Cloud-Connected OT in India: Securing Remote Access and Operational Analytics
Country Manager, Sweden
AI, DevOps, Security, and Cloud Solutioning. 12+ years leading enterprise cloud transformation across Scandinavia

Cloud connectivity is reshaping Indian industrial operations - and the security implications of connecting OT systems to cloud platforms are not adequately addressed in most Indian industrial deployments. ONGC's remote monitoring of offshore platforms, NTPC's centralised performance management of distributed generation assets, and thousands of PLI-funded manufacturers using cloud-based analytics for predictive maintenance and quality control all share one security characteristic: they have created direct connections between industrial control systems and cloud environments that carry data - and potentially commands - across previously isolated boundaries. India's cloud OT market is growing at 22% annually, faster than any other OT security sub-segment, reflecting both the business value of cloud-connected industrial operations and the growing security investment these connections require. (IDC, 2025)
The business case for cloud-connected OT is compelling. Remote monitoring enables ONGC to manage offshore operations from onshore control centres. Cloud analytics enable Indian automotive manufacturers to achieve predictive maintenance that reduces unplanned downtime by 15-20%. Digital twins of manufacturing processes allow PLI-funded factories to optimise production without physical testing. These are genuine efficiency gains that justify the connectivity investment. The security requirement is to enable these gains without creating the attack paths that the same connectivity introduces if left unmanaged.
Zero Trust for OT in IndiaKey Takeaways
- India's cloud OT market grows at 22% annually; security requirements must keep pace with connectivity deployment (IDC, 2025).
- Cloud-connected OT creates three new security perimeters: OT-to-cloud data, cloud access management, and remote access via cloud.
- NCIIPC guidelines require formal approval, authentication, and monitoring for cloud connections from OT systems.
- Data sovereignty under DPDPA and operational data protection under NCIIPC create specific Indian requirements for cloud OT architecture.
- Secure remote access architecture replaces VPN with Zero Trust access controls for cloud-mediated OT access.
What Are the Security Risks of Cloud-Connected OT in India?
Cloud connectivity creates three new security perimeters that traditional on-premises OT security does not address. The OT-to-cloud data path is the first: data flowing from OT sensors, historians, and SCADA systems to cloud analytics platforms must be authenticated, encrypted, and validated to prevent interception and injection. An attacker who can inject false sensor data into the cloud analytics pipeline can manipulate the predictive maintenance recommendations or digital twin behaviour that Indian operators rely on. The cloud platform itself is the second perimeter: cloud accounts with access to OT data or OT management interfaces must be protected with strong authentication, role-based access, and comprehensive audit logging. Compromised cloud credentials provide access to operational data and potentially to OT management functions without requiring physical access to the plant. The cloud-to-OT command path is the third and most critical perimeter: any cloud functionality that can issue commands to OT systems - remote configuration, remote setpoint adjustment, firmware updates - represents a path for cloud-side compromise to translate into OT-side impact. (NCIIPC, 2025)
The Oldsmar water treatment incident (2021) demonstrated cloud-mediated OT access risk: the attacker used TeamViewer remote access software to reach the SCADA system and attempt to increase chemical dosing. While TeamViewer is not a cloud OT platform, the incident illustrates how cloud-accessible OT management creates paths for remote attack on industrial processes. Indian water utilities, power distribution companies, and industrial plants with cloud-accessible OT management face analogous risks.
[CHART: Cloud-connected OT architecture - OT to cloud data path, cloud access, remote management - Source: Opsio]How Should Indian Organisations Design Secure Cloud OT Architecture?
Secure cloud OT architecture for Indian industrial organisations requires a layered design that enforces separation between data aggregation (acceptable for cloud) and operational control (must remain in the OT environment). The fundamental principle is that data can flow from OT to cloud, but commands should not flow from cloud to OT except through strictly controlled, authenticated interfaces with operational safety limits enforced at the OT level. An IoT edge gateway or OT data bridge is the recommended architectural element for achieving this separation: it collects data from OT systems, validates and aggregates it, and forwards it to cloud platforms over authenticated, encrypted connections. Commands from cloud platforms reach the OT environment only through this gateway, which applies safety limits and access controls before forwarding to OT devices.
The architecture must also address the cloud platform itself. Cloud accounts with access to OT data or management interfaces should have: multi-factor authentication (required by CERT-In for critical system access), role-based access with minimum necessary privileges, comprehensive audit logging of all access and actions, automated alerts on anomalous access patterns, and regular access review to remove unnecessary permissions. Cloud platforms hosting OT data should have data residency configurations that meet Indian data sovereignty requirements - NCIIPC may specify data localisation requirements for OT data from designated CII operators.
Need expert help with cloud-connected ot in india?
Our cloud architects can help you with cloud-connected ot in india — from strategy to implementation. Book a free 30-minute advisory call with no obligation.
What Are the NCIIPC Requirements for Cloud-Connected OT?
NCIIPC's critical infrastructure protection guidelines specifically address cloud connectivity from OT systems in designated critical sectors. Requirements include: formal approval process for any cloud connection from OT systems, including security risk assessment before connection establishment; authentication requirements for OT-to-cloud data flows (mutual TLS or equivalent); monitoring of all cloud connections from OT networks for anomalous behaviour; data handling agreements with cloud service providers that meet NCIIPC data protection requirements; and incident notification procedures if the cloud service provider experiences a security event affecting Indian critical infrastructure data. Indian critical infrastructure operators using cloud platforms from international providers (AWS, Azure, Google Cloud) must ensure their agreements with these providers satisfy NCIIPC requirements, including appropriate incident notification timelines. (NCIIPC, 2025)
CERT-In's log retention requirements apply to cloud-connected OT environments. Logs from the OT-to-cloud interface, the cloud access management system, and any cloud-mediated remote access sessions must be retained for 180 days and be accessible for CERT-In investigation purposes. Cloud service providers typically offer log retention that meets this requirement in their managed logging services, but the retention must be explicitly configured - default cloud log retention periods are often shorter than 180 days and may not cover all relevant log categories.
Data Sovereignty and the DPDPA Dimension
Cloud-connected OT in India must navigate two overlapping data governance frameworks. NCIIPC's operational data protection requirements apply to OT data from critical infrastructure - this data may have data residency requirements limiting its storage to Indian cloud infrastructure. DPDPA 2023's personal data protection requirements apply where cloud-connected OT systems process personal data: smart meter data, connected vehicle telematics, industrial wearable data, and healthcare IoT data. For critical sector organisations using international cloud providers, contractual data processing agreements must satisfy both NCIIPC operational requirements and DPDPA personal data obligations. Indian cloud providers (NIC Cloud, Meghraj, Jio Cloud, Tata Communications Cloud) may simplify some data sovereignty requirements by hosting data within Indian jurisdiction by default. ([DPDPA](https://meity.gov.in/dpdpa), 2023)
OT security risks in India - reference guideHow Does Secure Remote Access Work for Cloud-Connected OT in India?
Traditional VPN-based remote access to OT environments has significant security limitations: VPN grants broad network access once authenticated, does not record individual sessions, and cannot easily enforce OT-specific access controls. Cloud-mediated Zero Trust remote access provides a more secure and more operationally manageable approach. In this architecture, remote users (engineers accessing plant SCADA remotely, vendors providing support, management reviewing dashboards) access OT systems through a cloud-hosted Zero Trust access broker rather than through a direct VPN tunnel to the OT network. The access broker enforces: multi-factor authentication, role-based access to specific OT resources rather than broad network access, session recording for audit and forensic purposes, automatic session termination on completion, and just-in-time access provisioning.
For Indian industrial organisations with remote sites - ONGC offshore platforms, PowerGrid substations, water utility pump stations in remote locations - cloud-mediated secure remote access provides a scalable solution that is more secure than site-by-site VPN management. The access broker provides centralised visibility into all remote access sessions, CERT-In compliant session logging, and revocation of access across all sites simultaneously when vendor relationships change. Products including Claroty Secure Remote Access, CyberArk for OT, and Palo Alto Networks Prisma Access for OT provide this capability, available through Indian-based system integrators.
How Should Indian Organisations Manage Cloud OT Vendor Risk?
OT equipment vendors increasingly offer cloud-connected services: Siemens MindSphere, Honeywell Forge, ABB Ability, Yokogawa OpreX, and GE Proficy provide cloud analytics and management platforms for their respective OT products. Indian organisations using these vendor cloud platforms are sharing OT operational data with the platform operator - including production rates, process parameters, and equipment health data that may constitute commercially sensitive information. Vendor cloud platform agreements should be reviewed for: data handling and confidentiality commitments, security incident notification requirements, data residency and transfer terms, and the vendor's own security certification status (ISO 27001, SOC 2 Type II). NCIIPC requires that cloud service providers used by CII operators meet specific security requirements; vendor cloud platforms must be assessed against these requirements before connection.
[UNIQUE INSIGHT] A pattern visible across Indian PLI manufacturing deployments is that equipment vendors include cloud connectivity as a default feature in their latest-generation OT products, with cloud registration required for firmware updates or advanced features. Indian manufacturers accepting this connectivity without reviewing the security and data handling implications are creating cloud OT connections that were never formally approved, monitored, or reviewed for NCIIPC compliance. These vendor-default cloud connections are among the most commonly undiscovered cloud OT risks in Indian industrial security assessments - and they are often to cloud platforms operated in jurisdictions outside India without NCIIPC-appropriate data handling commitments.
What Are the Monitoring Requirements for Cloud-Connected OT?
Monitoring cloud-connected OT environments requires visibility across the full connection chain: OT network traffic at the OT-to-cloud interface, cloud platform access logs, remote access session logs, and cloud API calls that could indicate unauthorised cloud-side access to OT data or management interfaces. The OT monitoring platform (Dragos, Claroty, Nozomi) provides visibility into the OT network side. Cloud provider security tools (AWS GuardDuty, Azure Sentinel, Google Chronicle) provide visibility into the cloud platform side. Integrating these two monitoring streams - ideally in a shared SIEM - provides the unified visibility that an OT SOC needs to detect threats that originate in the cloud environment and propagate to OT, or vice versa. CERT-In's 180-day log retention requirement applies to all of these monitoring streams for Indian critical infrastructure operators.
Frequently Asked Questions
Is it safe to connect SCADA systems to cloud platforms in India?
Yes, with proper architecture. SCADA systems should not be directly connected to cloud platforms - a data bridge or IoT gateway that aggregates and forwards historian data provides the cloud connectivity while maintaining OT network isolation. SCADA should never receive commands from cloud platforms without explicit safety controls and authentication at the OT level. Monitoring of all OT-to-cloud traffic is essential. For Indian critical infrastructure operators, cloud connections must be formally approved under NCIIPC guidelines and implemented with authentication, encryption, and Indian data residency considerations addressed. Direct SCADA-to-cloud connections without these controls are a significant security risk. (NCIIPC, 2025)
What cloud providers are approved for Indian critical infrastructure OT data?
NCIIPC does not maintain a formal approved cloud provider list for OT data, but specifies requirements that cloud providers must meet for use with critical infrastructure data. Requirements include data residency within Indian jurisdiction for certain classifications of operational data, security certifications (ISO 27001, SOC 2), incident notification commitments, and the ability to support Indian government investigation access when legally required. Government cloud platforms (MeghRaj, NIC Cloud) are designed for government CII data. Commercial Indian providers and the India regions of international providers (AWS ap-south, Azure India Central) are used by private sector CII operators with appropriate contractual controls. (NCIIPC, 2025)
How does cloud-connected OT affect CERT-In incident reporting?
Cloud-connected OT creates additional scenarios that trigger CERT-In reporting obligations. A security incident on the cloud platform that could affect OT data or OT management access must be reported to CERT-In even if the OT systems themselves were not directly compromised. A cloud-side credential compromise that could provide access to OT management interfaces is a reportable incident under CERT-In's directions. The six-hour reporting window starts when the organisation becomes aware of the incident, regardless of whether the incident originated in the cloud or OT environment. CERT-In reporting procedures should address cloud-originated incidents affecting OT alongside traditional OT-initiated incident scenarios. (CERT-In, 2022)
Can Indian manufacturers use international OT cloud platforms under DPDPA?
Yes, but with appropriate contractual controls. DPDPA 2023 allows cross-border transfer of personal data to countries or entities notified by the Central Government, or under contractual terms approved by the Data Protection Board. For Indian manufacturers using international OT cloud platforms that process personal data (worker operational data, vehicle telematics, visitor management in smart factories), data processing agreements with the cloud provider must address DPDPA requirements for data principal rights, security measures, and breach notification. For OT data that does not constitute personal data, DPDPA transfer restrictions do not apply, though NCIIPC operational data requirements may. (DPDPA, 2023)
What is the cost of implementing secure cloud OT connectivity for an Indian industrial site?
Securing cloud OT connectivity for a mid-sized Indian industrial site involves several cost components. OT edge gateway or data bridge hardware and software: INR 10-30 lakh. Secure remote access platform (PAM with OT capabilities): INR 15-40 lakh annually depending on user count. Cloud security monitoring integration (cloud SIEM with OT monitoring): INR 20-60 lakh annually. Architecture review and implementation professional services: INR 20-50 lakh one-time. Total first-year investment of INR 65-180 lakh enables secure cloud OT connectivity that satisfies NCIIPC requirements and enables the business value of cloud-connected operations. This should be evaluated against the INR 10-50 crore annual value that cloud OT analytics typically deliver to Indian manufacturers through reduced downtime and optimised operations. (IDC, 2025)
Connecting Indian OT to the Cloud - Securely
Cloud connectivity for Indian OT is not a question of if but how. The business value is compelling, the technology is mature, and the operational requirements increasingly demand it. The security requirement is to implement this connectivity with the architecture, controls, and monitoring that allow Indian industrial organisations to realise the business benefits without creating the attack paths that inadequately secured connectivity introduces.
The organisations that implement secure cloud OT connectivity - with proper data architecture, Zero Trust remote access, NCIIPC-compliant monitoring, and CERT-In incident reporting capabilities - will capture the operational advantages of cloud-connected industrial operations while maintaining the security posture that India's regulatory framework and threat landscape demand. The investment required is modest relative to the value delivered and the risk mitigated.
For secure cloud OT connectivity implementation in Indian industrial environments, visit our ot security services India.
For hands-on delivery in India, see managed cloud security.
About the Author

Country Manager, Sweden at Opsio
AI, DevOps, Security, and Cloud Solutioning. 12+ years leading enterprise cloud transformation across Scandinavia
Editorial standards: This article was written by a certified practitioner and peer-reviewed by our engineering team. We update content quarterly to ensure technical accuracy. Opsio maintains editorial independence — we recommend solutions based on technical merit, not commercial relationships.