Critical infrastructure environments carry the standard enterprise credential gap — plus
operational risks that exist nowhere else.
01 — Operational
Vendor and contractor remote access
Third-party engineers connect to OT networks via VPN or remote desktop
using credentials the operator organisation did not generate and cannot instantly revoke. 82% of
cyber-physical attacks use this remote access layer as entry vector. The vendor’s employee turnover is the
operator’s uncontrolled exposure.
When the relationship ends, how fast can you revoke access to your SCADA
environment? If the answer involves a ticket, you have a gap.
02 — Operational
Shared operator credentials
Many OT environments use shared login accounts for control systems — a
legacy architecture inherited from before multi-user authentication existed on these platforms. Shared
credentials mean no individual attribution, no audit trail, and no ability to revoke one person’s access
without affecting the whole team.
A forensic investigation into an incident at Oldsmar was complicated by shared
credentials. There was no way to know who had been logged in.
03 — Safety
Credential compromise reaching physical processes
Unlike an IT breach, a credential compromise that reaches the OT layer
can trigger physical consequences — valves open, circuit breakers trip, process parameters change. The dwell
time between credential theft and operational impact in OT environments is measured in hours. Detection
happens after physical damage.
The credential is the access to the process. Controlling the credential is the
first line of physical safety defence.
04 — Regulatory
NIS2 and CAF B2 evidence requirements
NIS2 Article 21 requires essential service operators to demonstrate
access control governance. NCSC CAF Principle B2 requires organisations to closely manage and maintain
identity and access control for all users — including automated systems. Policy documents do not satisfy
this. Continuous, timestamped credential logs do.
NIS2 personal liability for named management applies to critical infrastructure
operators who cannot demonstrate structural access control.
05 — Supply chain
Software and maintenance supply chain access
OT system vendors — Siemens, Rockwell, Schneider, GE — routinely
require remote access for updates, maintenance, and monitoring. SolarWinds demonstrated that vendor build
credentials are the highest-risk entry point in enterprise supply chains. In OT, vendor access reaches
process control systems directly.
Every vendor with remote access to your OT environment is carrying credentials
they created, not you. You cannot revoke what you do not own.
06 — Emerging
AI and automation agent credentials
Industrial AI deployments — predictive maintenance, automated process
optimisation, anomaly detection — are introducing non-human identities into OT environments at scale. Each
AI agent holds credentials to the systems it monitors and controls. Those credentials are created by the
development team, not the operational security team.
The 82:1 ratio of AI agents to humans in enterprise environments is arriving in
critical infrastructure. Without credential governance, each AI deployment is a new ungoverned access path.