# Empty Attestations: OT Lacks the Tools for Cryptographic Readiness
Operational Technology (OT) environments face a critical vulnerability: many lack adequate tools to verify cryptographic implementations and ensure systems can withstand modern threats. As organizations rush to implement post-quantum cryptography and strengthen their security posture, a fundamental gap has emerged—the absence of robust attestation mechanisms to validate cryptographic readiness across industrial control systems, utilities, and critical infrastructure.
## The Core Problem
Cryptographic attestation—the ability to prove that a system has implemented cryptographic protections correctly—remains poorly supported in legacy and modern OT systems alike. Unlike information technology (IT) environments where hardware security modules (HSMs), Trusted Platform Modules (TPMs), and software attestation tools are commonplace, OT systems often operate without comparable verification mechanisms.
"Empty attestations" describes a dangerous scenario: systems may claim to have cryptographic capabilities, but organizations lack the tools to independently verify these claims. A control system might report that encryption is enabled, yet no mechanism exists to confirm:
This verification gap leaves critical infrastructure exposed to attacks that compromise systems despite claimed security implementations.
## Why OT Cryptographic Readiness Matters
Operational Technology powers the systems that keep society running: electric grids, water treatment facilities, manufacturing plants, transportation networks, and healthcare delivery. Unlike IT systems designed for frequent updates and rapid security patches, OT environments prioritize availability and safety over agility—meaning systems often remain operational for decades with minimal changes.
The transition to post-quantum cryptography adds urgency. Adversaries employing quantum computing or quantum-resistant algorithms could:
Yet many OT operators cannot answer a basic question: *Is our cryptographic implementation actually secure?*
## The Technical Gap
Traditional IT attestation mechanisms don't translate cleanly to OT:
| Challenge | IT Approach | OT Reality |
|-----------|-------------|-----------|
| Update Frequency | Regular patches, firmware updates | Systems run unchanged for 10-20+ years |
| Hardware Diversity | Standardized x86/ARM architectures | Embedded systems, proprietary hardware, legacy chipsets |
| Tool Availability | Commercial HSMs, TPM 2.0 widespread | Minimal or no attestation hardware |
| Computational Overhead | Can absorb cryptographic overhead | Resource-constrained embedded systems |
| Vendor Support | Security updates standard practice | Many vendors no longer support legacy systems |
OT systems often run cryptographic implementations on hardware that predates modern attestation standards. A 15-year-old industrial controller running custom encryption cannot be audited with contemporary tools designed for modern processors.
## Real-World Implications
Critical Infrastructure at Risk: Without attestation, utilities cannot verify that SCADA systems, RTUs (Remote Terminal Units), or PLCs (Programmable Logic Controllers) implement cryptography correctly. An attacker who compromises encryption could:
Compliance Challenges: Regulatory frameworks (NERC CIP for utilities, IEC 62443 for industrial automation) increasingly require cryptographic controls. Yet organizations cannot fully demonstrate compliance without attestation—creating a gap between claimed security and verifiable security.
Supply Chain Vulnerability: Manufacturers of OT components could inadvertently ship systems with weak cryptographic implementations, or malicious actors could introduce backdoors. Without attestation mechanisms, these vulnerabilities propagate undetected across industrial networks.
## Why Attestation Tools Are Scarce
Several factors explain why OT lacks robust attestation infrastructure:
1. Market Fragmentation: OT equipment comes from hundreds of vendors using proprietary architectures. No single attestation standard covers all devices.
2. Legacy System Economics: Organizations cannot afford to replace perfectly functional systems. Security vendors focus on modern IT platforms with larger customer bases.
3. Security Through Obscurity Mindset: Historically, many OT environments relied on air-gapping and isolation rather than cryptographic verification. This posture created little demand for attestation tools.
4. Regulatory Lag: Standards bodies move slowly. Post-quantum cryptography standards are still stabilizing; OT-specific attestation standards lag even further behind.
5. Performance Constraints: Attestation mechanisms add computational overhead. Resource-constrained OT devices cannot absorb additional crypto operations.
## Recommendations for Organizations
For OT Operators and Integrators:
- Regular independent security assessments
- Network-level monitoring for anomalous traffic patterns
- Cryptographic agility—systems capable of switching algorithms if current implementations are compromised
- Hardware security modules (HSMs) for key storage when feasible
- Clear documentation of cryptographic implementations
- Mechanisms for external verification (even if not formal attestation)
- Upgrade paths for systems to support modern attestation standards
For Vendors and Manufacturers:
For Policymakers and Standards Bodies:
## The Path Forward
The cryptographic readiness crisis in OT cannot be solved by IT security tools alone. Organizations cannot wait for perfect attestation solutions to emerge—the threat landscape is evolving faster than standards bodies can respond.
Immediate actions matter: Inventory cryptographic implementations, identify blind spots, and implement compensating controls. Simultaneously, push vendors to provide transparency and verifiability, even if formal attestation mechanisms don't yet exist.
Post-quantum cryptography will not solve OT security challenges if organizations cannot verify that implementations actually work. Filling the attestation gap is as urgent as deploying quantum-resistant algorithms themselves. Until OT systems can prove their cryptographic readiness, critical infrastructure remains vulnerable to sophisticated adversaries who know exactly what protections they're circumventing.