This article has been authored by Sumit Janmejai, Sr. Manager OT Security, Kroll
In today’s industrial environments, the single biggest barrier to securing operations is not technology, not budget, not even talent–it’s visibility. You cannot protect what you cannot see.
In Operational Technology (OT), visibility has two dimensions:
- Asset Visibility: Knowing what devices exist, their vendor and make, firmware or patch level, configuration state and known vulnerabilities. This is the baseline for asset inventory, vulnerability management and configuration control.
- Communication Visibility: Understanding how those assets connect to each other, which protocols they use, how often they communicate and the dependencies between them. This is what makes segmentation and segregation possible–arguably the most important control in OT security.
Without this combined view, organizations are left guessing where their crown jewels sit, how traffic flows across the environment and where vulnerabilities or attack paths may hide.
Our recent field work reinforces this across energy, manufacturing and utilities, limited visibility into assets and networks was consistently cited as the number one deterrent to effective OT security. This is not just a technical gap–it’s a business risk. Blind spots create unmitigated vulnerabilities, regulatory pressure and exposure to threats that can disrupt safety and reliability.
Real-World Case Example: Lessons From the Energy Sector
Earlier this year, Kroll led a risk assessment for a renewable energy operator managing more than 30 solar farms in North America. The findings mirror challenges we frequently observe across industrial sectors.
The organization had made some sound design choices:
- Each farm’s network was isolated from the others, reducing the risk of a single compromise cascading across multiple farms. These farms were unmanned and standalone, with no direct corporate IT connection into the OT network–limiting enterprise-to-OT attack paths.
- Remote employees and vendor staff used a privileged access solution rather than a traditional VPN, with benefits including:
- Certificate–based authentication instead of passwords
- Authentication logging and session recording for accountability
- Just–enough access–connectivity bound to specific target systems, not broad networks
However, despite these strengths, the assessment uncovered serious weaknesses:
- Visibility Gaps: There was no centralised inventory or telemetry. Operators couldn’t easily identify all devices, their patch levels or configurations. Communication patterns between critical assets like Real-Time Automation Controllers (RTACs), inverters and MET stations were undocumented, making segmentation/tiered zoning difficult.

