OT/ICS Security Assessments: What Manufacturers Need to Know

Operational Technology (OT) and Industrial Control Systems (ICS) present unique security challenges. These systems control physical processes—manufacturing lines, HVAC systems, power distribution, water treatment—and the consequences of a security incident extend beyond data theft to physical safety and operational disruption.

If you're a manufacturer or operate critical infrastructure, here's what you need to know about securing these environments.

Why OT/ICS Security is Different

IT vs OT: Different Priorities

Traditional IT security prioritizes confidentiality first—protecting data from unauthorized access. The classic CIA triad (Confidentiality, Integrity, Availability) puts confidentiality on top.

OT security flips this. Availability and safety come first. A manufacturing line that stops costs money. A safety system that fails could hurt people.

IT SystemsOT/ICS Systems
Confidentiality firstAvailability first
Regular patchingPatches may require months of planning
3-5 year lifecycle15-25 year lifecycle
Standard protocols (TCP/IP)Industrial protocols (Modbus, DNP3, EtherNet/IP)
Frequent updates"If it works, don't touch it"
Downtime measured in hoursDowntime measured in dollars per minute

Legacy Systems Everywhere

That PLC running your production line might be 20 years old, running software that hasn't been updated in a decade, on an operating system that's been end-of-life for years. And it works perfectly—so nobody wants to touch it.

This isn't negligence. These systems were designed for reliability and longevity, not security. They were never meant to be connected to networks, let alone the internet.

Convergence Creates Risk

The efficiency benefits of connecting OT to IT networks—remote monitoring, data analytics, predictive maintenance—come with security risks. What was once an air-gapped system is now reachable from the corporate network, or worse, the internet.

Common OT/ICS Vulnerabilities

Default credentials: Industrial equipment often ships with default passwords that never get changed. Sometimes the passwords are hardcoded and can't be changed.

Lack of authentication: Many industrial protocols have no authentication at all. If you can reach the device, you can control it.

Flat networks: No segmentation between IT and OT, or between different OT zones. An attacker who compromises a workstation can reach PLCs directly.

Unpatched systems: Systems that can't be patched without extensive testing and planned downtime—which never gets scheduled.

Remote access: VPNs, jump hosts, and remote desktop connections that provide convenient access for maintenance also provide access for attackers.

Insecure protocols: Protocols designed decades ago without security considerations, transmitting commands in cleartext.

What an OT/ICS Security Assessment Covers

A proper OT security assessment isn't just a network scan. Scanning industrial systems carelessly can crash them. Assessment includes:

Network Architecture Review

  • Documentation of IT/OT connections and data flows
  • Network segmentation analysis
  • Identification of exposed systems and services
  • Review of remote access paths

Passive Network Analysis

  • Traffic capture and protocol analysis
  • Identification of devices and communications
  • Detection of anomalous or unauthorized traffic
  • No active probing that could disrupt systems

Configuration Review

  • Firewall rules and access controls
  • Authentication and credential management
  • Logging and monitoring capabilities
  • Backup and recovery procedures

Controlled Active Testing

  • Vulnerability assessment of selected systems (with appropriate precautions)
  • Testing during maintenance windows when safe
  • Close coordination with operations staff
  • Immediate halt capability if issues arise

Risk Assessment

  • Mapping vulnerabilities to potential business and safety impacts
  • Identifying attack paths from IT to OT
  • Prioritizing findings based on actual risk, not just technical severity

Safety First: Testing Without Breaking Things

OT security testing requires caution that IT testing doesn't. Principles we follow:

Coordinate everything. Operations staff know which systems are critical and when testing can occur safely. No surprises.

Passive before active. Network traffic analysis reveals a lot without touching systems.

Test in maintenance windows. Active testing of production systems happens during planned downtime.

Have a rollback plan. Know how to recover if something goes wrong.

Stop if anything unexpected happens. Better to pause and investigate than to cause an incident.

The goal is to find vulnerabilities, not create incidents.

Building an OT Security Program

Assessment is just the start. Long-term OT security requires:

Network Segmentation

Separate IT and OT networks. Segment OT into zones based on criticality. Control and monitor all traffic between zones. The Purdue Model provides a framework for industrial network architecture, though modern implementations may look different.

Visibility and Monitoring

You can't protect what you can't see. OT-specific monitoring tools understand industrial protocols and can detect anomalies that IT security tools miss.

Access Control

  • Eliminate default credentials
  • Implement multi-factor authentication where possible
  • Control and log remote access
  • Limit access to need-only

Incident Response Planning

Know what you'll do when (not if) an incident occurs. Who makes decisions? How do you safely isolate systems? How do you recover operations?

Ongoing Assessment

Annual assessments catch new vulnerabilities and configuration drift. Test after significant changes.

Compliance Considerations

Depending on your industry, you may face regulatory requirements:

  • NERC CIP: Electric utilities
  • TSA directives: Pipelines
  • CFATS: Chemical facilities
  • NIST Cybersecurity Framework: Widely applicable
  • IEC 62443: International standard for industrial cybersecurity

Compliance doesn't equal security, but it provides a baseline framework.

Getting Started

If you've never assessed your OT security:

  1. Inventory: Know what you have. Many organizations can't list their OT assets.
  2. Architecture review: Map the connections between IT and OT.
  3. Risk assessment: Identify your crown jewels and most likely attack paths.
  4. Prioritized remediation: Fix the highest-risk items first.
  5. Build monitoring: Gain visibility into OT network traffic.
  6. Plan for ongoing improvement: This isn't a one-time project.

Start with visibility and quick wins. Perfect security isn't achievable, but meaningful improvement is.


St. John Cybersecurity provides OT/ICS security assessments for manufacturers and critical infrastructure operators. We understand that availability and safety come first. Contact us to discuss your environment.