Til toppen

Secure Remote Access

Secure Remote Access to OT – Controlled by the Plant Owner

In many manufacturing environments, machine builders and service providers install their own VPN-based remote access solutions directly into production systems. While this is often done to enable quick support, it introduces significant cybersecurity risks. These vendor-managed VPNs are typically outside the visibility and control of the plant owner, leaving critical OT infrastructure exposed to unauthorized access, misconfigurations, and potential breaches.

At Triple-S, our assessments across multiple industrial sites consistently uncover unmanaged remote access devices hidden in control panels—installed as part of the supplier’s service model. These devices operate independently of the plant’s cybersecurity policies, and in most cases, there is no centralized oversight of who has access, when, or for what purpose. This fragmented access landscape represents a serious attack surface for threat actors.

To address this, manufacturers should establish a secure remote access solution that is fully owned and operated by the plant owner. All external access—whether by OEMs, integrators, or service technicians—should be routed through this controlled gateway. Such a solution must be purpose-built for OT environments, offering secure, audited, and role-based access without compromising uptime or operational reliability.

When the plant owner controls remote access, they gain full visibility into all remote activities, can enforce consistent security policies, and reduce the risk of unauthorized or persistent vendor access. This centralized approach strengthens the overall cybersecurity posture and ensures that OT systems remain protected, even in multi-vendor environments.

Triple-S recommend Claroty xDome Secure Access and Cyolo PRO (Privileged Remote Operations)

contact us to today to find the best solution to your needs.

Knut-Erik Tovslid
Knut-Erik Tovslid
Head of Network & Cyber Security
Tom-Roger Stensberg
Tom-Roger Stensberg
ICS/OT Cyber Security Consultant
Tormod Sæther
Tormod Sæther
Senior Solution Architect Network & Cyber Security