When people think about cybersecurity in data centres, attention settles on servers, networks, cloud platforms and identity systems. Yet many of the systems that support uptime sit elsewhere. Cooling infrastructure, building management platforms and other operational systems are just as important to continuity, but often harder to monitor safely and easier to miss in wider planning. Here, Carl Henriksen, CEO at cybersecurity specialist OryxAlign, explains why that visibility gap is becoming a resilience challenge, and how getting it wrong can disrupt operations.
The visibility problem
In many OT environments, the tools used in traditional IT security do not always translate well. Active scanning may be routine in office-based networks, but live operational systems can behave very differently. Probing devices too aggressively or introducing tools that were never designed for these environments can create instability at the point teams are trying to reduce risk.
As the NCSC notes in its OT guidance, organisations should ensure that “any connectivity between their OT environments and their wider enterprise networks or the Internet is managed securely”. It adds that its design principles are intended to help architects and designers produce “secure and resilient systems”.
In a data centre, that matters because resilience depends on the digital stack and the systems that support it. Cooling systems and building controls keep services available. If one of those systems is disrupted or compromised, the effect can spread quickly. The issue is not only whether teams can see a threat once it becomes obvious, but whether they can understand what is connected and where unusual behaviour may be developing early enough to act.
This is where OT often becomes a blind spot. Many environments contain ageing infrastructure, proprietary protocols and systems on shared networks. Others may be so sensitive that even well-intentioned interrogation carries operational risk. As a result, security teams can find themselves caught between two poor options: accept limited visibility, or attempt deeper inspection in ways that may disrupt services.
As NIST says in its Guide to Operational Technology Security, OT security needs to address “unique performance, reliability, and safety requirements”, which is one reason conventional IT-style approaches need to be used carefully in live operational settings.
The case for passive monitoring
Neither limited visibility nor deeper inspection is ideal in a live data centre environment, where availability is always the overriding concern. Passive monitoring is a more practical route, allowing teams to observe traffic and behaviour without placing extra strain on fragile systems, helping operators build a clearer picture of the operational estate while reducing the chance of avoidable disruption.
It also works best when supported by good network design. If operational systems are grouped logically and separated from wider IT traffic, it becomes easier to understand communication patterns and contain issues before they spread. If TAP or SPAN connections are considered early rather than added later, organisations are in a stronger position to monitor environments safely over time.
Looking beyond the white space
The broader point is that visibility in OT cannot be treated as something to bolt on later. In data centres, supporting infrastructure is part of the environment that keeps services running and should be considered with the same seriousness as the systems that process and store data. If cyber resilience strategies focus only on the most obvious digital assets, they risk missing the operational layer that underpins uptime.
The challenge is not to add more security tooling, but to make sure the right kind of visibility exists in the right places, using approaches that reflect how these environments actually work. That means understanding which systems are too sensitive for conventional scanning, where passive monitoring will be more effective and how network architecture can support safer oversight.
Data centre resilience depends on control as much as capacity. Without clear visibility into the operational systems behind the white space, organisations may be protecting the front of house while leaving an important part of the environment exposed.
To find out more about how to improve visibility across operational environments without compromising resilience, visit https://www.oryxalign.com.
Ends: 670 words
For further information contact: Rachel Potter
Email: rachel.potter@oryxalign.com
Address: Oryx Align Ltd, 77 Cornhill, London EC3V 3QQ
Telephone: +44 207 605 7890
www: https://www.oryxalign.com
LinkedIn: https://www.linkedin.com/company/oryx-align-limited
Blog: https://www.oryxalign.com/blog/
Press enquiries: Georgiana Marian or Philip Taylor – Stone Junction Ltd
Suites 1&2 The Malthouse, Water Street, Stafford, Staffordshire, ST16 2AG
Telephone: +44 (0) 1785 225416
e-mail: Georgiana@stonejunction.co.uk or PhilT@stonejunction.co.uk
www: www.stonejunction.co.uk
Twitter: www.twitter.com/StoneJunctionPR
Facebook: http://www.facebook.com/technicalPR
LinkedIn: http://uk.linkedin.com/in/technicalpragency
About OryxAlign:
OryxAlign creates true alignment that delivers the right outcomes for all. By listening closely, adjusting along the way, and delivering to the highest standards, we align our clients’ ambitions with the technology they need to achieve them.
We deliver critical network services, managed cyber security and cloud transformation and consulting services. At our core lies an enduring commitment to excellence—across every aspect of our work, from designing and managing enterprise networks to implementing cybersecurity platforms and advanced cloud technologies.
We believe ambitious organisations should be empowered by great technology—technology that transforms operations, mitigates risk, and propels businesses forward with maximum momentum.
Technology. Powered by people.