Access control is a key aspect of OT security that ensures only authorized users, devices, or protocols can access specific resources. It protects the system by setting up strict permissions and monitoring access activities.
Access control involves:
The main goal is to enforce strict boundaries, ensuring that only the right people or systems have access to critical infrastructure.
RBAC is a system where permissions are assigned based on the roles of users. It helps ensure that every individual has only the access needed to perform their duties.
Role Definition:
Least Privilege Principle:
Device authentication ensures that only verified devices can connect to the network.
MAC Address Binding:
Digital Certificates:
Remote access is often necessary for maintenance and troubleshooting, but it needs to be carefully secured.
Virtual Private Networks (VPNs):
Multi-Factor Authentication (MFA):
Access logs provide a detailed record of who accessed what and when.
Logging User and Device Activities:
Audit Trails:
Access control is a foundational element of OT security. By using RBAC, authenticating devices, securing remote access, and maintaining detailed access logs, you can ensure that only authorized users and devices interact with critical systems. Tools like FortiGate and FortiAuthenticator make it easier to enforce these controls effectively.
Access control in OT networks should be context-aware and zone-oriented, particularly when aligned with the ISA-95 or Purdue model commonly used in industrial environments.
OT networks are typically segmented into the following levels:
This approach is fundamental to Zero Trust Architecture and is often tested in Fortinet scenario questions.
OT networks rely on industrial protocols such as Modbus, DNP3, and BACnet—most of which lack native encryption or authentication. Therefore, fine-grained control at the protocol level is essential.
Access Control is most effective when integrated into a larger security response ecosystem. Fortinet systems are designed to automate response actions based on access control violations.
Access Control is not a static filter—it is the first layer of proactive defense that, when integrated with monitoring and SIEM tools, forms a complete response loop capable of detecting, reacting, and containing threats in real time.
Why is 802.1X authentication difficult to implement on many OT devices?
Many OT devices lack 802.1X supplicant support, making standard authentication impossible.
802.1X requires the endpoint device to run a supplicant that communicates with an authentication server such as RADIUS. However, many industrial devices like PLCs, sensors, and controllers run specialized firmware with limited networking capabilities. These devices often cannot support authentication protocols or software updates needed for 802.1X. As a result, alternative access control methods must be used in OT environments. These may include MAC authentication bypass (MAB), device profiling, or NAC policies based on device fingerprinting. FortiNAC commonly uses these approaches to authenticate devices that cannot participate in traditional authentication workflows.
Demand Score: 85
Exam Relevance Score: 88
What is MAC Authentication Bypass (MAB) and why is it used in OT environments?
MAB allows network access to devices that cannot perform 802.1X authentication by using their MAC address for identification.
When a device connects to a switch port, the network device sends the MAC address to the authentication server for verification. If the MAC address exists in an authorized database, the device is granted access to the network. MAB is widely used in OT networks because many industrial devices cannot run authentication software. Although it is less secure than 802.1X, combining MAB with device profiling and network segmentation can significantly improve security. For example, a PLC may be allowed access only to a specific VLAN and limited communication paths.
Demand Score: 80
Exam Relevance Score: 86
How does FortiNAC enforce access control after identifying an OT device?
FortiNAC dynamically assigns network access policies such as VLAN changes, quarantine, or restricted access.
After discovering and profiling a device, FortiNAC can instruct network infrastructure devices like switches to apply specific policies. These may include assigning the device to a restricted VLAN, limiting communication paths, or isolating suspicious devices. The policy decision is based on device type, security posture, and predefined rules. This automated enforcement helps reduce manual configuration errors and allows rapid response to unauthorized devices appearing in the network.
Demand Score: 78
Exam Relevance Score: 84
Why is device profiling important for OT access control?
Device profiling helps identify device type and behavior, enabling appropriate access policies.
Profiling analyzes characteristics such as MAC vendor information, communication protocols, and traffic patterns to determine the type of device connected to the network. In OT environments, this allows security systems to distinguish between PLCs, engineering workstations, and sensors. Once identified, each category can be assigned specific security policies. For example, engineering workstations may access multiple controllers while sensors may communicate only with a single server. Profiling improves both visibility and policy accuracy.
Demand Score: 76
Exam Relevance Score: 82