




















The first day of the 2023 ARC Forum in Orlando, Florida included a variety of cybersecurity workshops and case study presentations. One of the workshops was titled Secure Cloud and Edge OT Architectures. While it is not possible to describe all topics discussed in this workshop in a brief report, the following provides a summary.
The purpose of the workshop was to help asset owners and other stakeholders understand the approaches that companies are adopting to ensure that architectural changes ensure the security of existing and new OT systems. It took the form of a moderated discussion among several major asset owners about their company’s approach to OT Cloud and Edge deployments and the lessons they have learned, followed by questions from the audience.
ARC moderator Eric Cosman opened the workshop with a summary of recent research in this area. Although the scope of the workshop included both cloud and edge configurations, these are distinctly different. The first of these involves devices providing raw data to cloud-based applications that analyze this data and return directions to those devices. In the second scenario, some combination of storage, computation, and analytics reside in an edge device that takes action and reports information to cloud applications.
The essential task is the design and implementation of security measures for OT systems and other connected devices that are either connected to the cloud or operate on the edge of a network. Such configurations are still relatively new and may present challenges that are different from those encountered in securing more traditional, on-premise configurations.
Just as with more traditional OT systems, there are several factors to be considered during design. In some cases, the details may vary somewhat for Edge and Cloud-based configurations.
Risk is generally defined as a function of threat, vulnerability, and consequence. There are several potential consequences of a security-related failure, including disruptions to production, equipment damage, financial loss, compromises to safety, exposure to hazardous materials, and environmental impact. These are largely the same regardless of architecture or deployment model.
There are many measures available during the design of a system. For the most part, these are not specific to cloud or edge-based configurations but may be applied somewhat differently in such situations.
ARC Advisory Group clients can view the complete report at ARC Client Portal
If you would like to buy this report or obtain information about how to become a client, please Contact Us
Keywords: Architecture, Cloud, Consequence, Cybersecurity, Edge, OT, Risk, Security, ARC Advisory Group.