arrow_backIndustrial Software Insider

APAC Governments Enforce Stricter OT Cybersecurity Rules

APAC regulators have introduced new OT cybersecurity mandates-faster reporting, segmentation, third-party controls-aligned with IEC standards to boost resilience.

APAC Governments Enforce Stricter OT Cybersecurity Rules

APAC regulators have recently introduced stricter operational technology (OT) cybersecurity requirements impacting the manufacturing, energy, and utilities sectors. National authorities across Southeast Asia and other regions have mandated shorter incident reporting deadlines, enhanced network segmentation, and increased vendor accountability for resilience testing, following multiple cross-border industrial cyber incidents.

Background

Research indicates that industrial organizations in Asia-Pacific face significant OT cybersecurity challenges. Approximately 45% of enterprises identified cyber risk as the primary barrier to OT digitalization; 68% cited security capability gaps, 56% reported insufficient staffing or budgets, and 35% pointed to regulatory compliance challenges, according to findings from Kaspersky and VDC Research published in 20251Almost 40% of Industrial Enterprises Identify Cybersecurity as a Key Challenge in Digitalising OT Environments - Cyber Security Asia. Concurrently, regulators in APAC are aligning with international standards, such as ISA/IEC 62443, to inform OT security protocols in critical infrastructure sectors, including energy, water, and manufacturing2Securing APAC Critical.

Details

A harmonized OT security framework is developing across ASEAN to streamline cross-border compliance and strengthen cooperative incident response among member economies2Securing APAC Critical. Jurisdictions including Japan, Taiwan, Thailand, and Australia have enacted or revised laws that mandate risk assessments, rapid incident reporting, and third-party oversight of OT systems. Taiwan enforces ongoing cyber readiness evaluations under its Cybersecurity Management Act. Thailand's Cybersecurity Act requires critical infrastructure operators to maintain incident response plans and reporting protocols. Australia's Security of Critical Infrastructure (SOCI) Act sets cyber risk management requirements and incident reporting obligations within 12 hours3The Global Shift Toward OT Security Regulations: A 2025 Outlook.

New governance privileges expand oversight to vendors, mandating micro-segmentation and zero-trust zoning for industrial networks-requirements now compulsory for Manufacturing Execution Systems (MES) and Human-Machine Interface (HMI) vendors. Operators must demonstrate access governance, evidentiary logging, and defined vulnerability remediation service-level agreements (SLAs) to meet audit standards4Asia Cyber Security for Industrial Automation Market Size and Forecasts 2032.

Industry sources report a move toward mandated resilience testing for vendor-supplied OT/Industrial Control Systems (ICS) software during major maintenance windows. While formal guidelines are under public draft, practical alignment with ISA/IEC 62443 is emphasized to enhance interoperability and audit preparedness2Securing APAC Critical. Financial institutions and utilities are reportedly tying funding to OT cyber compliance, prioritizing systems with comprehensive logging, segmentation, and incident traceability; however, specific policy details are not yet public.

Outlook

Regulators throughout APAC are expected to refine cybersecurity guidelines and enforcement schedules through mid-2026, particularly regarding vendor resilience testing and audit logging. Manufacturers and OT software providers will need to accelerate adoption of segmentation, change control, and incident preparedness measures to meet compliance and funding requirements.