Mind The Gap: Who Owns What in OT Security?
The IT-OT ownership boundary isn't a security problem. It's an organizational one β and attackers know it better than you do.
When a cyber incident hits an industrial facility, one question determines the outcome faster than any technical response: "Who has the authority to decide whether our OT is safe to keep running?" Most organizations can't answer that question β not because people are negligent, but because nobody was ever assigned the answer.
Who Owns What in OT Security? The CFC Accountability Map
The IT security team stops at the IT boundary. The OT engineering team doesn't think in security terms. The incident clock runs while everyone looks at each other.
Industrial Cyber describes this as "more of an organizational structural problem, not only a technical one, which is costing organizations the time they cannot afford to waste."
The Cyber Fusion Center doesn't begin by deploying a monitoring tool. It begins by building a map. And that mapping only starts once an executive sponsor exists. Without an owner who commissions the work, accountability gaps stay invisible indefinitely.
Why the Gap Is Structural, Not Individual
OT networks typically report to the Chief Operating Officer. IT networks report to the Chief Information Officer. These organizations were built for different missions and measure success differently. Fortinet's 2025 State of OT Cybersecurity report captures the result: 95% of organizations have C-suite ownership assigned for OT security, but only 49% have reached Level 3 or 4 solution maturity. Title-based assignment and operational accountability are two very different things.
According to Waterfall Security and ICS STRIVE's 2025 OT Cyber Threat Report, only 13% of OT attacks in 2024 directly touched OT systems. Nearly 90% caused physical impact indirectly through compromised IT systems. Attack paths flow through the IT-OT boundary precisely because it's an organizational seam, not a technical one. This article is the operational response: mapping and closing those gaps before attackers reach them.
Five Gaps the CFC Consistently Finds
Remote access ownership. In 2025, 46% of manufacturing companies identified remote access as their weakest security link. Shared logins, default credentials and missing per-user traceability mean organizations can't answer a basic question: who made that change?
Vendor access governance. In 2025, 42% of manufacturing companies reported a breach related to vendor access. ProArch practitioners documented a representative example: a vendor added a remote access rule granting full access from the business network into the OT environment without alerts, approvals or oversight. Nobody owned vendor access governance, so nobody caught it.
OT incident response authority. SANS Institute's 2024 ICS/OT Cybersecurity Survey found only 56% of organizations had an ICS/OT-specific incident response plan. Applying IT-centric response actions in OT environments β aggressive containment, indiscriminate isolation, automated shutdowns β can halt production or create unsafe conditions. Without a defined owner who understands both domains, response decisions get made by whoever is in the room.
Legacy system risk ownership. OT systems routinely operate for 15 to 20 years. Everyone knows the system is a risk, but nobody is willing to touch it as long as it still works. That's not negligence β it's an organizational vacuum. No one has the authority to weigh production risk against security risk and make the call.
Change window coordination. IT teams prioritize rapid patching. OT operations resist downtime. Without a defined owner to break ties, changes either don't happen, or they happen unsecured while someone accepts undocumented risk.
These five gaps carry their highest cost during active incidents. The incident response authority structure established through this mapping is the foundation for the OT-specific IR governance the CFC builds next.
Why Technology Doesn't Close This Gap
The instinct is to deploy a tool. Better monitoring. Enhanced access controls. An OT-specific EDR platform. These are valid capabilities β and they fail without governance beneath them.
NIST's Cybersecurity Framework 2.0 made "Govern" its first function for a reason: governance defines roles, risk appetite and policy. Without it, technical efforts drift, duplicate or conflict. CISA's OT Asset Inventory Guidance is direct: before any inventory technology, the first step is defining governance authority. Technology without an owner defaults to misconfiguration over time.
SANS 2024 found more than 70% of organizations had conducted OT security assessments. Findings went unacted on β not because they were wrong, but because no one had authority to act. In approximately 60% of adversarial simulations, Sygnia found that OT access came via legitimate pathways: credential reuse, non-rotated passwords, oversized administrative groups. Not sophisticated attacks. Accountability failures.
What the CFC Mapping Process Actually Delivers
The CFC accountability mapping engagement starts with stakeholder interviews across IT, OT, operations, engineering and vendor management β mapping actual ownership, not org chart ownership, against every security-relevant function.
The vCISO leads the accountability mapping from the governance side, establishing ownership frameworks and making structural decisions about who is accountable for what. The CFC operationalizes from that foundation: defined roles, documented handoffs and the ongoing ownership model that keeps accountability current.
IEC 62443-2-1 provides the role architecture: an OT Security Lead, Site OT Security Representatives and a vendor oversight function. NIST SP 800-82 specifies the minimum cross-functional team: IT staff, control engineer, control system operator, network security expert and management representation. The ICS4ICS framework defines the Incident Commander β a designated person with authority to declare an incident and the financial authority to act.
For each OT zone, the map documents trigger conditions for isolation, named authorizing persons and reconnection procedures. The CFC maintains it as a living record, updated after any significant change and validated at minimum annually.
The Measurable Impact of Formal Accountability
The impact is measurable. SANS 2025 data shows regulated sites β where accountability structures are mandated β suffer approximately 50% fewer financial and safety impacts than unregulated peers despite similar incident rates. Same attack surface. Half the damage.
SANS 2024 adds the budget dimension: organizations with formal CISO ownership of ICS security are 10 percentage points more likely to have a shared IT-OT security budget, and 82% map their programs to established frameworks versus only 42% without that ownership. Accountability alone, before any tool is deployed, nearly doubles standards alignment.
The Map Is the Foundation
Colonial Pipeline, Norsk Hydro and JBS share a common thread: attackers never touched OT systems in any of them. The operational shutdown in each case was triggered by the inability to answer one question: is our OT safe to keep running? Norsk Hydro had defined leadership accountability and made three swift decisions in minutes. Colonial had none and stumbled for days. The difference wasn't the attack. It was the map.
Building the map is the CFC's first operational work. Testing whether it holds is the Red Team's. Structured tabletop exercises apply realistic pressure to simulated IT-OT incidents, surfacing exactly where the ownership structure breaks down in practice. The CFC map is what those exercises are designed to validate.
With ownership mapped, the CFC has the organizational foundation it needs. The next question is: what does the security program built on that foundation actually look like? The honest answer, revealed through a structured maturity assessment, is almost always different from what internal teams expect.
Ready to Map Accountability Across Your OT Environment?
β οΈ 95% Claim C-Suite OT Ownership. Only 49% Have Reached Maturity Level 3. The Map Closes That Gap.
Only 13% of OT attacks directly touched OT systems in 2024. Nearly 90% of physical impacts came through the IT boundary. The gap between your IT team and your OT team is exactly where the attack path runs β and mapping accountability is how you close it before the incident clock starts.
Five Ownership Gaps the CFC Finds in Nearly Every Environment
Click each card to see what the gap costs and who should own it
Remote Access β Weakest Link, No Owner
46% of manufacturers call it their biggest vulnerability
Shared logins. Default credentials. No per-user traceability. When 46% of manufacturers identify remote access as their weakest security link, the root cause is almost always the same: nobody owns it. No approved tool list. No documented process for who approves access. No way to answer "who made that change?"
Vendor Access β 42% Breach Rate, Still Unowned
A vendor added full OT access with no alerts, no approvals
ProArch documented the pattern: a vendor added a remote access rule granting full network-to-OT access with no alerts, no approvals and no oversight. Nobody caught it because nobody owned vendor access governance. In 2025, 42% of manufacturers reported a vendor-access breach. The gap isn't a technology failure β it's an ownership failure.
OT Incident Response β 44% Improvise
Who makes the call to isolate a production system?
Only 56% of organizations have an ICS/OT-specific IR plan (SANS 2024). IT-centric tactics β aggressive containment, automated shutdowns β can halt production or create unsafe physical conditions in OT environments. Without a named owner who understands both domains, the most consequential decision of an incident gets made by whoever happens to be in the room.
Legacy Risk β The 20-Year Organizational Vacuum
Everyone knows it's a risk. Nobody owns the decision.
OT devices run 15 to 20+ years. Everyone knows the aging system is a risk. Nobody will touch it while it's still working. That's not negligence β it's a structural vacancy. No one has been given the authority to weigh production risk against security risk and make a binding decision. The risk stays open indefinitely by default.
Change Windows β Nobody Breaks the Tie
IT patches fast. OT resists downtime. Undocumented risk accumulates.
IT prioritizes rapid patching. OT operations prioritize uptime. Without a defined owner to break ties, changes either stall indefinitely or happen unsecured while someone informally accepts undocumented risk. The maintenance window becomes the accountability gap β exactly the attack surface our Shadow Current series traces in detail.
π οΈ Why Deploying a Tool Doesn't Close an Accountability Gap
NIST CSF 2.0, 70% of assessments that went unacted, and Sygnia's 60% legitimate access finding
NIST CSF 2.0 Put Govern First: NIST's Cybersecurity Framework 2.0 made "Govern" its first function β before Identify, Protect, Detect, Respond and Recover. Governance defines roles, risk appetite and policy. Without it, technical investments drift, duplicate or conflict. CISA's OT Asset Inventory Guidance is explicit: the first step before any inventory technology is defining governance authority. Technology without an owner defaults to misconfiguration over time.
Assessments Without Owners: SANS 2024 found more than 70% of organizations had conducted OT security assessments. The findings went unacted on β not because they were technically wrong, but because no one had the organizational authority to act on them. The gap between "knowing the risk" and "closing the risk" is always a governance gap.
Sygnia's 60% Finding: In approximately 60% of adversarial simulations across industries, Sygnia found OT access came through legitimate pathways: credential reuse, non-rotated passwords, oversized administrative groups. These aren't sophisticated exploits requiring advanced tools to detect. They're accountability failures that persist because no single owner manages the identity surface end-to-end across IT and OT.
πΊοΈ The CFC Mapping Framework β IEC 62443, NIST 800-82, ICS4ICS
How the accountability map gets built and who it names for each OT zone
The Role Architecture (IEC 62443-2-1): The international standard for OT security management defines the structural framework: an OT Security Lead with cross-domain authority, Site OT Security Representatives for each facility, and a vendor oversight function. These aren't job titles β they're accountability assignments that the map makes explicit and actionable.
The Cross-Functional Team (NIST SP 800-82): The U.S. government's primary OT security guide specifies the minimum team composition: IT staff, control engineer, control system operator, network security expert and management representation. Every stakeholder type that touches a security-relevant decision needs a named representative in the accountability structure.
The Incident Commander (ICS4ICS): The ICS4ICS framework adds the most critical role: a designated Incident Commander with the authority to declare an incident and the financial authority to act on that declaration. This is the person who can answer Colonial's fatal question. The CFC maps this role before an incident β not after.
Zone-Level Documentation: For each OT zone, the map documents trigger conditions for isolation, named authorizing persons, alternative operating procedures and reconnection criteria. It's maintained as a living record β updated after significant changes, validated annually, and used as the baseline for tabletop exercises that test whether ownership holds under pressure.
β‘ Colonial vs. Norsk Hydro β The Map Made the Difference
Same question. Minutes vs. days. The only variable was whether accountability was documented.
The Shared Question: Colonial Pipeline, Norsk Hydro and JBS all share a critical detail: attackers never directly compromised OT systems in any of these incidents. The operational shutdowns in each case were triggered by the inability to answer a single question fast enough: "Is our OT safe to keep running?" How each organization answered that question β or failed to β determined the outcome.
Norsk Hydro β Minutes: When LockerGoga ransomware hit Norsk Hydro in 2019, the company had defined leadership accountability and pre-established decision protocols. Three critical decisions were made in minutes: switch to manual operations, maintain production continuity where possible, disclose transparently. The clarity of ownership enabled speed. The incident caused significant disruption but was contained without safety failures.
Colonial β Days: Colonial Pipeline had no equivalent accountability structure. When DarkSide hit their IT billing systems β never touching OT β Colonial spent days unable to answer the OT safety question. The result was a precautionary shutdown of 5,500 miles of pipeline, fuel shortages across the East Coast, and a $4.4 million ransom payment. The attack didn't shut down the pipeline. The accountability gap did.
The Lesson: The difference between minutes and days, between contained and catastrophic, was not technical. It was the presence or absence of a map that documented who had the authority to make the call before the incident started. Building that map is the CFC's first work. Testing whether it holds under pressure is the Red Team's.
The Accountability Map Your Environment Needs
The Gap Is Structural, Not Technical
95% of organizations claim C-suite OT ownership. Only 49% have reached meaningful maturity. Only 13% of OT attacks directly touch OT systems β 87% arrive through the IT boundary. The IT-OT seam is an organizational gap, not a firewall gap, and it won't close without an accountability map that names who owns each decision.
Five Gaps Appear in Nearly Every Environment
Remote access, vendor access, OT incident response authority, legacy system risk and change window coordination β five ownership vacancies that appear consistently across industrial environments. They persist not because of negligence, but because nobody was ever formally assigned the answer. The CFC maps the owner for each before an incident makes the vacancy catastrophic.
Accountability Doubles Standards Alignment
Formal CISO ownership of ICS security produces 82% standards alignment. Without it: 42%. Regulated sites with mandated accountability structures suffer 50% fewer financial and safety impacts despite similar incident rates. The accountability map is the highest-ROI first investment in OT security β and it produces measurable outcomes before a single tool is deployed.
