Skip to content

Firewall. Remote Access. CVE 10. Stop Calling It Cybersecurity.

Petr Roupec
Petr Roupec
Firewall. Remote Access. CVE 10. Stop Calling It Cybersecurity.
5:29

Are you investing in OMLEX, or CAPEX driven by fear?

There has been a lot of talk that extending the life of existing control systems is a bad idea. That you must upgrade because of cybersecurity.

Let’s be honest. It’s not about cybersecurity. It’s about CAPEX.

OMLEX means Operation and Maintenance Life Extension. Keeping proven systems running, under control, with full ownership and understanding.
You are told your system is obsolete, risky, and must be replaced. But what are you actually getting? New software, new vulnerabilities, new dependencies, and another upgrade cycle in a few years.

Screenshot 2026-03-19 at 9.06.57

1. On IEC 62443 Certification - OEM Evergreen Story

OEM keeps pushing for upgrades ... is new better? Think again!

Even within modernization and refurbishment projects, including recent T3000 / Omnivise deployments, it is not evident that all the listed IEC 62443 certifications are fully met across the board.

This raises a fundamental question:

Are we using certification as a meaningful assurance mechanism — or as a filtering tool without fully understanding what risk it actually covers?
  • Mapped IEC 62443 functional requirements into auditable operational controls
  • Translated these into a plant-specific risk profile
  • Or aligned them systematically with other frameworks such as ISO 27000

2. Moving from Compliance to Risk-Based Thinking

I believe we need to shift the discussion from:

“Do we have the certificate?”

to:

“Do we understand and control our risks?”

ISO 27000 provides a useful foundation here, particularly in how it defines risk treatment strategies, including:

  • reducing risk
  • accepting risk
  • transferring risk
  • and importantly, avoiding risk

The last point is often overlooked, but highly relevant for OT.

Avoiding risk means:

not allowing conditions under which the risk can occur

In practical terms for control systems, this translates directly into:

  • isolation
  • segmentation
  • controlled exposure

This is not theoretical — it is a recognized and valid approach within the standard itself, and aligns with the direction we should be taking.

3. Architectural Approach vs Tool-Based Security

A large portion of the questions raised relate to technologies:

  • SIEM
  • NGFW
  • Anti-malware
  • vulnerability scanners
  • etc.

These are valid in IT environments, but in OT we must be cautious.

Adding layers of tools often introduces:

  • additional complexity
  • new dependencies (patching, signatures, updates)
  • new failure modes
  • and in some cases, new attack surfaces

The alternative approach — which we have seen in practice — is to focus on architecture first:

  • strict separation of control systems
  • elimination of unnecessary connectivity
  • unidirectional data transfer where required (data diode concept)
  • controlled and auditable interfaces only

In simple terms:

If the system is not reachable, it is significantly harder to compromise.

4. On Virtualization and Residual Risk

The concern regarding virtualization is understood, especially based on previous experiences.

However, the key difference in the approach being proposed is:

  • virtualization is used as a preservation mechanism, not transformation
  • control logic and automation layers remain untouched
  • HMI environments are retained in a controlled and isolated context
  • the overall system behavior remains deterministic

This is fundamentally different from full system upgrades, where:

  • the entire platform changes
  • new vulnerabilities are introduced
  • and long-term dependency on OEM lifecycle increases

5. On Upgrades as a Cybersecurity Measure

We should also challenge one assumption:

Upgrading the system does not inherently improve cybersecurity.

In fact, experience across multiple plants shows that upgrades often:

  • introduce new vulnerabilities
  • create dependency on continuous patching cycles
  • and lead to repeated obsolescence cycles

Even current platforms are bound by hardware lifecycle constraints:

  • S7-300 is already discontinued
  • spare parts availability is limited to defined timeframes
  • costs increase while availability decreases

So the real question becomes:

Are we reducing risk — or simply shifting it while increasing cost and dependency?

6. Business Continuity as the Primary Objective

From a Gx perspective, our priority is clear:

Business Continuity.

Not compliance on paper, but:

  • systems that continue operating
  • systems that can be maintained and repaired
  • systems that do not introduce unnecessary operational risk

This is where the concept of isolation-based cybersecurity becomes relevant:

  • reduced attack surface
  • predictable system behavior
  • minimal external dependency
  • controlled data flows

7. On OEM Interaction and Practical Reality

A concern was raised regarding OEM involvement.

The proposed approach does not interfere with:

  • control logic
  • engineering tools
  • or automation layer operation

OEM support can still be engaged where required.

However, we should be realistic:

The biggest long-term risk is not lack of OEM involvement, but over-dependence on OEM-driven lifecycle and upgrade cycles.

8. Practical Way Forward

I suggest the following direction:

  1. Define an Company-specific OT cybersecurity model, based on:
  2. Focus on:
  3. Evaluate solutions based on:

—not only on certification status.

Share this post