Forging a Path Between the OT/IT Divide
Guest WriterGuest Writer
Jason Shepherd (IoT CTO, Dell Technologies): We want to address the OT/IT divide, especially in case any of you in these respective organizations made a resolution this year to work together more in 2019. Along the way, youâll find some personal anecdotes from each of us. I come from the IT (Information Technology) world but have learned a lot about OT (Operations Technology) over the past few years, meanwhile, Todd started his career in the industrial controls space and picked up a bunch of IT tricks along the way.
Letâs face it, within a manufacturing plant, the OT people who run production typically donât interact so well with the IT team. The OT group is often turned off by what they see as ITâs rigorous policies, and the IT professionals in charge of the plant infrastructure would rather not have to deal with the OT side of the house and their âWild Westâ mentality.
Each organization is motivated by different things, and, even within these key stakeholder groups, there are many sub-groups that have conflicting goals based on how they are measured. For example, in OT, the production supervisorâs goals of uptime and throughput can often be at odds with the goals of those measured on quality and safety. Meanwhile, in the IT world, the data center people care about different things than those that manage networks and end-user devices like PCs and phones.
But when it comes to digitally transforming your business and implementing Industrial IoT (IIoT) projects that promise to unlock enormous efficiency gains and even new business models, all these stakeholders need to work together for optimal success. OT knows their process, and IT knows about security and management at scale, hence why we like to say that IoT starts with OT and scales with IT.
The key to a better collaborative relationship is for each group to understand respective needs and develop an IIoT implementation methodology that takes each sideâs needs into account. This can typically boil down to three foundational considerations:
Uptime, keeping the production line moving, is the number one, two, and three priority for the manufacturing professional. If the line stops, it can mean tens of thousands of dollars of lost production per minute, causing people to lose their jobs. OT people tend to have an âIf it ainât broke, donât fix itâ mindset, where downtime is avoided at all costs and having the latest features and patches takes a backseat to having reliable operations.
To that end, manufacturing organizations have turned to specialized, very rugged, extremely reliable computer control systems to run their plants. These systems are called PLCs (Programmable Logic Controllers), and they are used everywhere to orchestrate the operation of the sensors, motors, valves, and actuators within machines and across the factory floor.
Beyond understanding OTâs foundational need for uptime, itâs also important to align on terminology around âreal time,â which is one of the more generalized phrases used in IoT conversations. Rapid data processing is important in the IT world, for example, with credit card authorizations, but these transactions donât typically have major implications if thereâs a slight delay or even all-out failure in execution. Meanwhile, communication between PLCs and the devices they control needs to be both extremely fast and deterministic, meaning highly predictable.
Then again, even OT organizations have different time scale needs when it comes to running their operations depending on what theyâre doing.
[Jason]: I was once talking with two OT experts â one focused on energy monitoring in buildings and another in the manufacturing space. Â After a few minutes of talking past each other about the importance of âreal timeâ communication for IoT solutions, it became apparent to me that we werenât on the same page. I asked the buildings person what he considered to be âreal timeâ, the answer â 15 minutes. The manufacturing expertâs response â milliseconds.
For this reason, itâs helpful to think in ârelevant timeâ, with a balance made between leveraging embedded, fixed-function PLCs for deterministic process control paired with more IT-centric data acquisition and analytics solutions that are software-defined for flexibility while still being appropriately responsive.
The key to a successful IIoT implementation is for IT to understand OTâs need for reliable, uninterrupted operation and to maintain separation of concerns between the essential control functions served by PLCs and solutions above for data extraction, normalization, and analytics. Think of this as essentially building a virtual data layer above the control network to extract valuable operational intelligence without interrupting the process.
Since industrial controls and PLCs are so reliable, in any typical manufacturing plant you will likely find an assortment of controls ranging from state-of-the-art systems to 40-year-old PLCs and legacy equipment running Windows 3.1 or even DOS operating systems.
Todd Edmunds (Director of Industrial IoT Strategy, Dell Technologies): I personally know of customers who have spent $35,000 to purchase an obsolete 30-year-old PLC processor to run a critical piece of equipment that was down.
One of the big challenges in the industrial world is how to get all this legacy equipment to connect to a modern-day information network and get it to give up its valuable operational secrets. Â Given that PLCs are built for the sole purpose of reliable control, they arenât typically set up to share the information they possess about the process with the outside world.
[Todd]: I was once told by a very bright programmer that he was writing a âkillerâ predictive maintenance application for a packaging machine and wanted me to get him a list of the APIs for the PLC. I had to explain to him that PLCs do not have APIs and most donât even have ethernet ports!
The challenge is not just the age of the equipment, but the communication methods that are needed to interface with these dinosaurs.
This is why itâs essential to have a well thought out IIoT infrastructure with scalable edge compute devices used to interface to legacy systems and translate the myriad OT protocols into common data sharing formats and provide valuable context. IT must work with OT to understand the connectivity and latency needs and build a reference architecture on top of open standards that can scale. With these open frameworks combined with device and application management and built-in security capabilities, the job of bringing these valuable legacy assets online is exponentially less challenging.
Security is an especially important consideration in the OT world because a successful hack often immediately impacts production, or worse, life and limb. Hence why security by obscurity (i.e. isolating operations from broader networks, including the internet) has historically been the norm for OT. The degree of this risk depends on the nature of the Applications. For example, connecting a control system in a nuclear plant to the cloud is quite different than a system that simply monitors energy use within a building.
Enter a foundational catch-22 for Industrial IoT: to drive new outcomes, OT systems need to be connected, and to keep connected devices secure, they need to be updated, and updates that arenât properly scheduled can cause unplanned downtime, which is a big no-no to the OT person. As such, a key challenge is to balance IT's need for enabling security and manageability at scale without impacting production uptime.
Since security can be a real challenge to integrate, implementing security is usually left as an afterthought. This means that secure operations must be built into everything at the beginning, as it will be assumed to be available.
Most OT professionals are extremely wary of IT implementing their typical security policies in their plant floor production kingdom, as they have experienced typical IT procedures, like patching and upgrades, to cause systems to quit functioning.
[Todd]: As a production manager at a snack manufacturer once said to me, âOur IT department has caused more downtime in our plant than all malware combined.â If an email gets delayed for a few minutes due to a virus scan or security concern, usually nobody notices. But if the signal to stop the flow of creme filling is delayed by even one second, then Twinkiemageddon is the result!
It's critical that security procedures in manufacturing take a âkeep operating with a detected threat and manageâ point of view rather than the normal âshut down access to detected threatâ response from the IT world. Â Beyond mitigating specific threats, updates need to be able to be scheduled during downtime versus being pushed. This is where robust, context-aware manageability tools are critical.
In addition, the tools used to implement, manage, and report on secure operations must be as user-friendly as possible. Graphical user interfaces are mandatory as are plain-language instructions. IT Security professionals like to use SSH and command line tools and enjoy the power that commands typed into Bash shell gives them.
[Todd]: To an OT person, âBashâ is something you do with a hammer to a malfunctioning security appliance and then tell the witnesses to âSSHhhhâ.
We often come across OT organizations doing shadow IT for IoT projects, avoiding working with IT by bypassing their networks altogether.
[Jason]: We were working with one large company whose OT department decided to go around their IT organization on a bid for a new Industrial IoT solution. Meanwhile, at the same organization, the IT resources were telling me that they wanted to figure out how to do more with OT. Â My suggestion: âTalk to one another!â It was like a bad episode of the TV show Threeâs Company in which itâs always a big misunderstanding.
That said, weâre seeing more and more collaboration between OT and IT organizations, including companies adding executive roles to drive programmatic collaboration across these groups and incentivizing both sides to work together for the benefit of the overall business.
Forging the path through the IT/OT divide can seem challenging, but it can be successfully navigated with the right amount of collaboration, communication, caution and commitment.
Follow these recommendations, and you will soon be on the road to real, meaningful digital transformation and Industrial IoT efficiency with the riches it promises!
Co-authored by Jason Shepherd, IoT CTO, Dell Technologies and Todd Edmunds, Director of Industrial IoT Strategy, Dell Technologies
The Most Comprehensive IoT Newsletter for Enterprises
Showcasing the highest-quality content, resources, news, and insights from the world of the Internet of Things. Subscribe to remain informed and up-to-date.
New Podcast Episode
Related Articles