Tillson is a Field CTO and Distinguished Technologist at HPE Aruba Networking (formerly Axis Security), boasting over 25 years of invaluable expertise in successfully implementing strategic global technology programs. With a strong focus on digital transformation, Jaye has been instrumental in guiding numerous organizations through their zero-trust journey, enabling them to thrive in the ever-evolving digital landscape. Jaye's passion lies in collaborating with enterprises, assisting them in their strategic pursuit of zero trust. He takes pride in leveraging his real-world experience to address critical issues and challenges faced by these businesses. Beyond his professional pursuits, Jaye co-founded the SSE Forum and co-hosts its popular podcast called 'The Edge.' This platform allows him to engage with a broader audience, fostering meaningful discussions on industry trends and innovations. In his leisure time, Jaye indulges in his passions for motor racing, savoring delectable cuisine, and exploring the wonders of the world through his travels.