03/03/2026 | Press release | Distributed by Public on 03/03/2026 03:07
What is new is not the acknowledgement of risk, but the structure. The NCSC sets out eight principles that guideorganisationstowards a deliberately controlled and secure OT environment. The emphasis is on reducing unnecessary exposure, strengtheningboundaries between IT and OT, and establishingmonitoringthat reflects real-world cyber threats, rather than theoretical risks.The eight principles are outlined as the following;
1. Balance the risks and opportunities
Before making anyOTconnectivity change, organisations should weigh the operational benefit against the cyber and safety risks. Every connection should have a clear, documented rationale for why it is needed. This includes thinking about older equipment that can'tbe updated, and dependencies on external services, and what would happen if the connection failed or was misused.
2. Limit the exposure of your connectivity
Reduce unnecessary or poorly controlled connections to minimise the attack surface. Only essential connections should exist, and exposure time should be kept short wherever possible.
3. Centralise and standardise network connections
Where connectivity is required, access paths should be standardised so that consistent controls can be applied across all access points, making logging, monitoring, and incident response streamlined.
4. Use standardised and secure protocols
5. Harden your OT boundary
The boundary between IT and OT should be defended with appropriate preventative controls, such as removing unused ports/services and implementing firewalls with the ability for deeper traffic inspection (Next-Gen Firewalls). This will reduce the chance of a compromise in one domain spreading to another. OT systems should also never be directly exposed to the internet as this could open the door to an easy intrusion.
6. Limit the impact of compromise
Accepting that breaches may happen, OT networks should be segmented and designed to prevent the propagation of malware or insecure configurations. Tested incident response and recovery plans should also be in place to ensure that any compromise can be contained effectively.
7. Ensure all connectivity is logged and monitored
Comprehensive logging and continuous monitoring are essential for detecting suspicious activity, supporting investigations, and informing response decisions.
8. Establishan isolation plan
Organisations should have plans to isolate critical systems or disconnect insecure connections quickly,if needed, preserving operational safety and continuity.
These principles are intended as desirable end goals, not minimumrequirements. Theycan be applied to both new and existing OT systems to improve resilience against cyber threats while maintainingsafe and reliable operations. For your clients, this guidance reinforces a key point. OT cyber risk is no longer just an IT issue. It is an operational, safety and resilience issue with real-worldphysicalconsequences.