homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured

    Get a Free Hour of SANS Training

    Free Course Demos

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured: Solutions for Emerging Risks

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. Cloudy with a Chance of Industrial Cyber Threats, Part 1
DeanParsons_340x340.png
Dean Parsons

Cloudy with a Chance of Industrial Cyber Threats, Part 1

Cloud in ICS/OT can enable scalable data storage, remote monitoring, analytics, disaster recovery, & industrial process control capabilities.

May 13, 2025

I remember the early days of evaluating and piloting cloud in ICS/OT environments—back when I was leading incident response in the electric power sector and helping implement NERC-CIP programs with engineering staff. At the time, we cautiously piloted cloud services for data storage and monitoring. Fast forward to today, and cloud adoption is no longer a side project. It's a growing force in industrial cybersecurity, providing engineering and business case benefits.

But as cloud adoption in ICS/OT accelerates, so do the risks. And it’s important to know that cloud is not for every ICS sector.

What Cloud Means for ICS/OT

Cloud computing in ICS/OT can enable scalable data storage, remote monitoring, analytics, disaster recovery, and even industrial process control capabilities. These benefits are particularly attractive in sectors with geographically distributed assets, like in renewable energy, or where human safety may be a factor. But the move to cloud in ICS is not plug-and-play.

Here's a more depth look at a few common ICS/OT cloud use cases:

  • Remote Monitoring & Telemetry Analysis – Enables real-time performance tracking without requiring on-site staff, reducing cost, travel, and in some cases, physical risk.
  • Cloud-Based Historians – Stores and processes operational data in scalable cloud platforms, with access controls from both IT and ICS/OT networks to support analysis and process improvement.
  • Remote HMIs – Allows operators to securely access interfaces off-premises via cloud-based infrastructure, sometimes region specific.
  • Disaster Recovery – Provides scalable options for backup and continuity in the event of major disruptions or incidents.

There’s no one size fits all solution here. While these capabilities can improve efficiency and flexibility, ICS defenders must evaluate cloud integrations through the lens of safety, security, and reliability. And there’s another internal team that should contribute greatly to this conversation and related evaluations!

Collaboration Between IT and ICS Security

Cloud isn’t new to IT. IT teams have been managing secure cloud infrastructure for years—decades even—managing risks like identity access management, encryption, oversight, and full cloud evaluations before deployment. That’s the right approach.

ICS teams should tap into that experience, but not directly copy-paste IT cloud solutions into industrial environments. ICS systems are engineered for stability and safety—not constant change. Connectivity must be monitored and restricted, especially in human machine interface (HMI)-in the cloud deployment, to protect human safety and operational integrity.

That difference matters even more when considering connectivity to off-site systems and shared infrastructure. And let’s be clear—some critical infrastructure sectors have not and likely will not leverage cloud services, for good reason, including compliance.

ICS Cloud Adoption: What the Data Says

According to the SANS 2024 ICS/OT Survey: The State of ICS/OT Cybersecurity, cloud adoption in ICS/OT is growing—but not without hesitation:

  • 26% of respondents now use cloud technologies in some part of their ICS/OT operations—a 15% increase from previous years.
  • 45% still avoid it—primarily due to concerns around security and reliability.
  • In the energy sector, adoption is just 18%, often due to risk, regulatory uncertainty, and strict uptime requirements.

So, risk awareness is generally strong—as 79% of organizations conduct formal risk assessments before deploying ICS workloads to the cloud. Here are some case trends from 2023 to 2024:

  • Remote telemetry analysis: Up from 40% to 56%
  • Cloud-based HMIs: Up from 22 % to 32% (use caution and prioritize safety)
  • Disaster recovery planning: Up from 22% to 34%
  • Cloud historians for storage: Down slightly from 39% to 35%
  • Connection to Managed Security Service Providers (MSSPs): Down from 33% to 27%

In summary, more engineering teams are using cloud—but selectively and strategically, driven (rightfully so) by safety concerns.

Cloud Risks in ICS/OT

With great power comes great risk. Cloud connectivity introduces:

  • Increased Attack Surface: Cloud connections open new vectors for ransomware, data breaches, and remote compromise that could lead to control system mis-operation.
  • Reliability Risks: Internet outages or cloud service disruptions are likely to introduce instability in systems that demand 24/7 uptime, as we’ve seen over the years impacting IT services.
  • Data Sovereignty and Compliance Issues: Cloud storage can complicate adherence to data residency laws.
  • Legacy Integration Challenges: Older ICS components may lack compatibility with modern cloud services.
  • Vendor Lock-In: Over-reliance on one provider can reduce flexibility and make future migrations difficult, for IT and ICS/OT.

These aren’t theoretical risks—they’re real-world and have been observed. Adversaries know how cloud architectures and how they’re often misconfigured. Cloud requires tailored mitigations, including segmentation, secure remote access, multi-factor authentication, and encryption. Caution should be given again when it comes to compliance and HMI in-the-cloud control capabilities.

How ICS Teams Can Securely Approach Cloud

Here’s what works when considering cloud for operational and safety requirements in ICS/OT. And know that cloud may not suit some critical infrastructure processes or sectors, and that’s ok!

  • Leverage IT cloud expertise, and if cloud is needed for ICS/OT, adapt it for safety-critical environments.
  • Conduct risk assessments that consider physical and cyber implications.
  • Vet cloud vendors for ICS-specific SLAs, visibility, and support capabilities.
  • Evaluate the security posture of cloud instances and how it’s secured for operations.
  • Use defense-in-depth, including secure gateways, network segmentation, and anomaly detection, making sure that during incident response, your data and the security events are available to help determine impacts and next steps.

Above all, prioritize safety and reliability over convenience. This conversation and final decision should be led by the engineering team. The reasons for IT adopting cloud may not be the same justification for ICS/OT adopting cloud.

Final Thoughts

Cloud can transform ICS/OT operations—offering visibility, resilience, storage, processing options and efficiency (for some sectors). But it also introduces risk. The key is safety and industrial grade risk management that should be driven by the engineering side of the organization.

To dive deeper into the intersection between cloud security and ICS, join us in person at the ICS Security Summit for our workshop Navigating OT Connectivity & Security in the Cloud Era. Led by Jeffrey Shearer and Gordon Moreau, this session is perfect for those new to ICS/OT and covers essential considerations for securely connecting OT environments to the cloud. Learn more and register for the Summit here.

More coming in Part 2! Stay tuned!

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tags:
  • Industrial Control Systems Security

Related Content

Blog
ICS_Blog_Building a Better OT Ransomware Response Plan_340 x 340(1).jpg
Industrial Control Systems Security
April 17, 2025
Building a Better OT Ransomware Response Plan: A Simple Framework for ICS Environments
Ransomware isn’t going away in 2025, in fact, it’s getting more efficient, targeted, and disruptive, especially for OT environments.
ICS_Icon_Blue.png
SANS ICS Security
read more
Blog
ICS - Blog - Blog - Cyber Defense Foundations for Pharma & Healthcare_340 x 340.jpg
Industrial Control Systems Security
March 20, 2025
Cyber Defense Foundations for Pharma & Healthcare: Securing ICS/OT in Pharmaceutical Manufacturing & IoT in Healthcare (Part 1)
The pharmaceutical and healthcare industries are undergoing rapid digital transformation.
DeanParsons_340x340.png
Dean Parsons
read more
Blog
Security Awareness, Artificial Intelligence (AI), Digital Forensics, Incident Response & Threat Hunting, Cloud Security, Cyber Defense, Offensive Operations, Pen Testing, and Red Teaming, Industrial Control Systems Security, Open-Source Intelligence (OSINT)
December 10, 2024
Top SANS Summit Talks of 2024
This year, SANS hosted 13 Summits from OSINT, ICS, Ransomware, DFIR to HackFest. Here were the top-rated talks of the year.
No Headshot Available
Alison Kim
read more
  • Company
  • Mission
  • Instructors
  • About
  • FAQ
  • Press
  • Contact Us
  • Careers
  • Policies
  • Training Programs
  • Work Study
  • Academies & Scholarships
  • Public Sector Partnerships
  • Law Enforcement
  • SkillsFuture Singapore
  • Degree Programs
  • Get Involved
  • Join the Community
  • Become an Instructor
  • Become a Sponsor
  • Speak at a Summit
  • Join the CISO Network
  • Award Programs
  • Partner Portal
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
© 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn