Back to Resources
Field Note February 2026 7 min read

Vendor Remote Access Is the Backdoor You Forgot You Have

Integrators, OEMs, and equipment vendors need to reach your plant. The way most facilities grant that access would fail a basic security review — and often does.

C

Cascadia OT Security

OT & ICS Security

VENDORINTEGRATORFACILITYOPERATORASSETRISK · HIGHRISK · HIGHRISK · HIGHRISK · MEDRISK · LOWSUPPLY CHAIN5 HANDOFFS

Every OT environment we assess has vendor remote access. Every one. Integrators need to troubleshoot. OEMs need to update firmware. Equipment vendors need to pull diagnostics. It is operationally unavoidable.

It is also, across the facilities we have reviewed, the single most common contributing factor to OT incidents. In our 2025 engagement data, 34% of intrusions involved vendor remote access as an initial or contributing vector.

What we actually find

A typical list of vendor remote-access pathways at a mid-size facility, as we discover them in discovery:

Usually, the facility's documentation lists two of these. The other four surface during discovery.

The common failure modes

What good vendor remote access looks like

Four properties, all simultaneously:

Implementing this requires specific tooling — there are several vendor-privileged-access products that do this well — and process work with each integrator to transition them to the new model. The operational lift is moderate. The risk reduction is substantial.

The conversation with your integrator

If you raise vendor remote access with your integrator and they resist, pay close attention. Integrators who push back on jump-host architecture, MFA, or per-person credentials are revealing something about their operational maturity. Those are the integrators you want to supervise most closely.

Most integrators, in our experience, are glad to move to a more structured model. The ones that existed before the modern approach adopted it grudgingly. The ones that started after have never operated any other way.

The takeaway

Inventory your vendor remote-access pathways. All of them. Then rationalize them down to a single auditable channel. This is one of the highest-leverage projects any OT-operating facility can undertake, and the return is measurable in risk reduction.

We do this kind of work.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call