From Modem to Modern: Securing Remote Access for OT

Ayman Galal
3 min readSep 10, 2023

In today’s digital age, accessing resources from any corner of the globe has become routine and part of ways of working. However, securing remote access is an intriguing tapestry of innovation, challenges, and constant adaptation, from the early days of dial-up connections to today’s sophisticated Software-Defined Perimeters (SDP) and Zero Trust Access (ZTA).

The evolution can be traced back to when, in the 1990s, we relied on modems to connect remotely; then, in the 2000s, Virtual Private Networks (VPNs) marked a significant shift, providing encrypted tunnels for data transfer across public networks. But, as the digital landscape increased with cloud computing and remote work, new challenges arose, prompting the emergence of more agile and adaptive remote access solutions.

History of remote access

I recall after the incident in the Gulf of Mexico in 2010, there was a big mind-shift to reduce human physical presence on a rig to necessary only. As a result, remote access to systems that weren’t allowed before became acceptable for safety reasons. The same happened as a result of the Covid-19 lockdown.

Today, OT systems connect with IT networks for good reasons (enhanced functionality & real-time monitoring), So securing remote access to the OT systems has become more critical than before. Here are some security incidents linked to…

--

--

Ayman Galal
Ayman Galal

Written by Ayman Galal

0 Followers

Passionate about Cyber Security & Privacy

No responses yet