Skip to content

[blog] Add Security For Legacy Environments Blog Post#9723

Merged
tiffany76 merged 11 commits into
open-telemetry:mainfrom
luke6Lh43:blog/security-legacy-environments
May 19, 2026
Merged

[blog] Add Security For Legacy Environments Blog Post#9723
tiffany76 merged 11 commits into
open-telemetry:mainfrom
luke6Lh43:blog/security-legacy-environments

Conversation

@luke6Lh43
Copy link
Copy Markdown
Member

@luke6Lh43 luke6Lh43 commented Apr 22, 2026

  • I have read and followed the Contributing docs, especially the "First-time contributing?" section.
  • This PR has content that I did not fully write myself.
  • I have the experience and knowledge necessary to understand, review, and validate all content in this PR.1

Description

This PR adds a new blog post: Security in OpenTelemetry for Legacy Traditional Environments.

The article provides high-level guidance for securing OpenTelemetry deployments in traditional and manufacturing environments, where legacy systems, older operating systems, and limited network segmentation create unique security challenges.

Content overview

The blog post covers the following topics, mapped to OpenTelemetry's core security concepts and documentation:

  • Understanding security risks specific to legacy and manufacturing environments
  • Monitoring CVEs and incident response readiness for OpenTelemetry components
  • Securing the OpenTelemetry Collector, including:
    • Secure configuration storage
    • Enabling TLS encryption and authentication
    • Minimizing attack surface
    • Applying the principle of least privilege
  • Handling sensitive data through data minimization and Collector processors (attribute, transform, and redaction processors), with practical YAML examples
  • Protecting against denial of service and resource exhaustion, with configuration examples for endpoint binding, queue sizing, compression, and filtering
  • Compliance and ongoing governance considerations

Related references

Closes #9724

Footnotes

  1. Yes, I can answer maintainer questions about the content of this PR, without using AI.

@luke6Lh43 luke6Lh43 requested a review from a team as a code owner April 22, 2026 15:53
@otelbot-docs otelbot-docs Bot requested a review from a team April 22, 2026 15:54
@github-actions github-actions Bot added the blog label Apr 22, 2026
@otelbot-docs otelbot-docs Bot added the missing:docs-approval Co-owning SIG has provided approval, PR needs approval from docs maintainer label Apr 22, 2026
@luke6Lh43 luke6Lh43 force-pushed the blog/security-legacy-environments branch 5 times, most recently from 732acc4 to 92febfb Compare April 22, 2026 16:45
@luke6Lh43 luke6Lh43 force-pushed the blog/security-legacy-environments branch 4 times, most recently from 03d5469 to 3bcf1f5 Compare April 26, 2026 02:49
@luke6Lh43 luke6Lh43 force-pushed the blog/security-legacy-environments branch from 3bcf1f5 to 1d64f3f Compare April 26, 2026 02:55
Copy link
Copy Markdown
Member

@tiffany76 tiffany76 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looking good! I especially like the flow chart.

Could you update all the bulleted lists so the first word starts with a capital letter?

I'm traveling this week, so we'll aim to publish the week after.

Thanks, @luke6Lh43!

Comment thread content/en/blog/2026/security-legacy-environments.md Outdated
Comment thread content/en/blog/2026/security-legacy-environments.md Outdated
@tiffany76
Copy link
Copy Markdown
Member

@open-telemetry/sig-security-approvers, we now have a draft of the blog. Could one of you review? Thanks.

Comment thread content/en/blog/2026/security-legacy-environments.md Outdated

### Weak or non-existent network segmentation

Legacy environments often operate on flat or shared networks. Introducing
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

How do we verify this statement? I see the opposite frequently - legacy systems run on a long list of legacy protocols and deeply nested networks.

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good point! Legacy environments vary widely. Some have flat networks while others have deeply nested, protocol-specific segmentation. Updated the section to acknowledge both scenarios and focus on the core risk: that introducing telemetry collection requires careful consideration of network architecture regardless of topology.

Comment thread content/en/blog/2026/security-legacy-environments.md Outdated
Comment thread content/en/blog/2026/security-legacy-environments.md Outdated

- avoid capturing full payloads unless necessary
- prefer aggregated signals over raw data
- review collected attributes regularly
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

How to interpret this?

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sure, please see below what I meant for each bullet:

"avoid capturing full payloads" — e.g. don't capture entire HTTP request/response bodies or full MQTT message payloads in span attributes when only the metadata (method, status, topic) is needed for observability
"prefer aggregated signals over raw data" — e.g. use metrics (counters, histograms) to track request rates or error rates rather than recording every individual event as a span or log entry
"review collected attributes regularly" — periodically audit which span/log/metric attributes are being captured to ensure no sensitive or unnecessary data has crept in over time

Happy to add brief clarifying examples inline if that would help readability. Let me know if you'd prefer that or if this explanation is sufficient context.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For "review collected attributes regularly", I guess this assumes that by default new/unknown data will be collected and sent?

A different way to do this is to enforce policy and schema. Related to open-telemetry/opentelemetry-specification#4738 and the Weaver project.

@lquerel FYI.

Comment thread content/en/blog/2026/security-legacy-environments.md
Industrial systems may run for years without upgrades. When vulnerabilities are
discovered:

- immediate patching may not be possible
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does this document suggest that the collector should be part of the industrial system, or it should be modeled as a bridge which can be immediately patched when there are supply chain security issues?

I feel it is important to clarify two scenarios:

  1. I have a legacy system, I need to collect and send telemetry to another system - I use Collector as a bridge and the system is designed with the assumption that the Collector can be patched frequently.
  2. I have a legacy system, I need to collect and send telemetry to another system - I throw the collector into my legacy system with the assumption that I'll be running outdated version of collector(s) for most of the time.

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I love this idea! I'll rework this section to clearly differentiate between the two deployment models and their implications for patching and security posture.

luke6Lh43 and others added 2 commits May 4, 2026 17:45
Co-authored-by: Tiffany Hrabusa <30397949+tiffany76@users.noreply.github.com>
Co-authored-by: Tiffany Hrabusa <30397949+tiffany76@users.noreply.github.com>
@otelbot-docs otelbot-docs Bot requested a review from a team May 4, 2026 21:45
@luke6Lh43
Copy link
Copy Markdown
Member Author

Thanks for the thorough review, @reyang! I've pushed a new commit addressing all the feedback. Let me know if anything needs further revision.

reyang
reyang previously approved these changes May 4, 2026
Copy link
Copy Markdown
Member

@reyang reyang left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM based on the following understanding:

  1. This document is trying to raise the awareness of telemetry collection security. It helps the reader understand the balance between observability and security. It has provided some principles and a thinking process that can be applied while trying to find a good balance.
  2. This document is NOT suggesting the best practice (which is aligned with the document title).

@reyang reyang dismissed their stale review May 6, 2026 14:34

Since the goal/scope changed, I'll take another look at the latest PR.

Copy link
Copy Markdown
Member

@tiffany76 tiffany76 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@luke6Lh43 I think you might have missed my earlier comment. Please change all bullet points to sentence case (so they begin with a capital letter). Thanks!

@otelbot-docs otelbot-docs Bot requested a review from a team May 14, 2026 04:30
@luke6Lh43
Copy link
Copy Markdown
Member Author

@luke6Lh43 I think you might have missed my earlier comment. Please change all bullet points to sentence case (so they begin with a capital letter). Thanks!

you're right @tiffany76 , I missed your previous comment :) it is now updated!

Copy link
Copy Markdown
Member

@reyang reyang left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. Thanks @luke6Lh43!

Copy link
Copy Markdown
Member

@tiffany76 tiffany76 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM! I've scheduled publication for Tuesday, May 19. Thanks, @luke6Lh43!

Comment thread content/en/blog/2026/security-legacy-environments.md Outdated
@otelbot-docs otelbot-docs Bot requested a review from a team May 15, 2026 23:40
@otelbot-docs otelbot-docs Bot added ready-to-be-merged This PR is ready to be merged by a maintainer and removed missing:docs-approval Co-owning SIG has provided approval, PR needs approval from docs maintainer labels May 15, 2026
@tiffany76 tiffany76 added this pull request to the merge queue May 19, 2026
Merged via the queue into open-telemetry:main with commit 64ee635 May 19, 2026
24 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

blog ready-to-be-merged This PR is ready to be merged by a maintainer

Projects

Status: Done

Development

Successfully merging this pull request may close these issues.

blog: Security in OpenTelemetry for Legacy Traditional Environments

3 participants