Insights on Retrofitting Security Monitoring with OBEC
Today, most large industrial installations are constructed by integrating a variety of equipment procured from specialty OEMs and subcontractors. These third parties include operational technology (OT) assets as part of their packaged solutions and are responsible for configuring the digital devices that ultimately communicate with other systems in the final installation. However, if an end user’s security requirements are not adequately specified at the beginning of a project, procured OT systems may not be configured in a manner to support security objectives such as network monitoring. All too often, end users are stuck making post-installation fixes, and the options to do so are typically costly or physically impractical.