IT and facility teams are often misaligned when it comes to cybersecurity. Managers may think their facility is secure if operational technology (OT) systems are patched and “air-gapped”, but risks from remote access and third-party attacks are often overlooked. Higher levels of OT security may help but may also restrict essential access to equipment.
European regulators are now enforcing better cybersecurity. The Digital Operational Resilience Act (DORA) and Network and Information Security 2 (NIS 2) require organizations to implement best practices and report on incidents and threats. DORA relates to financial services resiliency (see Will legislation change how finance uses public cloud?); NIS 2 relates to cybersecurity specifically. Both regulations require management of third-party risk — and both bear the threat of severe fines and management penalties. However, currently, only 12% of operators utilize or conform to NIS 2 (Uptime Institute Data Center Security Survey 2024).
Most EU member states should have transposed NIS 2 into national law by October 17, 2024. This year (2025) will be a critical year for compliance, and organizations must have implemented the 10 essential security measures in NIS2 Article 21, including:
Attacks on critical infrastructures are estimated to account for 70% of all cyber incidents today (IBM X-Force Threat Intelligence Index 2024). The most common critical infrastructure attacks are on public-facing applications (29%) and phishing into valid accounts (25%). Many of these attacks install malware or ransomware. One-third of CI attacks exploit authorized tools to capture user credentials, gain remote access and steal data.
The Uptime Institute Data Center Security Survey 2024 found that IT systems and IT partner-related attacks account for nearly two-thirds of the most impactful cybersecurity incidents for operators. OT and operational procedures account for a third of incidents but are rising due to a growing number of attacks on third-party vendors and suppliers.
Figure 1 shows how cyberattack vectors can compromise third parties, infiltrate the data center and then move laterally between IT and OT systems.
Cyberattacks can compromise software as a service, edge and colocation sites, private and public cloud services, and endpoint devices used by data center IT.
Cyberattacks can also compromise OT equipment of critical third-party suppliers (such as equipment vendors), and services (such as water and power providers). Vulnerabilities include:
Attacks can include:
This update addressed key points presented at the LEET Security CISO conference in December 2024. Further research on cybersecurity and NIS 2 will be produced shortly.
Other related reports published by Uptime Institute include:
Will legislation change how finance uses public cloud?
Critical national infrastructure status: what does it mean?
Note: The regulatory analysis provided in this Update is the opinion of Uptime Intelligence. Data center operators should validate the interpretations with their legal staff and any relevant regulatory authorities.