Operational Technology (OT)
What is Operational Technology (OT)?
Operational Technology (OT)Hardware and software that monitor and control physical processes, devices, and infrastructure such as factories, power plants, and utilities.
Operational Technology (OT) covers the systems used to operate industrial equipment and physical processes: PLCs, RTUs, DCS, SCADA servers, HMIs, sensors, and actuators. Unlike traditional IT, OT prioritizes availability and safety over confidentiality, often runs for decades on proprietary protocols, and interacts directly with the physical world. Convergence with IT networks and cloud services has dramatically expanded OT's attack surface, while patching windows remain rare because outages can cause physical damage, safety incidents, or production loss. Security strategies emphasize segmentation, asset visibility, secure remote access, and standards such as IEC 62443 and the Purdue model.
● Examples
- 01
A water utility's SCADA system controlling pumps and chemical dosing across remote sites.
- 02
A car factory floor with PLCs and robot controllers connected to a manufacturing execution system.
● Frequently asked questions
What is Operational Technology (OT)?
Hardware and software that monitor and control physical processes, devices, and infrastructure such as factories, power plants, and utilities. It belongs to the OT / ICS / IoT category of cybersecurity.
What does Operational Technology (OT) mean?
Hardware and software that monitor and control physical processes, devices, and infrastructure such as factories, power plants, and utilities.
How does Operational Technology (OT) work?
Operational Technology (OT) covers the systems used to operate industrial equipment and physical processes: PLCs, RTUs, DCS, SCADA servers, HMIs, sensors, and actuators. Unlike traditional IT, OT prioritizes availability and safety over confidentiality, often runs for decades on proprietary protocols, and interacts directly with the physical world. Convergence with IT networks and cloud services has dramatically expanded OT's attack surface, while patching windows remain rare because outages can cause physical damage, safety incidents, or production loss. Security strategies emphasize segmentation, asset visibility, secure remote access, and standards such as IEC 62443 and the Purdue model.
How do you defend against Operational Technology (OT)?
Defences for Operational Technology (OT) typically combine technical controls and operational practices, as detailed in the full definition above.
What are other names for Operational Technology (OT)?
Common alternative names include: OT, Industrial cybersecurity.
● Related terms
- ot-iot№ 529
Industrial Control System (ICS)
An umbrella term for systems that automate and supervise industrial processes, including SCADA, DCS, PLCs, RTUs, and safety controllers.
- ot-iot№ 972
SCADA
Supervisory Control and Data Acquisition systems that gather telemetry from remote field devices and let operators monitor and command large industrial processes.
- ot-iot№ 864
Programmable Logic Controller (PLC)
A ruggedized industrial computer that executes deterministic control logic to read sensors and drive actuators in real-time processes.
- ot-iot№ 881
Purdue Enterprise Reference Architecture
A layered reference model for industrial networks that segments business IT from process control, widely used to design ICS network segmentation.
- ot-iot№ 513
IEC 62443
The IEC family of standards for the cybersecurity of industrial automation and control systems, addressing asset owners, integrators, and product suppliers.
- ot-iot№ 267
Cyber-Physical System (CPS)
An engineered system that integrates sensors, actuators, and computation to monitor and control physical processes, where digital and physical layers are tightly coupled.
● See also
- № 957Safety Instrumented System (SIS)
- № 863PROFINET
- № 758OPC UA
- № 1111Stuxnet
- № 1174TRITON / TRISIS
- № 530Industroyer / CrashOverride
- № 552IoT Security
- № 1267Zigbee Security