In June 2017, NotPetya entered Merck through a compromised software update and moved laterally through the entire network. Remote access points had no session-scoped controls. Network segmentation was insufficient to contain it. The result: $1.3 billion in damages, vaccine manufacturing halted for two weeks, and a pharmaceutical supply chain disruption that took months to resolve.
NotPetya spread because the access architecture treated network connectivity as authorization. That is the gap Part 11 was written to close.
Session-scoped, per-asset authorization is what 11.10(d) expects, not network reachability via VPN.
Remote access ranks among the top three OT vulnerability vectors per the SANS 2025 survey. For pharmaceutical manufacturing, the exposure is specific: bioreactor control systems, environmental monitoring in cleanrooms, CIP automation, WFI purification, and filling line controllers.