By Carolyn Crandall, Chief Marketing Officer, Xona Systems
Carolyn brings more than 30 years of cybersecurity strategy and product marketing experience to OT and ICS secure remote access. She has authored research and analysis on session visibility for industrial cybersecurity, identity-based access for critical infrastructure, and third-party vendor access governance, and has led marketing for cybersecurity companies across deception, identity, and OT security categories.
Only 13% of OT environments record sessions today, and auditors are increasingly asking why. The SANS ICS/OT survey data is consistent with what compliance leaders see during NERC CIP, TSA, and IEC 62443 reviews: most organizations can prove a remote session occurred, but not what happened during it.
Session visibility and recording for OT/ICS remote access is the ability to observe, supervise, log, and preserve evidence of user activity during remote sessions involving industrial systems. In practical terms, it means knowing who connected, when access occurred, what systems were reached, what actions were taken during the session, and whether those actions can be reviewed later in a form that is useful for investigations, audits, and operational review.
This matters because OT and ICS environments depend on remote access for maintenance, support, engineering changes, vendor interventions, and troubleshooting, yet many of those access paths were built for connectivity rather than accountability. VPNs, jump hosts, traditional RDP workflows, and fragmented remote access tools may establish a connection, but they often leave a structural gap between authentication and evidence. Teams may know a user logged in, but not what happened after the session began.
A mature visibility program requires three related but different capabilities working together. Logging establishes who connected and when. Monitoring helps detect or observe activity in real time. Recording preserves what actually happened during the session, including commands, screens, and actions that can later be searched, replayed, or investigated. In OT/ICS, that distinction matters because uptime-sensitive systems, vendor workflows, and legacy environments all make it risky to rely on metadata alone.
The session visibility gap rarely appears all at once. It builds gradually through architectural assumptions, inherited tools, and competing operational priorities. In many organizations, remote access methods were chosen for speed and convenience, not for auditable control. That leaves security and operations teams with a patchwork of tools that authenticate users but do not document what they do once connected.
Several root causes show up repeatedly. Legacy remote access tools such as VPNs, jump servers, and standard remote desktop tools were designed to establish access, not to capture session content. Tooling is often fragmented across IT, cloud, and OT environments, which creates seams where visibility breaks down. Teams may also over-rely on endpoint or network logs that capture connection metadata but not the content of user actions. In OT/ICS, that problem is compounded by legacy systems that cannot support agents and by third-party workflows that are broad in access but thin in oversight.
Storage and governance concerns also play a role. Full session recording raises practical questions about retention, indexing, retrieval, and review. Without a clear policy and platform for handling that data, many organizations default to limited logging instead of full visibility. The result is a familiar blind spot: remote access exists, but the organization cannot reliably reconstruct what happened inside the session afterward.
| Capability | What it Does | Why it Matters in OT/ICS |
| Logging | Captures access events and metadata: who connected, when, from where, to what system. | Establishes that access happened and supports baseline audit and access reviews. |
| Monitoring | Observes or alerts on activity in real time during the session. | Helps teams respond while activity is happening, not only after the fact. |
| Recording | Preserves the content of the session including commands, screens, and actions for later replay, search, and review. | Provides session-level evidence that metadata alone cannot recreate. |
A mature OT/ICS visibility strategy needs all three. Logging shows that access happened. Monitoring helps teams respond while it is happening. Recording preserves what actually occurred.
How Xona addresses this
Xona is built around mediated remote access for OT/ICS, which helps close the gap between authentication and accountability rather than simply creating a connection path.
Its approach is well suited to environments where session oversight, recording, and user attribution need to be applied consistently across internal users, vendors, and contractors.
Because Xona operates at the access layer rather than relying on endpoint agents, it aligns better with legacy and industrial environments where agent-based coverage is incomplete or operationally impractical.
Zero Trust is often discussed as an identity and access model, but its practical value depends on what happens after access is granted. Session visibility and recording strengthens Zero Trust by extending control beyond the login event and into the live session itself. Instead of simply verifying identity and opening a path, organizations can observe, govern, and preserve the actual behavior that occurs during remote access.
That matters in OT/ICS because resilience depends on reducing uncertainty during both routine maintenance and abnormal events. When session evidence is available, teams can investigate with more precision, determine whether procedures were followed, and separate operator error from suspicious activity more quickly. Without that evidence, investigations often rely on memory, fragmented logs, vendor testimony, or incomplete reconstructions that slow response and increase ambiguity.
Session visibility also supports resilience by making privileged activity defensible. Compromised credentials, insider misuse, vendor abuse, and lateral movement are all harder to investigate when organizations lack session-level evidence. Metadata may suggest that something unusual happened, but without recording, teams often cannot prove what actions were taken or how far the activity extended.
How Xona addresses this
Xona extends control into the live session by combining identity-based access with real-time session oversight and full recording.
Its model aligns with Zero Trust because the session becomes a governed control point, not just a network connection.
Xona's identity-correlated records help ensure that session evidence is tied to a specific authenticated user, approved access path, and target asset, which improves both accountability and resilience during investigations.
Xona Active Defense (v5.5). Active Defense extends session-layer governance into enforcement. The platform consumes signed risk signals from integrated OT security partners (Forescout, Nozomi Networks, Dragos) and acts on them inside the live session, then sends signed session events back into those platforms to close the loop. Enforcement is graduated rather than binary: alert the operator, pause the session, require supervisor approval for the next action, terminate the session, or quarantine the user pending review. The actions execute at the gateway, so the asset side does not require endpoint changes, agent rollouts, or protocol modifications. That structure lets defenders intervene during a privileged session without breaking the operational workflows the session was opened to support.
Figure 1: Signed event loop with OT NDR partners
Figure 1: Signed event loop between OT NDR partners and the Xona gateway. Risk signals come in, the Centralizer takes graduated action, and signed session events flow back out to the NDR and SIEM. The locks mark the cryptographic boundary on both halves of the loop.
The five graduated actions inside Active Defense are not a menu of equivalents. Each maps to a distinct trigger condition and a distinct operational fit. The point of graduated enforcement is to keep response proportionate to risk so that legitimate work does not get killed when the better answer is
a brief hold, and so that confirmed misuse does not get only an alert when the better answer is quarantine. The decision logic below reflects how the action ladder is used in practice across our customer deployments.
| Action | Trigger Conditions | Operational Fit |
| Alert | Anomaly detected but legitimate work is the likely explanation. Off-hours access from a known engineer, unusual command frequency on a system under active maintenance, or a vendor reaching an asset slightly outside the change-window envelope. | SOC review queue. The session continues; the analyst confirms or escalates after the fact. Used most often for first-tier signals where false-positive cost is high and operational disruption cost is even higher. |
| Pause | Anomaly with unclear intent. The session is briefly held while the user receives an in-session notification requiring acknowledgment, or while the SOC pulls additional context. | Useful when the right answer is "slow this down for ten seconds and look again," not "stop this work entirely." A vendor reaching an unexpected asset, a command sequence that does not match the work order, or a session approaching a known sensitive operation. |
| Require Supervisor Approval | High-risk action requested inside an otherwise legitimate session. Maintenance on a critical asset outside the change window, a configuration write to a safety-instrumented system, a command that would alter setpoints during production. | Operationally aligned with the supervisor-oversight model already in place at most plants. The supervisor receives the in-session approval prompt, reviews the action in context, and approves or denies in real time. The session continues without re-authentication if approval is granted. |
| Terminate | Confirmed bad actor or active misuse. Credentials assessed as compromised, insider misuse confirmed, vendor session contradicting an approved work order, or a command pattern matching a known-bad signature. | Used when the right answer is to end the session cleanly and preserve the recording for forensic review. The asset side is not disrupted beyond the session close; protocol containment at the gateway means there is no half-open path left behind. |
| Quarantine | Active threat. The session is isolated, the user identity is locked, and the connected asset path is held pending review. | The most aggressive action and the rarest in practice. Reserved for confirmed lateral-movement signals, ransomware-adjacent behavior, or risk signals from the integrated NDR partners that cross the threshold for immediate containment. The signed session record goes to the SIEM and back to the NDR for correlated investigation. |
The pattern in customer deployments is that the action distribution is heavily front-loaded. Alert handles most first-tier signals. Pause and require-supervisor-approval handle the next tier where intent is uncertain or risk is elevated. Terminate and quarantine are reserved for confirmed misuse. The decision logic is owned by the customer's SOC and operations teams in their runbook; Active Defense provides the enforcement primitives that the runbook compiles down to.
A modern OT/ICS remote access approach should begin with identity-bound, time-bound access. Every session should be attributable to an individual user, a specific purpose, and a defined window of approval. Shared accounts and persistent access undermine both auditability and operational control from the start. If identity is weak, session visibility becomes less valuable because the organization cannot reliably tie activity to a person or an authorized workflow.
The architecture should also mediate access rather than exposing internal networks broadly. In OT/ICS, remote users should not receive open-ended connectivity to industrial systems simply because they need to perform support or maintenance tasks. A modern model places control at the access layer so session monitoring, recording, and policy enforcement can be applied consistently across protocols, users, and environments. This is especially important for vendors and contractors, who often represent the highest-risk remote sessions while receiving the least session-level oversight.
Organizations should also expect more than video capture. Useful session recording should support replay, search, user attribution, and correlation with surrounding identity and governance events. Teams should be able to answer practical questions without manual reconstruction: who requested access, who approved it, what systems were reached, what happened during the session, and whether that evidence can be retrieved quickly in response to an incident or audit.
Operational fit matters as much as security control. If the solution is too fragile, too hard to manage, or too disruptive to industrial workflows, coverage gaps will persist. OT/ICS environments need a model that improves control without requiring invasive endpoint changes or constant administrative overhead.
How Xona addresses this
Xona combines identity-based remote access, session monitoring, recording, and governance in a model designed for OT/ICS rather than adapted from general-purpose IT remote access.
Its protocol-aware, access-layer approach helps organizations apply session visibility consistently without depending on agents on managed and unmanaged endpoints.
Xona also supports searchable and exportable session evidence, which makes recordings more useful for investigation, governance, and audit than static or isolated capture methods.
In OT/ICS, session visibility and recording is not only a security control. It is also an operational safeguard. When something goes wrong during a maintenance window, a vendor intervention, or a patching cycle, the absence of session evidence forces teams to reconstruct events from memory and partial logs. That slows root-cause analysis, increases finger-pointing, and can extend outages from hours into days.
A modern approach improves reliability by preserving a timestamped record of what was done, by whom, and in what sequence. That matters when multiple engineers touch a critical system, when a vendor introduces a change that affects performance, or when a production issue emerges after a routine session that appeared harmless at the time. With session recordings, teams gain a precise operational history rather than a patchwork of assumptions.
Safety and access control also improve because controlled sessions reduce ambiguity around privileges and actions. When access is time-bound, supervised, and reviewable, organizations are in a stronger position to support third-party maintenance without granting broad, persistent exposure. That creates a better balance between operational continuity and security governance, especially in critical environments where remote access must exist but cannot be trusted blindly.
When something goes wrong on the asset side after a remote session, the absence of session evidence is what makes the post-incident review hard. A failed maintenance task, an unintended state change, a misconfigured PLC, a setpoint drift discovered hours after the technician disconnected: each of these turns into a forensic exercise built on memory, partial network logs, vendor recollection, and ticket commentary. The recovery clock keeps running while the investigation argues about what actually happened.
Session recordings collapse that exercise. The replayable record shows which user authenticated, which asset they reached, which commands they sent, and the screen state at each step. Root-cause analysis becomes a five-minute replay rather than a two-day reconstruction. Recovery accelerates because the team can isolate the actual change rather than testing hypotheses against partial evidence. Inter-party disputes between vendor, operator, and compliance compress because the evidence is the same artifact for everyone in the conversation. Regulatory posture improves because the audit trail is producible on demand rather than reconstructed under deadline pressure.
Real-time supervision is one of the operational features OT/ICS teams care about most and one of the least-marketed capabilities in the secure-remote-access category. A senior engineer or operations lead can observe a vendor's live session as it happens, intervene if needed by sending an in-session message, pausing the session, or taking control, and never has to physically visit the asset or schedule on-site supervision time. The supervisor sees what the technician sees in the same moment, with the session record building underneath the live view.
The operational benefits land in the places that actually move the cost-of-operations needle. Decisions get made faster because the supervisor is already watching when the question arises rather than getting paged in afterward. Truck rolls drop because supervision no longer requires physical presence at the site. Inter-time-zone supervision gaps close because supervisors in any location can attend any session. Commissioning windows, vendor maintenance cycles, and contractor onboarding all benefit from this directly: the senior person whose oversight makes the work safer can be present without being physically present.
How Xona addresses this
Xona's real-time session monitoring supports active oversight during remote access rather than limiting visibility to after-the-fact review.
Its ability to record and review full session activity helps reduce ambiguity during outage investigation, maintenance review, and vendor accountability questions.
Xona's controlled access model is especially relevant where organizations need to support remote operations without accepting the open-ended exposure of VPN-based access.
Session visibility and recording should be treated as part of a broader access governance architecture. Identity providers, MFA, approval workflows, and policy engines determine who should be allowed to connect. Segmentation and boundary controls help determine what should be reachable. Session visibility and recording adds a separate but essential layer: it shows how that access was actually used.
This distinction matters because organizations often assume that SIEM, endpoint telemetry, or VPN logging already provides adequate visibility. In practice, those tools are only as strong as the data they receive. A SIEM can correlate logs, but it cannot reconstruct privileged actions if session content was never captured. Endpoint agents can provide useful signals, but they are not a reliable foundation for OT/ICS session oversight where legacy systems, unmanaged devices, and third-party access paths are common.
A stronger model connects identity assurance, governed remote access, session evidence, and downstream integrations. That allows teams to preserve session truth while still feeding supporting systems such as SIEM platforms, ticketing systems, and compliance workflows. It does not replace those systems. It makes them more useful by providing the session-level evidence they cannot generate on their own.
Different compliance frameworks ask similar questions in different vocabulary. The table below maps the most common OT/ICS frameworks to the session-evidence fields auditors typically request. Phrasing reflects what session evidence typically supports in audit defense, not a guarantee that any single framework names each field by these labels. Consult your registered entity, regulator, or compliance lead on how each control applies to your specific assets.
| Famework | User Identity Field | Session Sope Field | Timestamps and integrity | Recording metadata | Reference control |
| NERC CIP-007 R5 + R5.3 | Per-user identity tied to authorized session | Asset and protocol scope per session | Session start/end timestamps, signed event log | Session recording with replay | R5.3 compensating evidence |
| TSA SD-02F + SD-01G (oil and gas pipeline) | Per-user identity for vendor and contractor sessions | Asset access scope per session | Session timestamps with retention policy | Recording for incident review | TSA security directive evidence |
| IEC 62443 SR 2.8 (Auditable events) | Authenticated user identity per access event | Session scope tied to the asset and zone | Auditable event timestamps with integrity | Session recording where applicable | SR 2.8 audit log evidence |
| NIST SP 800-82r3 | Authenticated user identity for OT remote access | Session scope per asset | Session timestamps in audit log | Recording recommended for privileged sessions | Audit logging guidance |
| FDA 21 CFR Part 11 | User identity tied to verified electronic signature | Session scope per regulated record | Tamper-evident timestamps | Session recording for regulated workflows |
Electronic records integrity
|
The pattern holds across frameworks: auditors look for who, what, when, with what integrity, and where to find the record. Session evidence typically supports each of these fields when produced at the access path rather than reconstructed from disparate logs after the fact.
Session recording raises practical governance questions that most OT/ICS programs do not answer until the first audit, the first incident, or the first legal request makes them urgent. Retention windows, indexing approach, redaction policy, storage architecture, and cost implications all need a defensible default before the first session is recorded, not after.
Retention windows vary by framework and asset class. NERC CIP audit cycles typically drive 12 to 36 months of retained session evidence to cover the audit-prep envelope and the look-back period auditors evaluate. TSA compliance windows for designated owner-operators run on similar cycles, with retention often aligned to the security directive review period. IEC 62443 audit support is typically scoped to the entity's own audit cadence, which most operators set at 12 to 24 months. FDA 21 CFR Part 11 environments often require longer retention tied to the regulated record's lifecycle. Federal and DoD-adjacent environments tie retention to the system security plan and the data classification of the asset being accessed.
Indexing is the property that turns recorded sessions from passive evidence into a usable investigation surface. Per-user, per-asset, and per-session metadata indexes make it possible to answer "show me every session that touched HMI-04 in the last 90 days" in seconds rather than hours. Full-text search of session events (commands, file paths, application names) extends that capability into the content layer of the session itself.
Redaction matters because session recordings can incidentally capture sensitive information that should not be exposed during legal or compliance review: customer PII visible on a vendor's shared screen, credentials typed into a non-injection workflow, personal information surfaced in an asset's display. A defensible governance policy redacts those items before playback for legal or compliance review while preserving the unredacted master for forensic use under appropriate access controls.
Storage architecture is typically on-premises for air-gapped facilities and hybrid for facilities with sanctioned cloud connectivity. Active Defense's signed event loop is the structural property that makes either model defensible: the session events carry cryptographic signatures that establish tamper-evident retention, so the storage layer does not have to be the only line of integrity defense. Cost implications track the usual three knobs: storage tier (hot, warm, cold), recording resolution and frame rate, and recording duration. Reasonable defaults compress these into a manageable storage footprint while preserving the evidence quality auditors and investigators will actually need.
Consult your registered entity, regulator, or compliance team for retention requirements specific to your jurisdiction and asset class. The defaults above are operational starting points, not regulatory determinations.
How Xona addresses this
Xona fits this control layer by combining identity-correlated access, full session evidence, and exportable records that can support audit, investigation, and external system integration.
Its model complements SIEM, ticketing, and governance systems rather than trying to replace them.
This makes Xona particularly relevant for organizations that need a defensible bridge between access authorization and provable session accountability in OT/ICS.