CISA unveils ‘Secure by Demand’ guidelines to bolster OT security

CISA unveils ‘Secure by Demand’ guidelines to bolster OT security CISA unveils ‘Secure by Demand’ guidelines to bolster OT security

“Operational technologies underpin critical infrastructure, and when vendors deliver products with security flaws, it compromises the entire ecosystem,” the guidance stated. The recommendations stress resilience by design, enabling organizations to thwart potential attacks and maintain the integrity of their systems without delays caused by post-breach recovery efforts.

Challenges and implications for vendors and operators

Adopting the “Secure by Demand” principles may require significant operational adjustments, particularly for vendors and organizations new to such stringent guidelines. Vendors are expected to provide transparency around security certifications, patching schedules, and mechanisms to address future vulnerabilities. For OT operators, this implies overhauling procurement protocols to align with cybersecurity priorities, potentially delaying adoption but ultimately fortifying defenses.

While the guidelines emphasize preemptive measures, experts recognize challenges for smaller vendors that may struggle with compliance due to resource constraints. Similarly, transitioning existing OT systems to align with secure by design principles could strain budgets and timelines.

Add a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Keep Up to Date with the Most Important News

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Use