Skip to content
Blog | | | 7 min read

OT and IT Security - Together or Separate?

IT vs OT differences - priorities, technologies, lifecycle - and how to build collaboration between security teams.

Józef Sulwiński Józef Sulwiński
OT securityIT securityICSSCADAIT-OT collaborationindustrial automationIEC 62443
OT and IT Security - Together or Separate?
)}

In many industrial organizations, IT and OT departments operate as separate worlds. Historically, OT personnel viewed the IT layer as a necessary evil - some literally locked control cabinets to keep IT staff out. Not without reason: installing an operating system update could disrupt production process monitoring, taking down a SCADA system, for example.

But the world has changed. OT systems increasingly connect to corporate networks. Incidents such as the Colonial Pipeline attack or NotPetya demonstrate that treating IT and OT security as separate concerns creates gaps that attackers are eager to exploit.

This article discusses the key differences between these two worlds and explains why collaboration is essential.

TIP

In 2025, 52% of organizations placed OT security under the CISO - compared to 16% in 2022. The trend is clear: responsibility for OT security is shifting from maintenance departments to integrated cybersecurity teams. At the same time, only 35% of organizations report a mature, fully integrated IT-OT security operations model.

Differences Between IT and OT Environments

1. Working Conditions

IT servers operate in climate-controlled data centers with dedicated power supplies. The OT environment is an entirely different reality:

  • Field cabinets on production floors with high levels of dust and humidity
  • Disinfection procedures using foam or hot water that affect enclosures
  • Protection rating requirements (e.g., IP55 for control cabinets)
  • Special requirements for devices inside cabinets (vibration, temperature, and EMC resistance)
  • Restrictions on the amount of energy supplied to explosion-hazard zones

2. Technologies Used

AspectITOT
SoftwareOff-the-shelf products (SAP, Office 365) adapted to the organizationSystems programmed for a specific process
ProtocolsStandard (TCP/IP, HTTP, SMTP)Vendor-specific (Modbus, Profinet, EtherNet/IP)
VendorsChoice among multiple vendorsSingle vendor preference (shared development platform)
Programming languagePython, Java, C#IEC 61131-3 languages (LD, ST, FBD)
Lifecycle3-5 years15-25 years
PatchingRegular maintenance windowsRare, requires planned downtime

In OT environments, automation engineers prefer solutions from a single vendor because a shared platform for programming operator panels, PLC controllers, and drives optimizes deployment time.

3. Design Approach

IT system designers analyze a system from the perspective of networks and applications. Security of communication channels and configurations is built into the design process.

OT designers view a system as a collection of physical devices - pumps, tanks, valves, reactors. Their primary goal is to control components and read measurement signals (temperature, volume, flow). Historically, requirements focused on reliability and physical safety - not information security.

This approach is changing - the IEC 62443 standard introduces security-by-design requirements for OT systems, including the concept of zones and conduits - but many existing installations were designed without consideration for cyber threats.

4. Security Priorities and Objectives

PriorityITOT
Primary goalData confidentiality (CIA: Confidentiality first)Availability and continuous operation (AIC: Availability first)
Key requirementProtection of personal and business dataProduction continuity, avoiding hazardous events
Latency toleranceSeconds to minutes acceptableMilliseconds - real-time transmission
Downtime tolerancePlanned maintenance windowsMinimal - every outage = production losses
Incident responseIsolate and analyzeMaintain safe process state

In ICS environments, the critical factors are: availability, reliability, and determinism of functions. Data integrity and real-time transmission must be ensured without delays or disruptions.

5. Rate of Change

Designed lifespan of an IT system: 3-5 years, after which it is replaced.

Designed lifespan of an OT system: 15-25 years. The 2024 revision of IEC 62443-2-1 explicitly acknowledges that IACS systems may exceed a 20-year lifecycle, requiring management of hardware and software without active vendor support.

Modernization occurs when:

  • Risk analysis demonstrates the need
  • Return on investment is positive
  • Spare parts availability becomes limited

Modernization must be carried out without unnecessary downtime.

OT networks are static in nature - they do not evolve over short time horizons. User groups are stable. IT network architecture is characterized by high variability and scalability.

6. Organizational Approach

In large organizations, IT departments consist of specialists responsible for specific parts of the process - some handle databases, others communications, still others maintenance.

In OT, maintenance personnel are responsible for everything:

  • Communication between devices
  • Device parameterization
  • Replacement of faulty components
  • Keeping documentation up to date
  • Routine maintenance work

The Scale of the Problem - 2024-2025 Data

The interplay between IT and OT is not an academic matter. Data from recent years demonstrates real-world consequences:

MetricValueSource
OT organizations still experiencing intrusions48% (improvement from 94% in 2022)Fortinet 2025 State of OT
Increase in ransomware attacks on industrial organizations+49% (from 80 to 119 groups in 2025)Dragos 2026 Year in Review
Manufacturers reporting increased incidents after IT-OT integration80%KPMG IT-OT Convergence Framework
Organizations with a mature IT-OT SOC model35%ISACA
CISOs overseeing OT security52% (vs 16% in 2022)ISACA
OT security market value (2025)$27.03 billionSecurity Review Magazine

WARNING

In 2024, 80% of manufacturers reported an increase in security incidents following the integration of IT assets with plant networks. This is not an argument against integration - it is an argument for thoughtful security architecture and layered defense (Defense in Depth).

Why Collaboration Is Essential

The different perspectives of IT and OT are not a weakness - they are an opportunity. Each team sees different threats, which together provides a more complete picture of risk. Collaboration enables:

  • Incorporating the needs of both groups at the project requirements stage
  • Avoiding situations where IT security measures disrupt OT processes (and vice versa)
  • Building a shared language and understanding between teams
  • Creating unified security policies spanning the entire organization

Practical Steps Toward Collaboration

StepDescriptionPriority
Joint exercisesIncident scenarios covering both IT and OTHigh
Cross-trainingAutomation engineers learn cybersecurity basics, IT staff learn process specificsHigh
Joint asset inventoryMapping connections between IT and OT networksCritical
Agreed proceduresPatching policies, account management, incident response procedures covering both environmentsHigh
Shared languageA glossary understood by both sides (e.g., “zone” vs “VLAN”, “control loop” vs “controller”)Medium
Unified risk managementShared risk assessment methodology (e.g., NIST CSF 2.0 with the “Govern” function)High

IT-OT Collaboration Checklist

  • Identify the “owner” of OT security within the organizational structure
  • Conduct a joint IT and OT asset inventory
  • Map dependencies: which IT systems must be operational for OT to continue operations?
  • Develop joint incident response procedures
  • Plan joint exercises (at least once per year)
  • Agree on patching policies that account for both environments
  • Implement network segmentation in accordance with IEC 62443 (zones and conduits)
  • Establish shared security metrics
  • Conduct regular risk assessments covering the entire IT-OT chain

A common obstacle to achieving this goal remains a lack of understanding between the two different perspectives and differing industry vocabulary. But that is precisely why it is worth investing in building bridges between these teams - before an incident forces collaboration under crisis conditions.

SEQRED helps industrial organizations build IT-OT collaboration - from OT security audits in accordance with IEC 62443, through penetration testing of industrial environments, to designing zones and conduits architecture.


Sources:

Omówimy zakres, metodykę i harmonogram.