Why OT Security in Energy Is Different From IT Security
The core challenge of securing operational technology (OT) systems in the energy sector is that the primary engineering goal is continuous uptime, not security. A SCADA (Supervisory Control and Data Acquisition) system controlling a gas compressor station, a power substation, or an oil pipeline was designed to maximize availability across decades of operation. Traditional IT security controls — frequent patching, endpoint detection agents, network segmentation rewrites — can disrupt operations in ways that are operationally unacceptable.
This mismatch between IT-era security assumptions and OT operational reality has made industrial control systems (ICS) in the energy sector a persistent high-value target globally. Positive Technologies’ analysis of cybersecurity threats across African countries documents that malware deployment accounts for 43% of attacks on African organizations — with energy as a designated critical infrastructure sector. The same analysis identifies government organizations and financial institutions as the top African targets, with energy infrastructure as a growing area of concern as digital-physical integration accelerates.
The 2026 threat escalation factor is AI-assisted attack tooling. Threat actors are now using machine learning to automate vulnerability scanning of industrial protocols (Modbus, DNP3, IEC 61850), reduce the expertise required to develop exploits for legacy SCADA software, and accelerate the lateral movement phase between IT networks and connected OT environments. This does not mean every threat actor has AI capabilities — but it does mean the floor on attack sophistication has dropped significantly, expanding the range of actors capable of targeting energy OT infrastructure.
Algeria’s energy sector, which includes oil and gas production, refining, electricity generation, and national grid infrastructure, is now operating under Presidential Decree 26-07. The decree designates energy as a critical infrastructure sector and mandates security audits, incident reporting to ASSI, and business continuity requirements. The national cybersecurity strategy analysis for 2025–2029 confirms that ASSI is the technical and operational execution arm for these requirements — handling incident response and product certification for high-risk industrial environments.
Advertisement
A Five-Pillar OT Hardening Framework for Algeria’s Energy Operators
The global reference standard for industrial control system security is IEC 62443, a series of standards maintained by the International Electrotechnical Commission. It provides a risk-based framework for securing industrial automation and control systems (IACS) that is both technically rigorous and operationally realistic — it was designed by engineers who understand that you cannot patch a control system during production cycles without consequences. The five pillars below map Algeria’s Decree 26-07 requirements to the IEC 62443 framework in a way that is actionable for energy sector security and operations teams.
1. Conduct an IEC 62443 Asset Inventory and Zone Classification
You cannot protect what you cannot see. The first action for any OT security hardening program is a complete asset inventory: every programmable logic controller (PLC), remote terminal unit (RTU), human-machine interface (HMI), historian, and SCADA server on the operational network. In most energy facilities built before 2015, this inventory does not exist in documented, current form — it lives in engineering drawings that predate current installations, in the heads of senior operators, or in the output logs of systems that were never designed to produce security-relevant data.
IEC 62443 Zone and Conduit modeling provides the structural framework for this inventory. The core concept is grouping assets into security zones based on their criticality and exposure, then defining the conduits (data flows) between zones. This model makes it possible to apply security controls proportionately — maximum protection around safety instrumented systems (SIS) and primary control loops, lighter controls around historian servers, no OT-IT direct connections without defined and monitored conduits.
For energy operators in Algeria who are beginning this process, the most practical starting point is a passive network monitoring deployment: tools that listen to industrial protocol traffic without injecting any packets, building an asset inventory from observed communications without any risk of operational disruption. This approach is endorsed by CISA (the US Cybersecurity and Infrastructure Security Agency) and by industrial vendors including Dragos, Nozomi Networks, and Forescout for initial OT environment discovery. It provides a documented baseline that satisfies the ASSI audit requirement for a current asset inventory.
2. Implement Network Segmentation with Industrial-Grade Firewalls
Once the asset inventory and zone model is complete, the critical architectural action is physical network segmentation. The most dangerous configuration in any energy OT environment is a flat network where IT systems (email, ERP, business intelligence) have direct routed access to OT systems (SCADA, DCS, PLC networks). This configuration — which remains common in facilities where IT and OT were integrated for cost efficiency — is the primary enabler of the IT-to-OT lateral movement that characterizes sophisticated attacks on energy infrastructure globally.
CMS Law’s Algeria regulatory guide confirms that Algeria’s regulatory framework requires “infrastructure security measures (physical and logical).” Physical network segmentation — implemented with industrial-grade firewalls (Fortinet FortiGate Industrial, Palo Alto PA-Series) capable of parsing industrial protocols — satisfies the logical isolation requirement while maintaining the operational data flows that energy facilities depend on.
The critical implementation principle: segmentation must be done without breaking historian replication, remote access for vendor maintenance, or supervisory visibility. Any segmentation approach that creates operational blind spots or forces manual data entry will be routed around by operations staff within weeks. The firewall configuration must enforce bidirectional traffic rules that allow only the specific protocol-port-direction combinations that operations actually uses — a process that requires joint definition by IT security, OT engineering, and operations management.
3. Establish Remote Access Controls That Vendors Must Use
One of the most underestimated OT security risks in Algeria’s energy sector is third-party remote access. SCADA vendors, engineering firms, and automation integrators typically require remote access to industrial systems for maintenance, firmware updates, and troubleshooting. This access is often configured as persistent VPN tunnels or open desktop-sharing sessions — the vendor equivalent of leaving a door unlocked indefinitely for convenience.
The IEC 62443 requirement for supply chain security mandates that organizations conduct supplier security assessments and include cybersecurity clauses in ICT vendor contracts — an obligation explicitly captured in Decree 26-07’s all-organizations requirements. For OT environments, this translates to: no persistent remote access sessions; session-based access through a PAM (Privileged Access Management) solution with session recording; vendor access scoped to specific assets only; and automatic session termination on disconnection.
The global benchmark for this control is the industrial remote access platforms — tools like Dragos xDome Remote Access or Zscaler Private Access configured for OT — that provide vendor-specific credentials, session recording for audit purposes, and integration with ASSI’s incident reporting workflow. Implementing PAM for vendor access is also the most direct response to the SAMENA Council’s documentation of Algeria’s incident response mandate: if an incident originates from a vendor session, session recordings provide the forensic chain of custody that ASSI requires for post-incident analysis.
4. Develop an OT-Specific Incident Response Plan for ASSI Reporting
Most energy operators in Algeria have IT incident response plans. Very few have OT-specific incident response plans — and the two are fundamentally different. In IT security, the first response to a ransomware attack is isolation: cut the infected machine from the network immediately. In OT security, isolation of a SCADA server may cause loss of visibility into a production process — which can itself trigger safety system activations or manual shutdown procedures with significant operational and financial consequences.
An OT-specific incident response plan must: define the operational impact threshold for isolation decisions (at what point do security considerations override operational continuity?); assign OT-specific roles (not IT incident responders, but operations engineers trained in security response); document the DZ-CERT reporting procedure and ASSI notification timeline required under Decree 26-07; and include a pre-approved communication template for notifying facility management and relevant authorities without breaching incident confidentiality.
The IEC 62443 framework calls this the “Response and Recovery” zone of the security management system. For energy facilities, the most important preparatory action is a tabletop exercise that simulates an IT-to-OT intrusion scenario — not to test whether staff can stop the attack (often they cannot on first encounter) but to test whether they can contain it without triggering a production shutdown, report it correctly, and restore systems in the correct sequence.
5. Align OT Procurement With ASSI-Approved Security Requirements
New OT equipment purchases — whether PLCs, RTUs, safety controllers, or SCADA software — must now be evaluated against security criteria, not just functional and price criteria. Decree 26-07 requires organizations to “comply with approved cybersecurity products for high-risk applications” and to conduct supplier security assessments. This creates a procurement gate that most Algerian energy sector procurement processes currently do not have.
The practical implementation is a vendor security questionnaire aligned with IEC 62443 Part 2-4 (requirements for IACS service providers) and IEC 62443 Part 4-1 (product security development lifecycle requirements). Vendors who cannot demonstrate compliance with these standards should be deprioritized for new OT infrastructure investment — regardless of unit price or incumbent relationship — because the remediation cost of integrating insecure OT equipment into a hardened environment over a 15 to 20 year asset lifecycle will significantly exceed the procurement cost difference.
The Compliance and Operational Case Align
The most important insight for Algeria’s energy sector security leadership is that Decree 26-07 compliance and operational excellence are not in tension. An OT environment with a documented asset inventory, network segmentation, controlled vendor access, tested incident response, and secure procurement practices is also a more reliable, lower-downtime environment. The hardening actions above improve operational visibility — operators know what is on their network — and reduce the risk of unplanned outages from both security incidents and from engineering errors that go undetected in undocumented environments.
Algeria’s cybersecurity strategy frames critical infrastructure protection as a strategic national security priority, with ASSI as the coordinating body for sector-specific implementation guidance. Energy operators who begin the IEC 62443 alignment process now — starting with the passive asset inventory and zone mapping — will have the documented baseline that ASSI auditors will expect, and will be positioned to respond to the next wave of sector-specific guidance as the strategy’s implementation advances through 2026 and 2027.
Frequently Asked Questions
What does Presidential Decree 26-07 specifically require from Algeria’s energy sector organizations?
Decree 26-07 requires energy sector organizations — designated as critical infrastructure — to establish dedicated cybersecurity units, appoint qualified CISOs, conduct ASSI-accredited security audits on a defined schedule, report significant incidents to ASSI and DZ-CERT immediately, and implement business continuity and disaster recovery plans. Vendor contracts must include cybersecurity clauses and all high-risk applications must use ASSI-approved security products.
Why can’t standard IT security tools be used directly on OT/SCADA networks?
Industrial control systems operate on specialized protocols (Modbus, DNP3, IEC 61850) that standard IT security tools do not understand and can disrupt. Active scanning tools that work safely on IT networks can crash PLCs or RTUs when they probe industrial protocol ports. OT-specific passive monitoring tools — from vendors like Dragos, Nozomi Networks, or Dragos — observe network traffic without injecting packets, allowing asset discovery and threat detection without any operational risk.
What is IEC 62443 and why is it the reference standard for energy OT security?
IEC 62443 is an international series of standards for securing industrial automation and control systems (IACS), maintained by the International Electrotechnical Commission. Unlike generic IT security frameworks, IEC 62443 was designed by engineers who understand OT operational constraints — it provides a zone-based risk model, security lifecycle requirements for OT vendors, and implementation guidance that respects production uptime priorities. It is the reference standard for oil and gas OT security programs globally.
—















