Unsecured vendor RDP and VPNs are the primary entry for ICS attacks. Discover how to implement zero-trust remote access that enables experts without exposing your control network.


Cybersecurity Matters

Securing Third-Party Remote Access:
Neutralizing the #1 Attack Vector in Industrial Networks

The Backdoor You Installed Yourself: Securing Third-Party Remote Access

That emergency call from your OEM vendor at 2 AM just became your worst security nightmare.

The very feature that enables global expertise and keeps your operations running - third-party remote access - has become the most exploited attack vector in industrial cybersecurity. According to Dragos, over 70% of initial access into operational technology environments comes through exactly these connections. Unsecured RDP sessions, vendor portals with default credentials, and broad network-level VPNs aren't just vulnerabilities; they're invitations.

The problem isn't remote access itself. The problem is how we've implemented it for decades.

Cybersecurity Matters

The Illusion of Control in a Connected World

Every time you grant a third-party integrator full network access to service a single drive, you're not being efficient - you're being reckless. You're handing over master keys to your entire facility for what should be a targeted repair. Modern adversaries know this weakness intimately. They don't waste time trying to breach fortified perimeters when they can simply walk through the unlocked door you provided to your maintenance team.

These attacks follow a predictable pattern. Threat actors scan for exposed RDP ports and VPN gateways, often finding them within hours of being opened for vendor support. Once they gain initial access, they don't trigger immediate alarms. They lie dormant, move laterally through your flat network, and wait for the optimal moment to disrupt operations or deploy ransomware.

The Colonial Pipeline incident didn't start with a sophisticated attack on pipeline controls. It began with a compromised VPN password that should have been deactivated. The cost? $4.4 million in ransom and days of fuel shortages across the Eastern United States.

Why Your Current "Secure" Remote Access Isn't

Most organizations believe they have remote access under control because they use standard security measures. But let's examine what "secure" really means in today's threat landscape:

VPNs Create a False Sense of Security
Traditional VPNs grant broad network access, violating the core principle of least privilege. Once authenticated, a user - or an attacker using stolen credentials - has the "keys to the kingdom." They can probe any connected system, move laterally, and establish persistence. The recent CISA advisory on ransomware targeting the water sector specifically highlighted compromised VPN appliances as the initial entry point.
RDP: The Attackers' Favorite Tool
Remote Desktop Protocol was never designed for security across untrusted networks. Yet countless organizations still expose RDP directly to the internet or allow vendors to use it internally with shared credentials. The numbers don't lie: scans from threat intelligence firms consistently show hundreds of thousands of industrial organizations with RDP exposed to the internet at any given moment.
The Vendor Management Nightmare
Managing credentials for dozens of vendors becomes an administrative burden that leads to dangerous shortcuts. Shared passwords rarely get rotated. Accounts remain active long after projects conclude. Temporary access rules become permanent fixtures in your firewall. Each oversight represents a potential backdoor that persists months or years after the vendor's work is complete.

Cybersecurity Matters

The Shift to Zero-Trust: From Networks to Assets

The solution requires a fundamental mindset shift - from verifying once at the network perimeter to verifying continuously at the asset level. This is the essence of Zero-Trust Architecture for industrial environments.

Instead of asking "Is this user on our network?" we must ask "Should this specific user access this particular asset right now, and what should they be allowed to do?"

This approach transforms remote access from a binary state (inside/outside) to a dynamic, contextual relationship. Imagine a system where:

  • A pump manufacturer's technician can only access the specific variable frequency drive they're troubleshooting
  • Their session automatically expires after a predefined 4-hour window
  • Every command they issue is logged and monitored for anomalous behaviour
  • They cannot pivot to other systems, even if their credentials were compromised

This isn't a theoretical future state. The technology exists today and is being deployed in critical infrastructure facilities worldwide.

Building Your Zero-Trust Remote Access Foundation

Implementing secure third-party access requires more than just new technology - it demands a new process framework. The most successful implementations follow these core principles:

1. Identity-Centric Security
Move beyond IP addresses and usernames. Implement multi-factor authentication that's appropriate for industrial contexts. This might mean hardware tokens for critical system vendors or mobile push notifications for less sensitive support. The key is ensuring that compromised credentials alone cannot grant access.
2. Granular Asset-Level Controls
Define access policies based on specific devices, not network segments. A robotics integrator shouldn't have access to your environmental controls. A SCADA system maintainer shouldn't reach your safety instrumented systems. Modern access gateways can enforce these policies without requiring complex firewall rule changes for every new vendor.
3. Just-in-Time and Just-Enough Privilege
Access should be granted for specific time windows and automatically revoked. Need a vendor to perform emergency maintenance at 3 AM? Grant 2-hour access that begins at 2:55 AM and expires at 4:55 AM - no manual cleanup required. This eliminates the risk of dormant accounts becoming attack vectors.
4. Comprehensive Session Monitoring
Record and analyze all remote sessions. Modern solutions can flag suspicious activity in real-time, such as attempts to access unauthorized systems or unusual command sequences. This creates both a deterrent and an invaluable forensic tool if an incident occurs.

The Practical Path Forward

Transitioning from traditional remote access to a Zero-Trust model doesn't happen overnight, but the journey begins with straightforward steps:

Start by conducting an audit of all current remote access methods. How many vendors have persistent access? Which systems can they reach? You'll likely discover connections you forgot existed.

Next, prioritize based on risk. Begin with vendors who have access to your most critical systems or those with the weakest authentication methods. The goal isn't perfection on day one - it's meaningful risk reduction with each implementation.

Finally, select technology that understands industrial protocols. A solution that works perfectly for office IT may fail miserably in an OT environment where Modbus TCP, EtherNet/IP, and OPC UA communications must be properly handled and monitored.

The manufacturers and utilities leading in operational technology security aren't necessarily those with the largest budgets. They're the ones who recognized that the convenience of broad remote access had created an unacceptable risk - and they took deliberate steps to implement granular, controlled alternatives that keep both their operations and their people safe.

Answering - Some Frequently Asked Questions

Quite the opposite. With proper planning, Zero-Trust access can be faster than traditional methods. Pre-approved access policies allow you to grant precise, time-limited credentials instantly when an emergency occurs—no need to manually configure firewall rules or hunt down IT staff after hours. The vendor receives immediate access to only what they need, and you maintain control and visibility.

The beauty of asset-level Zero-Trust is that it doesn't require changes to your endpoints. The security enforcement happens at the network gateway level. The gateway acts as a broker, authenticating the user using modern methods and then brokering the connection to the legacy device using whatever protocol it requires. Your 20-year-old PLC continues communicating as it always has, but now through a secure, monitored channel.

Modern Zero-Trust platforms are designed specifically for operational teams, not cybersecurity experts. The management interfaces are intuitive, and many providers offer managed services where they handle the complex configuration and monitoring. For resource-constrained teams, this approach actually reduces administrative burden by eliminating the need to constantly manage VPN credentials and firewall rules for dozens of vendors.

Frame the conversation around shared risk. Explain that unsecured remote access puts both your operations and their reputation at risk. Many leading OEMs now prefer secure access methods because it protects their intellectual property and demonstrates their commitment to security. For resistant vendors, start with monitoring and logging of their existing access - the visibility alone often changes the conversation.

Properly implemented Zero-Trust access should be virtually transparent to operational traffic. The authentication happens at session initiation, not with every packet. For the most latency-sensitive applications, solutions exist that can establish secure tunnels without adding meaningful delay. The key is working with providers who understand industrial real-time requirements, not just enterprise IT.

While MFA is a critical improvement over passwords alone, a VPN still typically grants network-level access. Once authenticated, a user can probe other systems on the network. Zero-Trust provides an additional layer by ensuring that even with valid credentials, users can only reach explicitly authorized assets. It's the difference between having a key to the building versus a key that only works on one specific door.

Your Next Step Towards Unbreachable Operations

The threat isn't theoretical, and the solution isn't a distant promise. The technology and methodologies to secure third-party remote access exist today. Continuing with traditional approaches means accepting an unnecessary and growing risk.

Subscribe to the Link & Layer | Smart Learning Hub to receive our exclusive implementation framework: "The 90-Day Plan to Zero-Trust Remote Access." This detailed guide walks you through the technical specifications, vendor communication templates, and policy frameworks you need to transform your highest-risk access points into your most controlled.

Don't let convenience compromise your security. The backdoor you close today might be the one that saves your operations tomorrow.




You May Also Be Interested In ...

Cybersecurity Matters
OT Asset Visibility: How to Eliminate Your Industrial Network's Foundational Blind Spot

Unknown devices create unmonitored attack paths in industrial networks. Discover passive discovery techniques to build a dynamic OT asset inventory without disrupting operations

Cybersecurity Matters
OT Network Segmentation: Replacing the Air Gap Myth with Defensible Architecture

Securing remote access for legacy PLCs is the critical, often overlooked, frontier in industrial cybersecurity. This guide reveals a practical, defense-in-depth strategy to protect your vital assets without a full-scale rip-and-replace

Cybersecurity Matters
Protecting Unpatchable OT Assets: Securing Legacy PLCs and Control Systems

Legacy PLCs and RTUs cannot be patched but run critical operations. Discover layered compensating controls that protect inherently vulnerable industrial assets from modern threats