Nyheter

Securing Operational Technology: The Foundation of Modern Infrastructure

Published: Nov 6, 2025
Portratt 3 2025
Mikael Andersson, Tutus.

As critical infrastructure around the world becomes increasingly connected to digital systems, the need to protect the physical components that underpin them is growing. Power, water, transport, and other essential services are no longer isolated systems; they are now deeply integrated into digital environments. However, as these systems become more accessible, the potential for exploiting public vulnerabilities in the technology grows. Such vulnerabilities are targeted by antagonistic actors, leading to serious consequences for vital societal functions, says Mikael Andersson, who works with Secure Networks at Tutus.

 

Security in OT Networks

Historically, systems controlling critical societal functions were secure within isolated environments. Control systems for electricity grids and drinking water supply are typical examples of sensitive industrial infrastructures that, with increasing digitalization, can become particularly vulnerable if they are connected and reachable via IP-based networks.

“OT, or Operational Technology, refers to systems that control physical and often safety-critical infrastructure. Today, many of these systems are connected through traditional administrative IT architectures, which makes them vulnerable in ways we haven’t seen before,” Mikael explains.

 

Connectivity Can Mean Exposure

Many of today’s OT security solutions rely on commercial IT security products from international vendors. These products often originate from administrative network environments and include known public vulnerabilities, known as CVEs (Common Vulnerabilities and Exposures). The same technologies are therefore used in both administrative IT environments and sensitive OT networks, even though the risk landscape is entirely different.

“Unlike breaches in administrative networks, which mainly concern access to information, a breach in an OT system can have direct impacts on human life and safety. It’s about securing drinking water, electricity supply, or wastewater treatment. If we fail there, the consequences become immediately tangible.”

“We cannot protect tomorrow’s infrastructure with yesterday’s defence. Many OT environments still rely on solutions developed for office networks. They were simply not built to withstand the kinds of threats we are facing today.”

 

Trusted Technology, Built in Sweden

Tutus takes a different approach. With decades of experience in securing communications and systems in sensitive environments, including defence and critical infrastructure, the company develops solutions with security as a foundation, not as an add-on. Rooted in Swedish engineering and technological innovation.

“We do not build OT networks; we secure them. Our solutions are designed to operate in environments where compromise is not an option. That is where we play an important role, both in protecting critical infrastructure and from a total defence perspective.”

 

Encryption, Key Management, and Isolated Solutions

What does it take to protect OT systems? Mikael highlights three fundamental pillars:

  • Strong encryption that ensures system availability and minimizes the attack surface
  • Secure key management that ensures confidentiality and integrity
  • Independence from cloud services for automated security updates

“It is not only about technical features but also about a coherent system design. High entropy in key generation, post-quantum secure encryption, and well-defined access controls are all essential,” Mikael emphasizes.

 

The Next Step for OT Security

As regulations such as NIS2 and similar frameworks are introduced across regions, the pressure on organizations to take OT security seriously is increasing. It has become a key element of national and corporate resilience strategies worldwide.

“We are facing a paradigm shift. OT security is no longer a niche concern for specialists; it is a necessity for every organization that depends on critical operations. Our goal is to be the trusted partner that helps build the level of protection the future demands.”