Optimizing OT Remote Access for Third-Party Vendors with Claroty Secure Access (SA)
– Whitepaper
Third-party engineers, such as Original Equipment Manufacturer (OEM) technicians and maintenance contractors, play a vital role in maintaining the operational technology (OT) environments' availability, integrity, and safety. As their work is often remote, they typically access client OT environments remotely through various widely used connectivity solutions, such as VPNs or OEM-specific tools. However, these solutions were traditionally designed for IT environments, not OT, which is a significant problem. OT and IT environments, while they may share similarities, have unique compositions, serve different purposes, and come with their own security and operational needs. They also present distinct challenges and risks - differences that are even more significant when dealing with third-party OT remote access. Therefore, an OT-specific approach is needed to properly address the requirements and risks associated with third-party OT remote access. This white paper dives into the security and operational challenges posed by using standard IT-oriented solutions for third-party OT remote access. It also outlines the prerequisites for an optimal solution, and how Claroty's xDome Secure Access (SA) meets these requirements.Third-party engineers, such as Original Equipment Manufacturer (OEM) technicians and maintenance contractors, play a vital role in maintaining the operational technology (OT) environments' availability, integrity, and safety. As their work is often remote, they typically access client OT environments remotely through various widely used connectivity solutions, such as VPNs or OEM-specific tools. However, these solutions were traditionally designed for IT environments, not OT, which is a significant problem. OT and IT environments, while they may share similarities, have unique compositions, serve different purposes, and come with their own security and operational needs. They also present distinct challenges and risks - differences that are even more significant when dealing with third-party OT remote access. Therefore, an OT-specific approach is needed to properly address the requirements and risks associated with third-party OT remote access. This white paper dives into the security and operational challenges posed by using standard IT-oriented solutions for third-party OT remote access. It also outlines the prerequisites for an optimal solution, and how Claroty's xDome Secure Access (SA) meets these requirements.
January 2025