After a delayed start, in the last years OT security has substantially caught up with IT security. Many technical IT security controls are also available for machines and plants. But the maturity distribution in the field of OT is more complex and fragmented, as shown in the present article. Certain fundamental issues and contradictions of IT security become particularly obvious here and might need to be solved within OT security.