# Critical Infrastructure > No persistent credentials in operational technology (OT), SCADA, energy, water, and defence systems. Attackers cannot steal credentials that do not exist. ## Why OT Is the Worst Place for Stored Credentials OT environments combine long-lived hardware, infrequent patching, high blast radius, and growing IT/OT convergence. Stored operator and machine credentials in this environment are uniquely valuable to attackers and uniquely difficult to rotate. ## What Phantom Secrets™ Changes Operator authentication, machine-to-machine authentication, and command signing all become ephemeral. The credential is reconstructed inside a secure element only at the moment it is needed, only when policy is satisfied. There is no persistent credential to harvest, replay, or compromise. ## Use Cases - Energy generation, transmission, and distribution control - Water treatment and distribution control - Transport and rail signalling - Defence command-and-control - Industrial control systems and SCADA networks ## Related - Secure Terminal: /api/md/products/secure-terminal - PhantomGate™: /api/md/products/phantom-gate - Enterprise Security: /api/md/solutions/enterprise-security