Third-Party Vendor Access: The Shadow Current to Your OT
Remote vendor access isn't a controlled stream—it's a shadow current with unlimited flow.
Remote vendor access isn't a controlled stream—it's a shadow current with unlimited flow.
The Scale of the Problem
According to research from the Ponemon Institute, 73% of organizations permit third-party access to operational technology environments, with an average of 77 third parties granted such access per organization. And if you're among the 25% of organizations with especially complex operations? You're likely managing the flow from more than 100 third parties.
Each vendor connection creates a shadow current channel that bypasses every perimeter defense you've built. These aren't theoretical attack paths. They're active streams, maintained and monitored by someone outside your organization, flowing directly to your most critical systems.
The Vendor Access You Can't Refuse
Third-party access isn't a security convenience you can simply shut off. For most industrial enterprises, remote vendor access has become what one industry survey describes as "a universal and fundamental requirement"—so essential that operations can't function without these flows. Equipment manufacturers monitor system health remotely. Managed service providers handle IT infrastructure. Contractors perform maintenance. Service providers support specialized applications.
The access is extensive because the need is real. Over 60% of manufacturers rely on remote access specifically for equipment maintenance, according to multiple industry studies. And it's not just occasional support calls. The Ponemon research reveals that 43% of organizations allow both on-site and remote access for third parties, while another 30% permit on-site access only. Remote access—continuous streams from outside your perimeter—is now the majority use case.
The problem isn't that vendor access exists. It's that these shadow current channels operate largely outside your visibility and control, flowing constantly through your infrastructure.
When Your Defenses Become Someone Else's Problem
The supply chain has emerged as one of the most effective attack vectors in cybersecurity. According to Verizon's 2025 Data Breach Investigations Report, 30% of breaches now involve a third party—representing a 100% increase from the 15% previously reported. IBM's Cost of a Data Breach Report 2025 identifies supply chain compromise as the second most prevalent attack vector after phishing, accounting for 15% of all breaches.
The flow is accelerating. Cyble threat intelligence shows supply chain attacks doubled in 2025, averaging 26 attacks per month compared to 13 per month from early 2024 through March 2025. And SecurityScorecard data reveals that 75% of recorded third-party breaches occurred through entities in the victim's software and technology supply chain.
Attackers have learned a fundamental truth: it's easier to compromise your vendor and ride their access stream directly into your environment than to fight your defenses.
The Shadow Currents Hidden in Plain Sight
Third-party access chains vulnerabilities across organizational boundaries. And those credential shadow currents that often flow through shared or vendor-managed credentials expand the attack surface beyond what your security team can directly control.
Legacy systems create an especially dangerous combination with vendor access. Those 30-year-old systems that can't be easily secured or monitored often require ongoing vendor support, creating permanent third-party shadow current channels to your least defensible infrastructure.
The visibility gap is staggering. According to Ponemon Institute research, 73% of organizations lack an authoritative OT asset inventory. If you can't track what systems you have, you certainly can't see what vendors are accessing them or monitor the flow through these channels. The same research reveals that 35% of organizations give vendors too much privileged access—but even that understates the problem, since it only counts organizations aware enough to recognize the issue.
Most concerning: only 44% of organizations report being concerned or highly concerned about the risks of third-party access to OT. There's a massive disconnect between the actual risk (30% of breaches involve third parties) and the perceived concern (44% worried about it).
When One Vendor's Breach Becomes Everyone's Problem
SolarWinds demonstrated the catastrophic potential of supply chain attacks. When attackers compromised SolarWinds' Orion platform, they gained access to 18,000 customer organizations. Research on the incident revealed that 32% of the victims were industrial organizations, and affected companies experienced an average 11% drop in revenue during the breach period.
The Kaseya ransomware attack showed how quickly supply chain compromise cascades downstream. Attackers compromised approximately 50 to 60 managed service providers, which in turn affected between 800 and 1,500 downstream businesses. Swedish grocery chain Coop had to close approximately 800 stores for a week when their MSP was hit. The ransom demand reached $70 million.
These weren't sophisticated zero-day attacks requiring months of development. They were straightforward compromises of trusted third parties who already had legitimate access streams flowing directly to critical systems.
Managing What You Can't Eliminate
Third-party shadow currents present a unique challenge. They originate outside your control but flow directly to your critical systems. Operations genuinely depend on vendor access, which means you can't simply dam these channels.
But you can manage their flow. CISA recommends MSP customers manage supply chain risks by understanding network security expectations, coordinating risk management across security, legal and procurement groups, and using risk assessments to prioritize cyber investment. The key is treating vendor access as what it actually is: a critical attack surface that requires active management.
Best practices include role-based access control to ensure vendors have strictly defined rights, time-restricted access permissions that limit the flow to specific windows, and mandatory multi-factor authentication for any third-party connection. Network segmentation becomes especially powerful when you can separate vendor access points from core operational systems—creating controlled channels rather than unrestricted streams.
Monitoring is essential. If you're managing the flow from 77 different third parties on average, you need continuous visibility into what those vendors are actually doing once connected. SIEM systems for real-time monitoring, granular logging for forensic analysis, and proactive session monitoring create the transparency that most organizations currently lack.
The Shadow Current You Must Chart
Third-party access will appear in almost every shadow current map—because it's fundamental to operations and inherently risky. Pen tests rarely include third-party access paths in their scope, which is why they miss major shadow current channels. And when we discuss organizational silos, you'll see how third-party shadow currents flow right through org chart boundaries, connecting vendor management, procurement, security and operations in ways your structure doesn't reflect.
Third-party shadow currents are unique: they originate outside your control but flow directly to your critical systems. You can't eliminate vendor access—operations depend on it—but you can map these channels, monitor their flow, and control what passes through them.
Your Vendors Have Access to Your Most Critical Systems. Do You Know What They're Doing?
⚠️ 73% of Organizations Grant Vendor Access to OT—But Only 44% Are Concerned About the Risk
Third-party vendor connections bypass every perimeter defense you've built. They're not theoretical attack paths—they're active streams maintained by someone outside your organization, flowing directly to your most critical systems.
Five Vendor Access Types Creating Shadow Currents
Click each card to reveal the risk profile
Equipment Manufacturers
Remote health monitoring and diagnostics
Manufacturers monitor your PLCs, sensors and controllers remotely—often with persistent, always-on connections. If their systems are compromised, attackers inherit direct access to your most sensitive OT assets with no perimeter to cross.
Managed Service Providers
IT infrastructure management and support
MSPs often hold privileged administrative credentials across your entire environment. A single compromised MSP can expose hundreds of downstream clients—as Kaseya demonstrated when 50-60 MSPs carried ransomware to 800-1,500 businesses in hours.
Maintenance Contractors
Physical and remote system maintenance
Contractors often receive the broadest access—both physical and remote—to perform maintenance. Their credentials are frequently shared, rarely rotated, and almost never monitored in real time. They're the widest shadow current channel you have.
Application Vendors
Specialized software support and updates
Software vendors require ongoing access for updates, patches and support. These connections are often forgotten after initial setup but remain open. When SolarWinds was compromised, 18,000 customer organizations didn't realize their trusted update channel had become an attack stream.
Technology Supply Chain
The invisible dependency layer
Your direct vendors have their own vendors. That hidden layer—the fourth, fifth and sixth-party supply chain—carries 75% of all recorded third-party breaches. You can control your direct vendor relationships; you have almost no visibility into who your vendors trust.
☀️ SolarWinds: When a Software Update Became an Attack Channel
18,000 organizations. 32% industrial. The trusted access stream that no one monitored.
Attackers compromised SolarWinds' Orion platform and embedded malicious code into a routine software update. Because organizations trusted the update channel, the malware was installed automatically across 18,000 customer organizations—no phishing, no brute-force attacks required.
Industrial Impact: 32% of victims were industrial organizations. Affected companies experienced an average 11% drop in revenue during the breach period. The attack persisted undetected for months because the access stream looked identical to legitimate vendor activity.
The Shadow Current Lesson: The most dangerous vendor access isn't the connection you're watching—it's the one you've trusted so completely you stopped watching it. Software updates and patch channels are shadow currents disguised as security measures.
🔑 Kaseya: One Breach, 1,500 Victims, $70M Ransom
How a single MSP compromise cascaded to close 800 grocery stores in a week
REvil ransomware operators exploited a zero-day in Kaseya's VSA platform—a remote monitoring tool used by managed service providers. Within hours, the attack cascaded from Kaseya to approximately 50-60 MSPs, and from those MSPs to between 800 and 1,500 downstream businesses.
Coop Grocery Chain: Swedish retailer Coop had to close approximately 800 stores for a week. Their payment processing systems ran through an MSP that used Kaseya. Coop had no direct relationship with Kaseya—they were three relationships removed from the initial compromise.
The Ransom Demand: REvil initially demanded $70 million for a universal decryption key. Individual ransoms were set at $45,000 per MSP and $5 million per MSP—a price deliberately calibrated to the downstream chaos the attack created.
The Shadow Current Lesson: Your third-party shadow currents don't end at your direct vendors. Every vendor your vendors trust creates another channel into your environment. The Kaseya attack traveled through three layers of trust before hitting Coop—and none of those organizations saw it coming.
🛡️ Managing the Flow: How to Control What You Can't Eliminate
Vendor access isn't optional—but uncontrolled vendor access is a choice
Role-Based Access Control: Vendors should have strictly defined rights tied to specific tasks and systems. A maintenance contractor working on one production line has no business accessing another. Define the channel; don't leave it open-ended.
Time-Restricted Access: Limit vendor access to specific windows tied to scheduled work. A vendor who needs access on Tuesday afternoon for a maintenance window shouldn't have an always-on connection running 24/7. Time-boxing access dramatically reduces the attack surface.
Mandatory MFA: Every third-party connection requires multi-factor authentication. Shared credentials and password-only access are among the most common entry points in vendor-related breaches. MFA doesn't eliminate the risk, but it significantly raises the cost of exploitation.
Network Segmentation: Separate vendor access points from core operational systems. Create controlled channels rather than giving vendors access to the full flow. When a vendor connection is compromised, segmentation limits how far the current can spread.
Continuous Monitoring: With an average of 77 third parties per organization, you need real-time visibility into what vendors are actually doing once connected. SIEM integration, granular session logging and proactive monitoring create the transparency that most organizations currently lack. You can't control a flow you can't see.
Charting the Third-Party Shadow Current
Map Every Channel
Third-party access will appear in almost every shadow current map. Start by inventorying all vendor connections—who has access, to what systems, under what conditions. You can't control a flow you haven't charted.
Control the Flow
RBAC, time-restricted access and mandatory MFA transform unrestricted vendor streams into controlled channels. Operations depend on vendor access—but uncontrolled vendor access is a choice, not a requirement.
Monitor Continuously
Real-time session monitoring, granular logging and SIEM integration create the visibility that most organizations currently lack. If a vendor's credentials are compromised, continuous monitoring is how you detect it before the breach becomes a disaster.
