ARTICLES / MANUFACTURING & INDUSTRIAL

Why OT/IT convergence makes manufacturing credential control a production-line issue


When Toyota's global production ground to a halt in February 2022 due to a cyberattack on key supplier Kojima Industries, the automotive giant faced a stark reality: in today's interconnected manufacturing environment, a credential breach at one partner can cascade across entire supply chains. The incident, which forced Toyota to suspend operations at 14 plants, exemplified how operational technology (OT) and information technology (IT) convergence has transformed cybersecurity from a back-office concern into a production-line imperative.

The manufacturing security paradox

Manufacturing executives face an unprecedented challenge. Digital transformation initiatives have connected previously isolated operational systems to corporate networks and cloud services, creating enormous efficiency gains. Yet this convergence has fundamentally altered the threat landscape. Where factory floor systems once operated in air-gapped isolation, they now share network infrastructure with business applications, creating pathways for cybercriminals to move between IT and OT environments.

The problem centres on credential management. Manufacturing environments typically house thousands of accounts across multiple systems: enterprise resource planning (ERP) platforms, manufacturing execution systems (MES), supervisory control and data acquisition (SCADA) networks, and programmable logic controllers (PLCs). Each system traditionally maintained its own authentication mechanisms, creating credential sprawl that becomes exponentially more dangerous when networks converge.

Consider a typical automotive plant. Production engineers require access to design systems, quality databases, and shop-floor controllers. Maintenance technicians need credentials for both corporate ticketing systems and industrial control panels. Supply chain coordinators must authenticate across procurement platforms and logistics networks. When these previously separate domains share infrastructure, compromised credentials in one system can provide attackers with lateral movement opportunities across the entire operation.

The scale of exposure

Recent data illuminates the magnitude of this challenge. IBM's 2024 Cost of a Data Breach Report found that manufacturing suffers the second-highest average breach cost at $4.88 million, with 70% of incidents involving credential-based attacks. The Ponemon Institute's 2024 State of Operational Technology Security study revealed that 78% of manufacturing organizations experienced at least one OT security incident in the past year, with 65% reporting multiple breaches.

More concerning is the dwell time—the period between initial compromise and detection. Manufacturing environments showed an average dwell time of 207 days, significantly above the global average of 194 days. This extended exposure period reflects the challenge of monitoring converged environments where traditional IT security tools struggle to provide visibility across operational systems.

The financial impact extends beyond direct breach costs. Dragos, the industrial cybersecurity firm, reported that 80% of manufacturing cyberattacks resulted in production disruptions, with average downtime costs of $50,000 per hour for large facilities. When multiplied across supply chains, these figures escalate rapidly.

Regulatory pressures compound the challenge. The EU's NIS2 Directive, effective from October 2024, explicitly covers manufacturing as essential infrastructure, requiring "appropriate and proportionate" cybersecurity measures including access controls. Similarly, the US Cybersecurity and Infrastructure Security Agency (CISA) has designated manufacturing as critical infrastructure subject to enhanced security requirements under Executive Order 14028.

Why traditional solutions fall short

Manufacturing organizations have deployed various security technologies to address credential risks, yet breaches continue to occur. Identity and Access Management (IAM) systems provide centralized user provisioning but rely fundamentally on users maintaining secure passwords—a weak link repeatedly exploited by attackers. The 2023 Verizon Data Breach Investigations Report found that 86% of manufacturing breaches involved human elements, predominantly credential theft or misuse.

Privileged Access Management (PAM) solutions attempt to secure high-value accounts but create operational friction that often leads to workarounds. In manufacturing environments where production cannot stop for password resets, users frequently share credentials or maintain unauthorized access routes—behaviors that undermine PAM effectiveness.

Single Sign-On (SSO) and Multi-Factor Authentication (MFA) reduce password fatigue but remain vulnerable to sophisticated attacks. The Lapsus$ group's recent campaigns against manufacturing targets demonstrated how social engineering and SIM-swapping can bypass MFA protections. When users control authentication factors, these factors become attack vectors.

Zero Trust architectures promise continuous verification but struggle with legacy OT systems that cannot support modern authentication protocols. Manufacturing environments contain decades-old control systems that lack native security capabilities, creating islands of weak authentication within otherwise secure networks.

The fundamental issue persists: all these approaches assume users will securely manage credentials. This assumption fails consistently in real-world environments where operational pressures, social engineering, and human error create persistent vulnerabilities.

A structural approach to credential control

The solution requires inverting the traditional model. Instead of expecting users to securely manage credentials, organizations must assume complete control over credential generation, distribution, and lifecycle management. This means users never see, store, or transmit passwords—eliminating the primary attack vector for credential-based breaches.

MyCena's approach exemplifies this structural shift. The platform generates unique, encrypted credentials for each user-system combination, distributing them through secure channels without user visibility. When authentication is required, the system automatically retrieves and submits credentials without exposing them to potential compromise. Users gain seamless access while organizations maintain complete credential control.

This model proves particularly valuable in manufacturing environments where operational continuity is paramount. Production engineers can access multiple systems without password management overhead, while security teams gain granular visibility and control over every authentication event. The approach scales across converged IT/OT environments, providing consistent security regardless of system age or architecture.

Implementation requires minimal infrastructure changes while delivering immediate risk reduction. Organizations report significant decreases in credential-related incidents and support overhead, alongside improved compliance posture for regulatory requirements.

The production imperative

Manufacturing leaders must recognize that credential security is no longer an IT issue—it is a production continuity issue. As OT/IT convergence accelerates, traditional security approaches that rely on user-managed credentials will prove increasingly inadequate. Organizations that implement structural credential control today will build resilience against tomorrow's threats while maintaining the operational agility that digital transformation promises.

The choice is clear: invest in systems that eliminate credential exposure, or accept the mounting risk that the next breach will halt production across your operation.

MyCena
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.