OT Security in Manufacturing: Protecting Smart Factories
Group COO & CISO
Operational excellence, governance, and information security. Aligns technology, risk, and business outcomes in complex IT environments

Manufacturing is one of the most frequently attacked sectors in OT security, accounting for a disproportionate share of ransomware incidents targeting industrial environments. Sixty percent of organizations reported OT security incidents in 2025 (Dragos, 2025), with manufacturers among the hardest hit. The shift to smart factories, Industry 4.0 connectivity, and cloud-integrated production systems has expanded the attack surface far beyond what traditional IT security can address.
Key TakeawaysOT security services overview
- Manufacturing faces the highest volume of OT ransomware attacks across all industrial sectors.
- Industry 4.0 connectivity between PLCs, MES, and ERP creates new IT-OT attack paths.
- PLC and HMI security are foundational - compromised control devices can cause physical harm.
- Supply chain security is critical: compromised automation vendors have downstream impact on all customers.
- 88% of manufacturers increased OT security spending by over 10% in 2025 (Dragos).
Why Is Manufacturing the Most Targeted OT Sector?
Manufacturing is the top target for OT ransomware groups because the combination of operational downtime sensitivity and historically low security maturity creates ideal conditions for extortion. A production line generating $500,000 of output per hour cannot afford days or weeks of downtime while recovering from a ransomware attack. Attackers understand this, and they price their demands to reflect the cost of downtime. Dragos reported that ransomware attacks on OT environments are growing 40% annually, with manufacturing representing the largest single sector share.
Manufacturing organizations also present broad attack surfaces through their supply chains. A tier-1 automotive supplier may have electronic interfaces with dozens of OEMs and hundreds of tier-2 suppliers. Each of these interfaces is a potential attack path. Attackers who cannot compromise a large manufacturer directly often target smaller suppliers with weaker security programs, then use established supplier connections to reach their ultimate target.
Industry 4.0 initiatives have further expanded the attack surface. Real-time production data flowing to cloud analytics platforms, remote maintenance connections for smart machine tools, and sensor-to-cloud IoT deployments all create network paths that did not exist in traditional manufacturing environments. Each new connectivity point requires deliberate security design, but many Industry 4.0 deployments have prioritized connectivity speed over security architecture.
[IMAGE: Photo of modern smart factory floor with robotic assembly and connected screens - search terms: smart factory Industry 4.0 robotic assembly floor automation]What Are the Most Critical OT Assets in Manufacturing?
Programmable logic controllers (PLCs) are the workhorses of manufacturing automation. They execute the control logic that drives production processes: sequencing robotic movements, managing conveyor systems, controlling welding parameters, and monitoring quality measurements. A compromised PLC can produce defective products, damage machinery, or create hazardous conditions for workers. PLC security is therefore not just a cybersecurity concern; it is a product quality and worker safety concern.
Human-machine interfaces (HMIs) provide operators with visibility and control over production processes. They run on Windows operating systems that require regular patching, but they are often connected to PLCs in ways that make patching operationally complex. HMIs are frequently targeted because they provide a pathway from the Windows environment an attacker knows how to exploit into the PLC environment they want to affect. Securing HMIs requires both Windows hardening and strict control over their network connections to field devices.
Manufacturing execution systems (MES) sit at the interface between the OT world and enterprise IT. They collect production data, manage work orders, track materials, and report quality metrics. They communicate with both ERP systems above and control systems below. This dual connectivity makes the MES a critical node in IT-OT attack chains: a compromised MES can be used to move laterally into either the OT network or the enterprise IT network, depending on the attacker's objective.
[CHART: Manufacturing OT attack surface diagram showing PLC, HMI, MES, historian, and ERP connections with attack vector annotations - source: Dragos Manufacturing Sector Report 2025]Need expert help with ot security in manufacturing: protecting smart factories?
Our cloud architects can help you with ot security in manufacturing: protecting smart factories — from strategy to implementation. Book a free 30-minute advisory call with no obligation.
How Does Industry 4.0 Change the OT Security Challenge?
Industry 4.0 introduces four types of connectivity that fundamentally change the OT security challenge. First, machine-to-cloud connectivity: smart machine tools, robots, and sensors send operational data directly to cloud analytics platforms. This creates outbound OT-to-cloud paths that may inadvertently enable inbound attack paths if not properly controlled. Second, machine-to-machine connectivity: OPC-UA and other modern protocols enable direct device-to-device communication across previously separate cells and lines, creating new lateral movement paths within OT networks.
Third, IT-OT integration for real-time production optimization: ERP systems receive live production data and push production schedules directly to MES and control systems. This tighter integration reduces the manual handoffs that previously provided natural air-gap pauses, but also tightens the connection between IT-based attacks and OT systems. Fourth, remote service and predictive maintenance: machine vendors remotely monitor equipment performance and perform predictive maintenance interventions. Each remote connection is a potential attack entry point that must be governed with the same rigor as any other remote access path.
Security architecture for Industry 4.0 environments must address all four connectivity types simultaneously. The security design must be embedded in the Industry 4.0 architecture from the beginning, not retrofitted afterward. Organizations that have already deployed Industry 4.0 connectivity without security architecture often find they need significant remediation work, including adding DMZ infrastructure, implementing remote access controls, and deploying OT monitoring on newly connected network segments.
IT vs OT security differences and convergenceHow Do You Protect PLCs and Field Devices?
PLC protection starts with hardening the device configuration. Default credentials must be replaced, unused communication ports and services disabled, and logic upload/download permissions restricted to authorized engineering workstations only. Many PLCs allow unauthenticated firmware updates and logic uploads from any device that can reach them on the network. Without explicit configuration hardening, network access is sufficient for an attacker to modify PLC logic.
Network-level protection compensates for PLCs that cannot be individually hardened because of legacy constraints. Protocol-aware firewalls can block Modbus, Profibus, or EtherNet/IP commands that the PLC should not receive from the source addresses attempting to send them. A historian server should be able to read process values from a PLC; it should not be able to write configuration parameters. Protocol filtering at the firewall enforces this distinction without touching the PLC configuration.
PLC change monitoring is increasingly important as PLC logic modification becomes a documented attack technique. Tools that monitor PLC configuration and detect unauthorized changes provide an early warning layer for the most dangerous type of OT attack: silent modification of control logic that causes production processes to behave incorrectly. Tripwire and similar integrity monitoring capabilities for PLCs are available from several OT security vendors and should be considered for safety-critical or high-value production equipment.
[IMAGE: Close-up photo of industrial PLC rack with wiring and programming interface - search terms: industrial PLC rack programmable logic controller wiring]What Are the Key Supply Chain Security Risks for Manufacturers?
Manufacturing supply chains are among the most complex in any industry. A single automotive manufacturer may work with tens of thousands of suppliers, many of whom have electronic interfaces for order management, quality data exchange, and logistics coordination. Each interface is a potential attack path. Attackers who compromise a well-connected tier-2 supplier can use that connection to reach tier-1 suppliers and ultimately the OEM itself, potentially gaining access to production planning data, quality systems, or OT environments.
Automation vendors represent a particularly high-value supply chain target. If an attacker compromises the software update mechanism of a major PLC or DCS vendor, they can potentially push malicious firmware to thousands of customer sites simultaneously. This is why verifying the integrity of all software and firmware received from vendors, checking hashes against vendor-published values, is a critical supply chain security control for manufacturing OT environments.
Integrator access management is another supply chain security gap. Automation integrators typically need temporary, privileged access to OT systems during commissioning and maintenance activities. Too often, this access is provided through standing VPN credentials that are never revoked. When the integrator's organization is compromised, these credentials become attack paths into every customer site where they were provided and never revoked. Time-limited, asset-specific, and session-recorded integrator access is the correct approach, but it requires more operational discipline to manage than standing credentials.
How Do You Build OT Security Into Smart Factory Projects?
Security must be designed into smart factory projects from the requirements phase, not added after deployment. This means including OT security requirements in system specifications, selecting automation vendors with documented IEC 62443 compliance programs, designing network architecture with zones and conduits before selecting connectivity technologies, and including security validation in the factory acceptance test (FAT) and site acceptance test (SAT) process.
The FAT and SAT represent the best opportunity to identify and correct security gaps before production begins. Security testing at these stages, including configuration review, network architecture verification, and vulnerability assessment of new components, is far less disruptive than security remediation on running production systems. Yet many organizations conduct FAT and SAT processes with no security component, discovering gaps only after production has started.
Operational security processes must accompany technical controls. Procedures for approving and tracking changes to PLC logic, HMI configurations, and network architecture are as important as the technical controls that enforce them. A well-designed control system with no change management process will drift from its secure baseline over time, as unauthorized changes accumulate without documentation or review. Change management is a technical control, not a bureaucratic one.
OT security best practices and 12 essential controlsWhat Regulations Apply to Manufacturing OT Security?
Manufacturing organizations face an evolving regulatory landscape that is increasingly addressing OT security explicitly. The EU's NIS2 Directive, effective from October 2024, applies to medium and large manufacturers in sectors classified as important entities. It requires risk management measures, incident reporting, and supply chain security controls that directly apply to OT environments. Non-compliance carries fines of up to 2% of global annual turnover, making NIS2 a significant business risk for European manufacturers.
The US Cybersecurity and Infrastructure Security Agency (CISA) has issued multiple advisories specific to manufacturing OT security, including guidance on PLC hardening, remote access security, and ransomware response. While most CISA guidance is advisory rather than mandatory for private manufacturers, it reflects evolving regulatory expectations and is increasingly referenced in cyber insurance underwriting and government contracting requirements.
Product security regulations are expanding to include connected manufacturing equipment. The EU Cyber Resilience Act (CRA), coming into force progressively through 2026 and 2027, requires manufacturers of connected products to implement security across the product lifecycle, including updates and vulnerability disclosure. This affects both manufacturers who use connected equipment and manufacturers who produce connected industrial products. For manufacturing organizations building comprehensive OT security programs, Opsio's OT security services cover regulatory alignment, technical implementation, and continuous monitoring.
Frequently Asked Questions
What is the most common type of OT attack in manufacturing?
Ransomware is the most common and disruptive attack type in manufacturing OT environments, growing 40% annually (Dragos, 2025). The typical attack chain begins with phishing or exploitation of internet-facing IT systems, followed by lateral movement into OT networks through IT-OT connections, and culminating in ransomware deployment that halts production. Secondary attack types include espionage targeting intellectual property and production data, and supply chain attacks targeting automation vendors to reach multiple manufacturer customers simultaneously.
Should we segment OT networks by production cell?
Yes. Cell-level segmentation within OT networks limits lateral movement once an attacker is inside the OT boundary. A compromised cell should not be able to affect other cells without crossing a security boundary. The implementation complexity of cell-level segmentation must be balanced against operational requirements: cells that need to communicate with each other for production coordination need explicit conduits with appropriate controls. Full micro-segmentation is a mature-state goal; perimeter segmentation between IT and OT is the essential first step.
How do we handle security for robots and collaborative robots (cobots)?
Industrial robots and cobots connect to OT networks via Ethernet, often running Windows-based controller software. They should be treated like other OT endpoints: placed in appropriate network zones, monitored by OT network monitoring tools, and hardened to the extent the vendor supports. Cobot safety functions are safety-critical systems that must be protected from unauthorized modification. Remote management interfaces provided by robot vendors must be secured through the same vendor access management controls applied to other OT vendor remote access.
What backup strategy is appropriate for manufacturing OT?
Manufacturing OT backups must cover PLC logic, HMI configurations, MES databases, historian data, and network device configurations. All backup copies should be stored in locations that ransomware cannot reach: offline media, air-gapped systems, or immutable cloud storage with separate credentials. Recovery time objectives must be established by production leadership, and recovery procedures must be tested at least annually. Ransomware groups specifically target and destroy backup systems before deploying their payload; assuming online backups are safe is a dangerous assumption.
Conclusion
Smart factory connectivity has made manufacturing OT security simultaneously more important and more challenging. Industry 4.0 benefits, including real-time optimization, predictive maintenance, and supply chain integration, are real. But they come with expanded attack surfaces that require deliberate, architected security programs to manage safely.
The 60% incident rate in 2025 and 40% annual growth in OT ransomware confirm that the threat is not theoretical. Manufacturing organizations that invest in OT security now, embedding it in smart factory projects, supply chain management, and operational processes, build resilience that protects both production continuity and worker safety.
Author: Opsio Security Practice | Published: April 2026 | Last updated: April 2026
Related Articles
About the Author

Group COO & CISO at Opsio
Operational excellence, governance, and information security. Aligns technology, risk, and business outcomes in complex IT environments
Editorial standards: This article was written by a certified practitioner and peer-reviewed by our engineering team. We update content quarterly to ensure technical accuracy. Opsio maintains editorial independence — we recommend solutions based on technical merit, not commercial relationships.