OT/IT Convergence: The Manufacturing Attack Surface
NIST Manufacturing Profile and Cybersecurity Frameworks
Supply Chain Security and Third-Party Risk Management
Key Takeaways
TL;DR
OT/IT convergence has expanded the manufacturing attack surface — attacks can now traverse from IT networks to production systems and vice versa.
Network segmentation between IT and OT environments is the most critical control for preventing production-impacting cyberattacks.
The NIST Manufacturing Profile (NISTIR 8183) provides a sector-specific implementation guide for the NIST Cybersecurity Framework.
Supply chain cybersecurity is bidirectional: your customers evaluate your security, and you must evaluate your suppliers' security.
FAQ
Frequently asked questions
How do I secure OT systems that cannot be patched or updated?
For legacy OT systems that cannot receive patches: (1) place them on isolated network segments with strict firewall rules allowing only required traffic, (2) disable unnecessary services and ports on the devices, (3) monitor network traffic to and from these devices for anomalous behavior, (4) implement application whitelisting on any Windows-based HMIs or engineering workstations that interact with the devices, and (5) include compensating controls in your risk assessment documentation. Network segmentation is the most effective single control for protecting unpatchable OT systems.
What is the NIST Manufacturing Profile and is it mandatory?
The NIST Manufacturing Profile (NISTIR 8183) is a voluntary framework that adapts the NIST Cybersecurity Framework for the manufacturing sector. It is not legally mandatory for most manufacturers. However, defense contractors must implement NIST 800-171 (which aligns with the Manufacturing Profile), and many large OEMs require suppliers to demonstrate alignment with NIST CSF or the Manufacturing Profile as a condition of doing business.
How do I assess the cybersecurity risk of my suppliers?
Start by tiering your suppliers based on criticality (impact if compromised or unavailable) and access (do they connect to your systems, handle your data, or provide software?). For high-risk suppliers: send a cybersecurity questionnaire (SIG Lite is a good starting point), request evidence of certifications (SOC 2, ISO 27001), review their public security posture (security ratings, breach history), and include cybersecurity requirements in your contract. For critical suppliers, consider periodic on-site assessments.
Get your Cyber Defense Score™ in 60 seconds.
100 tools. No installation. No credit card. Real evidence.