The OT and critical infrastructure incidents we witnessed throughout 2025 showed, with unusual clarity, where attackers are aiming and how they are gaining entry. Yet the year’s global OT security reports exposed a deeper, more structural reality: even as regulations mature and technologies advance, the foundations of OT security remain unchanged — and so do the risks.
Across industries and regions, the reports point to the same conclusion: the weaknesses holding OT security back are not hidden in advanced exploits or unknown vulnerabilities, but in the way organisations manage users, devices, accounts, supply chains, and operational structures.
The reports make one point repeatedly: attacks are not becoming more sophisticated — they are becoming more predictable. The same familiar entry paths continue to be abused, and those paths lie not in the heart of OT systems, but around the operational perimeter.
The 2025 reports consistently highlight that the first point of compromise is rarely the network itself, but rather user accounts and endpoints. The most frequently exploited areas include:
The reports emphasise that attacks are not succeeding because they are complex, but because unmanaged users, devices, and accounts continue to expand the attack surface.
In other words, the first fracture in OT security does not appear in the network core — it starts at the user and the endpoint.
In 2025, regulatory pressure increased significantly — from the EU NIS2 Directive to updates in international standard IEC 62443, alongside enhanced national frameworks across multiple countries. Yet the reports agree on a shared assessment: while organisations have become far better at preparing documents and ticking compliance checklists, operational resilience on the ground has barely moved.
Key observations include:
The overall takeaway: regulatory compliance has improved, but operational resilience has not.
A recurring theme across the reports is the lack of a robust mechanism to establish trust in endpoints across OT environments.
Common structural issues include:
Reports frame these not as purely technical limitations, but as structural constraints of OT environments.
Without stable endpoint trust, no defensive layer can be relied upon to function consistently.
Supply chain pathways were one of the most heavily scrutinised weaknesses in the 2025 reports. A significant proportion of initial access attempts originated from supplier accounts and devices.
Key patterns include:
Reports describe supply chain account and access management as the longest-standing unresolved issue — and the most clearly exposed structural risk of 2025.
Many reports point out that OT security architectures still fail to place users, accounts, and devices at the centre of their design. While policies emphasise their importance, real-world implementation often treats them as add-on controls.
The reports highlight recurring issues such as:
The conclusion is clear: unless users, accounts, and devices take a central role in the architecture, structural weaknesses will continue to resurface.
If the incidents of 2025 showed how far attackers reached, the global reports explain why they could do so with such ease.
The recurring message is straightforward: the core weaknesses in OT security lie not in technology, but in operational structures and the way users, devices, and accounts are governed.
And the final conclusion can be summarised in one line:
“The inside of OT may be carefully protected — but the doors leading into it still open far too easily.”
--------------------
swIDch will continue its quest to innovate and pioneer next-generation authentication solutions. To stay up-to-date with the latest trends sign up to our newsletter and check out our latest solutions.