Are you investing in OMLEX, or CAPEX driven by fear?
There has been a lot of talk that extending the life of existing control systems is a bad idea. That you must upgrade because of cybersecurity.
Let’s be honest. It’s not about cybersecurity. It’s about CAPEX.
OMLEX means Operation and Maintenance Life Extension. Keeping proven systems running, under control, with full ownership and understanding.
You are told your system is obsolete, risky, and must be replaced. But what are you actually getting? New software, new vulnerabilities, new dependencies, and another upgrade cycle in a few years.
OEM keeps pushing for upgrades ... is new better? Think again!
Even within modernization and refurbishment projects, including recent T3000 / Omnivise deployments, it is not evident that all the listed IEC 62443 certifications are fully met across the board.
This raises a fundamental question:
Are we using certification as a meaningful assurance mechanism — or as a filtering tool without fully understanding what risk it actually covers?
I believe we need to shift the discussion from:
→ “Do we have the certificate?”
to:
→ “Do we understand and control our risks?”
ISO 27000 provides a useful foundation here, particularly in how it defines risk treatment strategies, including:
The last point is often overlooked, but highly relevant for OT.
Avoiding risk means:
not allowing conditions under which the risk can occur
In practical terms for control systems, this translates directly into:
This is not theoretical — it is a recognized and valid approach within the standard itself, and aligns with the direction we should be taking.
A large portion of the questions raised relate to technologies:
These are valid in IT environments, but in OT we must be cautious.
Adding layers of tools often introduces:
The alternative approach — which we have seen in practice — is to focus on architecture first:
In simple terms:
If the system is not reachable, it is significantly harder to compromise.
The concern regarding virtualization is understood, especially based on previous experiences.
However, the key difference in the approach being proposed is:
This is fundamentally different from full system upgrades, where:
We should also challenge one assumption:
Upgrading the system does not inherently improve cybersecurity.
In fact, experience across multiple plants shows that upgrades often:
Even current platforms are bound by hardware lifecycle constraints:
So the real question becomes:
Are we reducing risk — or simply shifting it while increasing cost and dependency?
From a Gx perspective, our priority is clear:
Business Continuity.
Not compliance on paper, but:
This is where the concept of isolation-based cybersecurity becomes relevant:
A concern was raised regarding OEM involvement.
The proposed approach does not interfere with:
OEM support can still be engaged where required.
However, we should be realistic:
The biggest long-term risk is not lack of OEM involvement, but over-dependence on OEM-driven lifecycle and upgrade cycles.
I suggest the following direction:
—not only on certification status.