If you can’t prove what changed, who changed it, and whether it was authorized, you don’t have OT resilience.
You have asset inventory with a blind spot.
In OT environments, configuration changes are not “admin noise.” They can directly alter process behavior, safety logic, network paths, alarm thresholds, and production uptime.
A changed PLC program, modified HMI screen, updated switch config, or engineering workstation project file can create the same operational impact as malware, even when the change was accidental.
The problem is that many OT security programs focus on two ends of the spectrum:
1. Asset visibility: What do we have?
2. Incident response: What do we do when something goes wrong?
But between those two is a critical control:
Configuration change integrity monitoring.
This means continuously answering:
Who made the change?
What changed?
When did it happen?
Was it approved?
Was the running logic different from the approved baseline?
Did the change affect safety, uptime, or compliance?
Can we roll back with confidence?
Without this, teams are often left investigating after the fact with incomplete evidence, tribal knowledge, screenshots, or outdated backups.
That is not resilience. That is recovery by guesswork.
OT configuration integrity should not be treated as an audit activity performed once a year. It should be a core operational control across PLCs, HMIs, switches, historians, engineering tools, and backup repositories.
Because in industrial environments, knowing what exists is important.
Knowing what changed is essential.
And knowing whether that change was authorized is what separates visibility from control.