{"id":3014,"date":"2026-03-20T14:55:27","date_gmt":"2026-03-20T13:55:27","guid":{"rendered":"https:\/\/www.seclab-security.com\/?post_type=avada_faq&#038;p=3014"},"modified":"2026-04-01T20:05:30","modified_gmt":"2026-04-01T18:05:30","slug":"should-all-ot-assets-be-protected-in-the-same-way","status":"publish","type":"avada_faq","link":"https:\/\/www.seclab-security.com\/en\/faq-items\/should-all-ot-assets-be-protected-in-the-same-way\/","title":{"rendered":"Should All OT Assets Be Protected in the Same Way?"},"content":{"rendered":"<div style=\"font-family: 'TT Firs Neue Trial Var Roman', sans-serif; font-size: 20px;\">\n<p style=\"font-weight: 400;\"><strong>No. Not all equipment in an OT environment has the same level of criticality. Applying maximum protection everywhere leads to disproportionate costs and complexity, which can itself harm availability.<\/strong><\/p>\n<p style=\"font-weight: 400;\"><strong>The MVDI Principle (Minimum Viable Digital Industry)<\/strong><\/p>\n<p style=\"font-weight: 400;\">MVDI refers to the set of digital assets vital for the proper functioning of industrial operations. The goal is to identify this critical perimeter\u2014production PLCs, SCADA, Historian, safety systems\u2014and focus the strongest protection measures there.<\/p>\n<div>\n<p style=\"font-weight: 400;\"><strong>Which protection for which level of criticality?<\/strong><\/p>\n<div>\n<table style=\"width: 100%; border-collapse: collapse; line-height: 1.7;\">\n<thead>\n<tr>\n<th style=\"border-bottom: 1px solid #cccccc; padding: 0.5em 1em; text-align: left; font-weight: bold;\" scope=\"col\">\n<div><b>Criticality Level<\/b><\/div>\n<\/th>\n<th style=\"border-bottom: 1px solid #cccccc; padding: 0.5em 1em; text-align: left; font-weight: bold;\" scope=\"col\">Example assets<\/th>\n<th style=\"border-bottom: 1px solid #cccccc; padding: 0.5em 1em; text-align: left; font-weight: bold;\" scope=\"col\"><b style=\"font-family: inherit; font-size: inherit;\">Recommended Protection<\/b><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"border-bottom: 1px solid #e0e0e0; padding: 0.5em 1em;\">Critical (MVDI)<\/td>\n<td style=\"border-bottom: 1px solid #e0e0e0; padding: 0.5em 1em;\">\n<div><span lang=\"EN-US\">PLCs, SCADA, Historian, safety systems, sensitive application servers<\/span><\/div>\n<\/td>\n<td style=\"border-bottom: 1px solid #e0e0e0; padding: 0.5em 1em;\">Physical isolation (Electronic AirGap)<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1px solid #e0e0e0; padding: 0.5em 1em;\">Important<\/td>\n<td style=\"border-bottom: 1px solid #e0e0e0; padding: 0.5em 1em;\"><span style=\"font-family: inherit; font-size: inherit;\">Standard application servers, engineering workstations<\/span><\/td>\n<td style=\"border-bottom: 1px solid #e0e0e0; padding: 0.5em 1em;\">Network segmentation (firewall, VLAN)<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: 1px solid #e0e0e0; padding: 0.5em 1em;\">Standard<\/td>\n<td style=\"border-bottom: 1px solid #e0e0e0; padding: 0.5em 1em;\">\n<div><span lang=\"EN-US\">Office workstations, non-critical systems<\/span><\/div>\n<\/td>\n<td style=\"border-bottom: 1px solid #e0e0e0; padding: 0.5em 1em;\">Standard IT security measures<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<p style=\"font-weight: 400;\">\n<p style=\"font-weight: 400;\">This approach aligns with IEC 62443, which formalizes differentiated security levels by zone. It maximizes risk reduction while controlling costs and operational impact.<\/p>\n<blockquote style=\"background-color: #f0f0f0; color: #1a1a1a; border-left: 4px solid #cccccc; padding: 1em 1.25em; margin: 1.5em 0; font-size: 20px;\"><p><strong><em>Key takeaway<\/em><\/strong> \u2014 <em>Focus maximum protection (physical isolation) on MVDI assets, and adapt security levels for other assets according to their actual criticality. This provides the best security-to-cost ratio in OT environments.<\/em><\/p><\/blockquote>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>No. Not all equipment in an OT environment has the  [&#8230;]<\/p>\n","protected":false},"author":5,"featured_media":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"footnotes":""},"faq_category":[79],"class_list":["post-3014","avada_faq","type-avada_faq","status-publish","format-standard","hentry","faq_category-network-isolation"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Should All OT Assets Be Protected in the Same Way? - Seclab Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.seclab-security.com\/en\/faq-items\/should-all-ot-assets-be-protected-in-the-same-way\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Should All OT Assets Be Protected in the Same Way? - Seclab Security\" \/>\n<meta property=\"og:description\" content=\"No. Not all equipment in an OT environment has the [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.seclab-security.com\/en\/faq-items\/should-all-ot-assets-be-protected-in-the-same-way\/\" \/>\n<meta property=\"og:site_name\" content=\"Seclab Security\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T18:05:30+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.seclab-security.com\/en\/faq-items\/should-all-ot-assets-be-protected-in-the-same-way\/\",\"url\":\"https:\/\/www.seclab-security.com\/en\/faq-items\/should-all-ot-assets-be-protected-in-the-same-way\/\",\"name\":\"Should All OT Assets Be Protected in the Same Way? - Seclab Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.seclab-security.com\/en\/#website\"},\"datePublished\":\"2026-03-20T13:55:27+00:00\",\"dateModified\":\"2026-04-01T18:05:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.seclab-security.com\/en\/faq-items\/should-all-ot-assets-be-protected-in-the-same-way\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.seclab-security.com\/en\/faq-items\/should-all-ot-assets-be-protected-in-the-same-way\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.seclab-security.com\/en\/faq-items\/should-all-ot-assets-be-protected-in-the-same-way\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.seclab-security.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FAQs\",\"item\":\"https:\/\/www.seclab-security.com\/en\/faq-items\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Should All OT Assets Be Protected in the Same Way?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.seclab-security.com\/en\/#website\",\"url\":\"https:\/\/www.seclab-security.com\/en\/\",\"name\":\"Seclab Security\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.seclab-security.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.seclab-security.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.seclab-security.com\/en\/#organization\",\"name\":\"Seclab Security\",\"url\":\"https:\/\/www.seclab-security.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.seclab-security.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.seclab-security.com\/wp-content\/uploads\/2026\/03\/LOGO-SECLAB-BLACK-1-e1772644859613.png\",\"contentUrl\":\"https:\/\/www.seclab-security.com\/wp-content\/uploads\/2026\/03\/LOGO-SECLAB-BLACK-1-e1772644859613.png\",\"width\":250,\"height\":46,\"caption\":\"Seclab Security\"},\"image\":{\"@id\":\"https:\/\/www.seclab-security.com\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Should All OT Assets Be Protected in the Same Way? - Seclab Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.seclab-security.com\/en\/faq-items\/should-all-ot-assets-be-protected-in-the-same-way\/","og_locale":"en_US","og_type":"article","og_title":"Should All OT Assets Be Protected in the Same Way? - Seclab Security","og_description":"No. Not all equipment in an OT environment has the [...]","og_url":"https:\/\/www.seclab-security.com\/en\/faq-items\/should-all-ot-assets-be-protected-in-the-same-way\/","og_site_name":"Seclab Security","article_modified_time":"2026-04-01T18:05:30+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.seclab-security.com\/en\/faq-items\/should-all-ot-assets-be-protected-in-the-same-way\/","url":"https:\/\/www.seclab-security.com\/en\/faq-items\/should-all-ot-assets-be-protected-in-the-same-way\/","name":"Should All OT Assets Be Protected in the Same Way? - Seclab Security","isPartOf":{"@id":"https:\/\/www.seclab-security.com\/en\/#website"},"datePublished":"2026-03-20T13:55:27+00:00","dateModified":"2026-04-01T18:05:30+00:00","breadcrumb":{"@id":"https:\/\/www.seclab-security.com\/en\/faq-items\/should-all-ot-assets-be-protected-in-the-same-way\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.seclab-security.com\/en\/faq-items\/should-all-ot-assets-be-protected-in-the-same-way\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.seclab-security.com\/en\/faq-items\/should-all-ot-assets-be-protected-in-the-same-way\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.seclab-security.com\/en\/"},{"@type":"ListItem","position":2,"name":"FAQs","item":"https:\/\/www.seclab-security.com\/en\/faq-items\/"},{"@type":"ListItem","position":3,"name":"Should All OT Assets Be Protected in the Same Way?"}]},{"@type":"WebSite","@id":"https:\/\/www.seclab-security.com\/en\/#website","url":"https:\/\/www.seclab-security.com\/en\/","name":"Seclab Security","description":"","publisher":{"@id":"https:\/\/www.seclab-security.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.seclab-security.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.seclab-security.com\/en\/#organization","name":"Seclab Security","url":"https:\/\/www.seclab-security.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.seclab-security.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.seclab-security.com\/wp-content\/uploads\/2026\/03\/LOGO-SECLAB-BLACK-1-e1772644859613.png","contentUrl":"https:\/\/www.seclab-security.com\/wp-content\/uploads\/2026\/03\/LOGO-SECLAB-BLACK-1-e1772644859613.png","width":250,"height":46,"caption":"Seclab Security"},"image":{"@id":"https:\/\/www.seclab-security.com\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.seclab-security.com\/en\/wp-json\/wp\/v2\/avada_faq\/3014","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.seclab-security.com\/en\/wp-json\/wp\/v2\/avada_faq"}],"about":[{"href":"https:\/\/www.seclab-security.com\/en\/wp-json\/wp\/v2\/types\/avada_faq"}],"author":[{"embeddable":true,"href":"https:\/\/www.seclab-security.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.seclab-security.com\/en\/wp-json\/wp\/v2\/comments?post=3014"}],"version-history":[{"count":1,"href":"https:\/\/www.seclab-security.com\/en\/wp-json\/wp\/v2\/avada_faq\/3014\/revisions"}],"predecessor-version":[{"id":3015,"href":"https:\/\/www.seclab-security.com\/en\/wp-json\/wp\/v2\/avada_faq\/3014\/revisions\/3015"}],"wp:attachment":[{"href":"https:\/\/www.seclab-security.com\/en\/wp-json\/wp\/v2\/media?parent=3014"}],"wp:term":[{"taxonomy":"faq_category","embeddable":true,"href":"https:\/\/www.seclab-security.com\/en\/wp-json\/wp\/v2\/faq_category?post=3014"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}