{"id":3244,"date":"2024-08-28T18:54:07","date_gmt":"2024-08-28T18:54:07","guid":{"rendered":"https:\/\/softwaredefinedautomation.io\/?p=3244"},"modified":"2024-08-28T18:54:07","modified_gmt":"2024-08-28T18:54:07","slug":"manufacturing-needs-a-stronger-lock-on-the-ot-front-door","status":"publish","type":"post","link":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/","title":{"rendered":"Manufacturing Needs a Stronger Lock on the OT Front Door"},"content":{"rendered":"<p><span style=\"font-weight: 400\">I previously wrote on the growth of ransomware attacks in manufacturing and how cyber attackers are aggressively going after operational technology (OT) environments for profit through a variety of means\u2014including phishing, malicious email, exploited vulnerabilities, downloads, and brute force attacks\u2014to <\/span><a href=\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/manufacturing-has-a-backup-problem\/\" target=\"\u201d_blank\u201d\" rel=\"noopener\"><span style=\"font-weight: 400\">exploit vulnerabilities in backup systems<\/span><\/a><span style=\"font-weight: 400\">. But some attackers stroll right through the front door\u2014simply by logging into authorized accounts. How can they do this? By using identity-based attacks and social engineering to obtain legitimate user credentials. These approaches encompass a variety of techniques, but the main difference is that identity-based attacks use systems to access or crack passwords, while social engineering approaches, including phishing, are designed to get the users themselves to divulge their login info. Either way, it\u2019s a big problem.<\/span><\/p>\n<h3>Identity-based infiltration is on the rise<\/h3>\n<p><span style=\"font-weight: 400\">It\u2019s happened to all of us: You receive a letter from some company you\u2019ve done business with at some point stating that they had a data breach and your personal information may have been compromised. When this happens, your login credentials could end up available for sale on the dark web, so the company offers you 12 months of free credit monitoring. If it feels like you\u2019re getting more of these notices lately, it\u2019s not just you.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">According to IBM\u2019s <\/span><a href=\"https:\/\/www.ibm.com\/reports\/threat-intelligence\" target=\"\u201d_blank\u201d\" rel=\"noopener\"><span style=\"font-weight: 400\">2024 X-Force Threat Intelligence Index<\/span><\/a><span style=\"font-weight: 400\">, there was a 71% increase year over year in the volume of attacks using valid credentials\u2014and for the first time ever, \u201cabusing valid accounts became cybercriminals\u2019 most common entry point into victim environments.\u201d Furthermore, manufacturing was the top-attacked industry for the third year in a row, representing more than one-quarter (25.7%) of all incidents in the top 10 most-attacked industries, and the use of valid accounts represented 41% of incidents in North America.<\/span><\/p>\n<p><span style=\"font-weight: 400\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-3252 alignleft\" src=\"https:\/\/softwaredefinedautomation.io\/wp-content\/uploads\/2024\/08\/manufacturing-authentication-1-300x250.png\" alt=\"\" width=\"600\" height=\"500\" srcset=\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/manufacturing-authentication-1-300x250.png 300w, https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/manufacturing-authentication-1-520x434.png 520w, https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/manufacturing-authentication-1-574x479.png 574w, https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/manufacturing-authentication-1-180x150.png 180w, https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/manufacturing-authentication-1-86x72.png 86w, https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/manufacturing-authentication-1-60x50.png 60w, https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/manufacturing-authentication-1-190x158.png 190w, https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/manufacturing-authentication-1-338x282.png 338w, https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/manufacturing-authentication-1-52x43.png 52w, https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/manufacturing-authentication-1-62x52.png 62w, https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/manufacturing-authentication-1-48x40.png 48w, https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/manufacturing-authentication-1-50x42.png 50w, https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/manufacturing-authentication-1-70x58.png 70w, https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/manufacturing-authentication-1-333x278.png 333w, https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/manufacturing-authentication-1-619x516.png 619w, https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/manufacturing-authentication-1.png 692w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/span><\/p>\n<p><span style=\"font-weight: 400\">The reason for this rise isn\u2019t hard to grasp. After all, why hack in when you can simply log in? It\u2019s easier to harvest user names and passwords than to write and execute new exploits. Manufacturing organizations need to implement stronger controls to make identity-based intrusions <\/span><i><span style=\"font-weight: 400\">much<\/span><\/i><span style=\"font-weight: 400\"> harder.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Training is critical to enable users to recognize social engineering attempts so they don\u2019t fall prey to them. But training is not enough. You need to fortify your authentication controls with phishing-resistant systems and protocols\u2014and you need to extend those controls across the entire OT environment, including all of your legacy systems.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Authentication plays a critical role in a robust zero-trust identity and access management strategy. There are three areas in particular to focus on to improve the security and protection of your critical OT systems: multi-factor authentication (MFA), single sign-on (SSO), and role-based access control (RBAC).<\/span><\/p>\n<h3>Layer up your authentication defenses with MFA<\/h3>\n<p><span style=\"font-weight: 400\">A password is one form of authentication. It\u2019s something the user <\/span><i><span style=\"font-weight: 400\">knows<\/span><\/i><span style=\"font-weight: 400\">. But if a hacker also knows the password, it\u2019s easy for them to get in. MFA adds an additional level of protection by also requiring something the user <\/span><i><span style=\"font-weight: 400\">has<\/span><\/i><span style=\"font-weight: 400\">, which the hacker does not have easy access to. Typically, this additional form of verification is sent to email, text, or an authenticator app.\u00a0<\/span><\/p>\n<h3>Streamline logins\u2014securely\u2014with SSO<\/h3>\n<p><span style=\"font-weight: 400\">Your users work with multiple systems. When they need different credentials to log into each one, it doesn\u2019t just create so-called password fatigue, it increases the chances that they\u2019ll pick easy-to-remember (and easier-to-crack) passwords, or that they\u2019ll write down all their different credential combinations, which is a security risk. SSO allows users to securely log into multiple applications using one set of credentials. Companies use SSO to centralize authentication and improve security by enforcing strong access and security policies. With SSO, you provision a user the day they start at the company, giving them access to all the accounts they need with one set of credentials. And then when they leave the company, you can deprovision them from all systems in one action from a single point. SSO enables you to streamline identity management, centralize access control and monitoring, and decrease your attack surface\u2014all of which strengthen your overall security posture.<\/span><\/p>\n<h3>Easily provide as-needed access with RBAC<\/h3>\n<p>RBAC enables you to restrict access to a system based on a user\u2019s role, rather than having to assign and manage permissions on an individual basis. RBAC doesn\u2019t prevent you providing individualized access when needed, but it streamlines the overall permissioning process while still ensuring that people have access to the applications they need to perform their jobs. A subset of role-based access control is time-based access control, which grants access for limited period of time and self-expires. You might use time-based access control with a vendor who needs to access a project or programmable logic controller (PLC)\u2014or even a set of projects or PLCs\u2014just until next Friday, for example.<\/p>\n<h3>Software Defined Automation supports strong authentication controls<\/h3>\n<p><strong>MFA:<\/strong> SDA strongly recommends that users and companies implement MFA for all SaaS and enterprise applications whenever possible. Our products use MFA with authentication apps using QR codes. We support many of the popular authenticator apps (TOTP-compliant applications), including Google Authenticator, Microsoft Authenticator, Twilio Authy Authenticator, Duo Mobile, and Symantec VIP. MFA is enabled through the User Profile menu and can be used for login, as well as optionally for additional critical actions within the system such as to start <a href=\"https:\/\/softwaredefinedautomation.io\/browser-based-engineering\/\" target=\"\u201d_blank\u201d\" rel=\"noopener\">Browser-based Engineering<\/a>, approve deployment requests, and execute deployments.<\/p>\n<p><strong>SSO:<\/strong> SDA\u2019s Enterprise offering supports a wide range of SSO providers.<\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Integrates with identity providers (IdPs) that are based on SAML 2.0, OpenID Connect (OIDC), and OAuth 2.0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Supports Active Directory<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Available to extend to any commercial provider that supports the above-listed IdPs<\/span><\/li>\n<\/ul>\n<p><b>RBAC and fine-grained permissions:<\/b><span style=\"font-weight: 400\"> The SDA console makes it simple to manage users and roles. There are standard roles for admins and users, and user permissions can be further refined to control access to specific devices or projects. You can also set time-based permissions that expire after a defined period to provide temporary access as needed.\u00a0<\/span><\/p>\n<h3>Learn more about OT security<\/h3>\n<p><span style=\"font-weight: 400\">Watch our on-demand webinar to learn more about <\/span><a href=\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/events-and-webinars\/webinars\/authentication-mitigates-ot-security-risks\/\" target=\"\u201d_blank\u201d\" rel=\"noopener\"><span style=\"font-weight: 400\">how authentication mitigates OT security risks<\/span><\/a><span style=\"font-weight: 400\">. If you missed our session on <\/span><a href=\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/events-and-webinars\/webinars\/automate-backup-and-recovery-of-your-plcs\/\" target=\"\u201d_blank\u201d\" rel=\"noopener\"><span style=\"font-weight: 400\">how to easily and quickly automate backup and recovery of your PLCs<\/span><\/a><span style=\"font-weight: 400\">, that\u2019s also available on demand. And be sure to register for our next webinar on September 19, which will focus on operational and data security features, including a demo of how SDA supports the NIST cybersecurity framework.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">And you can dive into Software Defined Automation\u2019s Industrial DevOps tools yourself when you <\/span><a href=\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/start-now\/\" target=\"\u201d_blank\u201d\" rel=\"noopener\"><span style=\"font-weight: 400\">sign up for a free 14-day trial<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I previously wrote on the growth of ransomware attacks in manufacturing and how cyber attackers are aggressively going after operational technology (OT) environments for profit through a variety of means\u2014including phishing, malicious email, exploited vulnerabilities, downloads, and brute force attacks\u2014to exploit vulnerabilities in backup systems. But some attackers stroll right through the front door\u2014simply by &hellip; <a href=\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/\">Continued<\/a><\/p>\n","protected":false},"author":2,"featured_media":3261,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"tags":[],"class_list":["post-3244","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Manufacturing Needs a Stronger Lock on the OT Front Door - SDA old<\/title>\n<meta name=\"description\" content=\"This article presents the application of end-to-end DevOps, from PLC code development to commissioning and beyond\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Manufacturing Needs a Stronger Lock on the OT Front Door - SDA old\" \/>\n<meta property=\"og:description\" content=\"This article presents the application of end-to-end DevOps, from PLC code development to commissioning and beyond\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/\" \/>\n<meta property=\"og:site_name\" content=\"SDA old\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-28T18:54:07+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/sda-new.staging.markupus.com\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/Untitled-design-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"577\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"markupus\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"markupus\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/\",\"url\":\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/\",\"name\":\"Manufacturing Needs a Stronger Lock on the OT Front Door - SDA old\",\"isPartOf\":{\"@id\":\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/Untitled-design-2.png\",\"datePublished\":\"2024-08-28T18:54:07+00:00\",\"author\":{\"@id\":\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/#\/schema\/person\/275c77780dc74bfbcad4288a8c530426\"},\"description\":\"This article presents the application of end-to-end DevOps, from PLC code development to commissioning and beyond\",\"breadcrumb\":{\"@id\":\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/#primaryimage\",\"url\":\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/Untitled-design-2.png\",\"contentUrl\":\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/Untitled-design-2.png\",\"width\":1024,\"height\":577},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Manufacturing Needs a Stronger Lock on the OT Front Door\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/#website\",\"url\":\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/\",\"name\":\"SDA old\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/#\/schema\/person\/275c77780dc74bfbcad4288a8c530426\",\"name\":\"markupus\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/59dbbe0c00ab16a52b414bbb73667c6ac92a4048f99a41472c7ef3396e2a07fe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/59dbbe0c00ab16a52b414bbb73667c6ac92a4048f99a41472c7ef3396e2a07fe?s=96&d=mm&r=g\",\"caption\":\"markupus\"},\"url\":\"https:\/\/www.softwaredefinedautomation.io\/sda-old\/author\/markupus\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Manufacturing Needs a Stronger Lock on the OT Front Door - SDA old","description":"This article presents the application of end-to-end DevOps, from PLC code development to commissioning and beyond","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Manufacturing Needs a Stronger Lock on the OT Front Door - SDA old","og_description":"This article presents the application of end-to-end DevOps, from PLC code development to commissioning and beyond","og_url":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/","og_site_name":"SDA old","article_published_time":"2024-08-28T18:54:07+00:00","og_image":[{"width":1024,"height":577,"url":"http:\/\/sda-new.staging.markupus.com\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/Untitled-design-2.png","type":"image\/png"}],"author":"markupus","twitter_card":"summary_large_image","twitter_misc":{"Written by":"markupus","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/","url":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/","name":"Manufacturing Needs a Stronger Lock on the OT Front Door - SDA old","isPartOf":{"@id":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/#primaryimage"},"image":{"@id":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/#primaryimage"},"thumbnailUrl":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/Untitled-design-2.png","datePublished":"2024-08-28T18:54:07+00:00","author":{"@id":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/#\/schema\/person\/275c77780dc74bfbcad4288a8c530426"},"description":"This article presents the application of end-to-end DevOps, from PLC code development to commissioning and beyond","breadcrumb":{"@id":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/#primaryimage","url":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/Untitled-design-2.png","contentUrl":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-content\/uploads\/sites\/2\/2024\/08\/Untitled-design-2.png","width":1024,"height":577},{"@type":"BreadcrumbList","@id":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/resources\/blog\/2024\/08\/28\/manufacturing-needs-a-stronger-lock-on-the-ot-front-door\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/"},{"@type":"ListItem","position":2,"name":"Manufacturing Needs a Stronger Lock on the OT Front Door"}]},{"@type":"WebSite","@id":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/#website","url":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/","name":"SDA old","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/#\/schema\/person\/275c77780dc74bfbcad4288a8c530426","name":"markupus","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/59dbbe0c00ab16a52b414bbb73667c6ac92a4048f99a41472c7ef3396e2a07fe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/59dbbe0c00ab16a52b414bbb73667c6ac92a4048f99a41472c7ef3396e2a07fe?s=96&d=mm&r=g","caption":"markupus"},"url":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/author\/markupus\/"}]}},"_links":{"self":[{"href":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-json\/wp\/v2\/posts\/3244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-json\/wp\/v2\/comments?post=3244"}],"version-history":[{"count":0,"href":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-json\/wp\/v2\/posts\/3244\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-json\/wp\/v2\/media\/3261"}],"wp:attachment":[{"href":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-json\/wp\/v2\/media?parent=3244"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.softwaredefinedautomation.io\/sda-old\/wp-json\/wp\/v2\/tags?post=3244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}