Skip to content

mattiaspilroth/operational-resilience-security

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 

Repository files navigation

Operational Resilience & OT Security

This repository is an archived collection of analytical work on OT security in high-consequence industrial environments.

Current and updated work is published at https://mattiaspilroth.com

Drawn from architecture work across production sites where long lifecycles, limited change capacity, regulatory obligations, and operational accountability shape what can realistically be sustained.

The central question:

Which security controls remain durable under operational reality, and which degrade predictably despite appearing sound on paper?

These papers examine structural constraints, recurring failure patterns, and the architectural properties required for resilience when consequences are physical, not only informational.

The papers

Each paper addresses a distinct pattern and can be read independently. Together they describe how security posture evolves under sustained operational pressure.

Operational Reality

Why OT Infrastructure Appears Static
Stability in continuous process industries is often an engineered response to asymmetric risk rather than technical stagnation. Examines validated configurations, lifecycle economics, vendor authority boundaries, and why ignoring these constraints leads to security strategies that cannot be sustained.

Silent Degradation Under IT/OT Convergence Redundant IT infrastructure inside segmented OT zones can degrade invisibly when health signals do not reach actors with authority to intervene. The gap is often not the absence of signals, but the absence of a clearly defined owner for acting on them.

Compliance and Consequence: Competing Priorities in OT Security
Examines why compliance-driven programs and resilience-driven programs diverge over time. Analyzes the structural incentives behind that divergence and outlines what operationalizing consequence-oriented security requires.

Identity and Trust in OT

OT Identity Architecture: Federation, PAM, and Residual Risk
A structural analysis of common identity models in OT. Explores how federation, isolation, and hybrid approaches redistribute rather than eliminate risk, and why authority for high-consequence actions must remain clearly defined.

Part 1: Trust Decay in Constrained OT Environments
Certificate validation assumes trust material is continuously obtainable. In segmented OT architectures, that assumption may not hold. Trust erosion can remain latent until operational stress reveals it.

Part 2: Trust Flow in Constrained OT Environments
Defines the properties required for validation to occur predictably and repeatedly inside constrained zones. Written as architectural requirements to prevent the failure modes identified in Part 1.

Perspective

These papers favor:

  • Architectural reasoning beyond checklist interpretation
  • Observed operational behavior over design intent
  • Long-term durability over short-term elegance
  • Contextual allocation of controls rather than universal prescriptions

No control category is universally correct. Architectural fit determines durability.

The goal is practical clarity, not comprehensive coverage.

Discussion

Practitioners who have observed similar or contradictory patterns are welcome to engage.

Disagreement grounded in operational experience is particularly valuable.

About

Written by Mattias Pilroth, Principal OT Security Architect working with industrial cyber resilience in European chemical and process industry environments.

My background spans field automation engineering, EPCM project delivery in oil and gas and petrochemicals, six years of end-to-end operational responsibility for OT systems at a SEVESO-classified PVC production facility, and enterprise OT security architecture across 14 chemical manufacturing sites in 8 European countries. I arrived at security architecture through operations, which shapes how these analyses approach resilience, trust boundaries, and long-lifecycle industrial systems.

Independent analytical work. Does not represent the positions of any employer or client. All examples are abstracted from general operational patterns. No proprietary, confidential, or organizationally identifying information is included.

mattiaspilroth.com · LinkedIn

About

Practitioner analysis of OT security in high-consequence industrial environments. Covers structural constraints, failure patterns, and consequence-driven approaches to resilience.

Topics

Resources

License

Stars

Watchers

Forks

Contributors