Manufacturing carries the standard enterprise credential gap — amplified by one factor that
exists nowhere else at the same intensity: the direct, physical consequence of a stopped production line.
01 — Production cost
Every hour of downtime has a number
Manufacturing downtime costs are immediate and specific — not insurable losses
on a spreadsheet but real production hours that cannot be recovered. At MKS Instruments, $200M in lost
revenue was the direct consequence of compromised access credentials on production systems.
A manufacturer running at full capacity has no recovery window for lost
production days. Overtime cannot recapture a missed shipment on a full schedule. A semiconductor fab losing
one day of output loses that output permanently. The cost of a credential breach in manufacturing is not the
cost of the breach — it is the cost of the production line at a standstill, multiplied by the dwell time
before restoration.
02 — IT/OT boundary
The credential that crosses from IT into OT
Three-quarters of manufacturing ransomware shutdowns are indirect — IT
credentials cross the IT/OT boundary and trigger precautionary OT shutdowns. The credential does not need to
reach the PLC. It only needs to reach the network that the PLC depends on.
The Waterfall 2024 Threat Report found that 75% of manufacturing
ransomware shutdowns were indirect — OT systems went down not because they were directly attacked but
because the IT network they depended on was compromised. Network segmentation is the standard response, but
segmentation does not govern the credential that crosses the boundary at the point of human use. A
technician with valid credentials to both IT and OT systems is a crossing point regardless of segmentation
architecture.
03 — Supply chain
Vendor and contractor credentials to production systems
Manufacturing depends on dozens of OEM vendors, maintenance contractors, and
system integrators who hold credentials to production systems. The MKS breach cascaded to Applied Materials.
One supplier’s credential gap became $450M in combined losses across two companies.
Supply chain attacks on manufacturers nearly doubled from 154 incidents
in 2024 to 297 in 2025. Every vendor with remote access to a production environment holds a credential that
reaches that environment. When the vendor is compromised, the manufacturer’s production floor is the blast
radius. MyCena governs vendor credentials from the manufacturer side — the vendor never holds a credential
the manufacturer did not generate and cannot instantly revoke.
04 — Legacy OT
Unpatched systems that cannot be protected but can be reached
80% of manufacturers still carry critical vulnerabilities in legacy OT systems.
These systems cannot be patched without production downtime. They can, however, be reached through a
compromised IT credential. The vulnerability in the OT system is permanent — the credential that reaches it
does not have to be.
Legacy PLCs, SCADA systems, and industrial controllers run firmware
that is years or decades old — designed before network connectivity was assumed. They cannot be updated
without halting production. The security architecture response is network segmentation and access control at
the IT/OT boundary. But that boundary is crossed by every technician, vendor, and remote support engineer
who holds a credential to both sides. MyCena controls the credential at the human layer — the only layer
where governance is possible without touching the OT system itself.
05 — Regulatory
NIS2 and personal liability for operational technology failures
Manufacturers classified as essential or important entities under NIS2 face
personal management liability for ICT risk governance failures. A production shutdown following a credential
breach that management knew about and did not structurally address is an NIS2 enforcement event — not just
an operational incident.
NIS2 Article 20 places direct personal accountability on named senior
management for cybersecurity governance failures at essential service operators. Manufacturing companies in
sectors including food, chemicals, automotive, and semiconductor supply chain are classified as essential or
important entities. The management team briefed on a credential governance gap that did not act has
documented its awareness of a known risk under Article 20 — awareness without action is the liability.
06 — AI and automation
AI agents and automated systems accessing production infrastructure
Manufacturers are deploying AI agents for quality control, predictive
maintenance, and process optimisation. Every AI agent holds credentials to the systems it accesses. Those
credentials are typically ungoverned — created by developers, stored in configuration files, and never
entered into any revocation process.
An AI agent decommissioned or compromised carries the same credential
breach risk as a human operator — at machine speed, without the behavioural signals that anomaly detection
systems rely on. As manufacturers automate more of the production environment, the ratio of AI agent
credentials to human credentials grows. MyCena governs AI agent credentials on the same platform as human
operators — with the same central generation, the same individual attribution, and the same instant
revocation capability.