Dec 14 • Steve Smith

The Danger of Stove Piping: How Isolated Cybersecurity Efforts Can Put Your Organization at Risk

Stove piping cybersecurity efforts within organizations can create gaps in security, leaving systems vulnerable to cyber and physical threats. Learn how to break down silos, foster collaboration between IT and OT teams, and build more resilient security strategies to protect your critical assets.

The Danger of “Stove Piping” Cybersecurity Efforts Within Organizations: A Critical Security Issue

In today’s digital age, cybersecurity is no longer a mere IT concern—it has become a critical part of every organization’s strategy, influencing everything from governance to mission-critical operations. However, despite increasing awareness of cybersecurity’s importance, many organizations continue to face a significant problem: “stove piping.” This term refers to isolating cybersecurity activities within different departments or systems, where they are not integrated into broader organizational processes like governance, mission, systems engineering, and acquisition. As a result, organizations can be left with serious gaps in their security strategies, exposing themselves to significant threats and vulnerabilities.

One of the key lessons learned over decades of work in the National Institute of Standards and Technology (NIST) Systems Security Engineering Project is the danger of stove piping cybersecurity efforts. When cybersecurity activities are siloed, they create inefficiencies, blind spots, and a lack of coordination, all of which can have severe consequences for an organization’s overall security posture. In this blog post, we will delve into the dangers of stove piping, the impact it has on cybersecurity, and how organizations can overcome this issue to build more integrated, resilient security systems.

What Is Stove Piping in Cybersecurity?

“Stove piping” in cybersecurity refers to the practice of isolating cybersecurity functions within specific organizational silos, without integrating them into the broader decision-making or operational processes. This lack of integration results in fragmented security strategies that fail to consider the interconnections between various departments, systems, and technologies.

Cybersecurity stove piping often occurs when IT and operational technology (OT) teams are not aligned, leading to the absence of collaboration in securing both IT and OT environments. It can also manifest when network security teams do not work closely with engineering, operations, or other mission-critical departments to ensure comprehensive protection.

As organizations grow more complex and rely on interconnected systems, stove piping becomes an increasingly problematic issue. Systems are no longer isolated, and threats are not confined to specific areas of operations. A siloed approach to cybersecurity makes it difficult to achieve a holistic defense strategy that can protect against modern threats.

The Danger of Stove Piping: The Consequences of Isolation

While stove piping may seem like a minor organizational issue, it has serious consequences for an organization's overall security. Let’s take a look at some of the most significant risks associated with this approach:

1. Security Gaps and Blind Spots

When cybersecurity activities are isolated, there is often a lack of visibility and communication between teams responsible for securing different parts of an organization’s systems. For example, IT security teams may not have full insight into the risks associated with operational technology (OT) systems, and vice versa. This can lead to critical security gaps that adversaries can exploit. Blind spots in security monitoring can leave systems vulnerable to attack.

2. Increased Vulnerability to Cyber and Physical Threats

As cyber and physical systems converge, stove piping becomes even more dangerous. Threats that previously existed in isolation can now easily cross over from one system to another. For instance, vulnerabilities in an OT system could be exploited by cyberattacks targeting the IT network. Without integrated strategies and cooperation between teams, these risks may not be adequately addressed.

3. Delayed Response to Cyber Incidents

In a stove-piped organization, the lack of communication between different departments can cause delays in responding to cyber incidents. When cybersecurity teams are isolated from operational units, they may not be aware of critical events that need immediate attention, resulting in slower response times and more severe consequences for the organization.

4. Lack of Coordination in Protecting Critical Infrastructure

In sectors such as energy, healthcare, and manufacturing, where OT and IT systems are highly integrated, stove piping can be disastrous. Failing to coordinate cybersecurity efforts across both domains can leave critical infrastructure exposed to threats. A cyberattack on a manufacturing facility’s OT system, for example, could disrupt operations, damage equipment, and cause safety hazards.

Key Takeaways: Overcoming Stove Piping in Cybersecurity

So, how can organizations prevent stove piping and build more robust, integrated cybersecurity strategies? Here are the key recommendations for overcoming this issue:

1. Clarify the Difference Between IT and OT

One of the first steps in addressing stove piping is understanding the key differences between IT and OT. Cybersecurity professionals need to recognize that the risks and needs of OT systems are distinct from those of IT systems. However, both must be protected in parallel, and the differences between them need to be communicated clearly across departments. This clarity helps teams understand their specific responsibilities and how their efforts align with overall organizational security.

2. Integrate IT and OT Security

It’s essential that IT and OT teams work together to create cohesive security strategies. Both must coordinate and plan to protect both IT and OT environments. This requires clear communication, cross-training, and shared responsibility for security. Security measures should be implemented in tandem for both types of systems, ensuring that no part of the organization is left vulnerable.

3. Coordinate Network Security with Engineering and Operations

When dealing with OT systems, it’s crucial for network security teams to coordinate closely with engineering and operations. The connection between OT and IT should be carefully monitored, and security tools should be tested for compatibility within the OT environment. Cybersecurity tools that have not been thoroughly vetted for OT use should be avoided to prevent unintended disruptions or vulnerabilities.

4. Joint Responsibility for Cross-Training and Communication

Cybersecurity cannot be siloed within individual teams. IT, OT, engineering, and operations should all bear joint responsibility for cross-training, communication, and shared ownership of security. By promoting a culture of collaboration, organizations can ensure that all teams are equipped to recognize and respond to potential security threats.

5. Consider Both Cyber and Physical Threats

Organizations must recognize that modern cybersecurity threats don’t just come from the digital world—they can also be physical. As cyber and physical systems converge, it’s essential for security strategies to account for both types of threats. Integrated teams should collaborate on protecting both physical infrastructure and digital assets to reduce vulnerabilities.

6. Don’t Overlook the “Gray Areas” of Cyber Events

In many cases, it’s not always clear whether an incident qualifies as a cyber event or a control system cyber incident. Organizations must have protocols in place to quickly assess and respond to incidents that may span both IT and OT domains. Clear incident response procedures should be developed to address these gray areas and ensure timely action is taken.

Building Secure and Resilient Systems: A Systems Engineering Approach

As systems become more complex and interconnected, a systems engineering perspective is essential for effective cybersecurity. This perspective helps organizations integrate security efforts into the entire lifecycle of systems—from design and engineering to operation and maintenance.

By adopting a systems engineering approach to cybersecurity, organizations can ensure that their security strategies are robust, resilient, and adaptable to evolving threats. This holistic view is especially critical for organizations developing cyber-physical systems, where the convergence of IT and OT introduces unique challenges that must be addressed comprehensively.

Conclusion: The Importance of Integrated Cybersecurity

Stove piping cybersecurity efforts within organizations is a dangerous practice that can lead to security gaps, delayed responses to incidents, and increased vulnerabilities to cyber and physical threats. As cyber and physical systems converge, organizations must integrate their cybersecurity strategies to ensure they protect both IT and OT environments. By fostering collaboration between teams, clarifying roles, and adopting a systems engineering perspective, organizations can build more secure, resilient systems that can withstand modern threats.

Cybersecurity is a shared responsibility across all departments, and when organizations work together, they can build defense strategies that are stronger, more efficient, and better equipped to handle the complexities of today’s interconnected world. The key to success is integration—not isolation