
2026-02-03
In this episode of #KEYMASTER, Sven Rajala, International PKI Man of Mystery, is joined by Guillaume Crinon, Director of IoT Business Strategy, to explore how certificates and PKI are used in Operational Technology (OT) environments, and why this world looks very different from traditional IT.
OT security is not about patching fast or deploying the latest tools. It is about keeping critical processes running safely, reliably, and continuously, often for decades.
Operational Technology environments prioritize availability and safety above all else. These systems control physical processes, manufacturing lines, robotics, energy infrastructure, where downtime or malfunction can cause real-world damage or safety risks.
As a result:
This mindset shapes how certificates and PKI are adopted in OT.
Historically, OT environments relied heavily on physical isolation. Machines were enclosed inside factories, disconnected from external networks, and protected by physical access controls.
That model no longer holds. With Industry 4.0, machines now routinely communicate with:
As soon as machines communicate outside the factory floor, they need:
And that is where certificates come in.
Today, many industrial components and machines are manufactured with X.509 certificates embedded at production time. These certificates often serve as:
This initial certificate allows a machine or component to be enrolled into a factory environment and to establish secure connections using TLS.
Modern OT protocols increasingly support certificate-based security, including:
The tooling exists. Manufacturers are embedding certificates. The expectation is clear: customers should be using them.
Read more:
Certificates in OT are not limited to authentication. They are also used to:
Code and firmware signing, in particular, is critical. When an update is delivered to a machine, the device must be able to verify that it came from the legitimate manufacturer.
Despite good intentions, many OT environments struggle with PKI best practices. A common pattern looks like this:
The result is an environment filled with self-signed certificates that impersonate as real security instead of enforcing it, creating operational complexity and hidden risk.
Two major forces are driving better practices:
The direction is clear, but adoption may take time.
Read more:
For many OT engineers, PKI itself is not the goal. What they need is:
This is where Certificate Lifecycle Management (CLM) becomes critical.
CLM tools can:
By scripting and automating tasks that would otherwise be manual and error-prone, CLM acts as a bridge between IT security practices and OT operational realities.
OT security is evolving, not by copying IT practices, but by adapting them to a world where systems must run safely for decades. Certificates and PKI are becoming foundational, and CLM is what makes them practical.

