6.1 OT Threat Landscape

The threat landscape facing industrial OT networks has evolved dramatically over the past decade. What was once a domain of isolated, proprietary systems with limited connectivity has become a target of sophisticated nation-state actors, ransomware groups, and opportunistic attackers. The convergence of OT and IT networks, driven by the need for operational data integration and remote management, has dramatically expanded the attack surface. Understanding the full threat landscape is the first step in designing an effective segmentation architecture.

OT Network Cybersecurity Threat Landscape

Figure 6.1: OT Cybersecurity Threat Landscape — Four threat categories (External, Internal, IT-OT Boundary, Physical) with attack vectors and paths targeting the Industrial Control System hub. Color-coded by threat category: red (external), orange (internal), yellow (IT-OT boundary), purple (physical).

Threat Category Attack Vector Likelihood Impact Primary Mitigation
External — APTSpear phishing → IT network → lateral movement to OTMediumCriticalIT-OT segmentation, DMZ, no direct IT-OT path
External — RansomwareIT network compromise → OT historian/SCADA encryptionHighHighOT network isolation, offline backups, incident response plan
External — Supply ChainCompromised vendor software/firmware updateMediumHighFile transfer gateway with AV scan, vendor access control
Internal — InsiderAuthorized user abusing access to modify setpointsLow-MediumHighPAM/Bastion, session recording, command whitelist
Internal — MisconfigurationFirewall rule error creating unintended pathMediumMedium-HighChange management, firewall rule review, automated compliance check
IT-OT Boundary — Lateral MovementCompromised DMZ host used to pivot to OT CoreMediumCriticalDMZ host hardening, micro-segmentation, IDS on OT side
IT-OT Boundary — Protocol ExploitationMalformed OT protocol packets bypassing DPILowHighDPI with protocol validation, firmware updates on DPI engine
Physical — Rogue DeviceUnauthorized device connected to OT switch portLow-MediumHigh802.1X port authentication, MAC address whitelisting, port security

6.2 Risk Assessment Methodology

Risk assessment for OT/IT segmentation projects must adapt standard IT risk methodologies to account for the unique characteristics of OT environments: the primacy of availability over confidentiality, the presence of safety-critical functions, and the long lifecycle of OT equipment. The recommended approach combines the IEC 62443 security level framework with a consequence-based risk assessment that explicitly accounts for physical process impacts.

Risk Level Likelihood × Impact OT Consequence Examples Required Response IEC 62443 SL Target
CriticalHigh × CriticalSafety system compromise, explosion, grid blackoutImmediate remediation; escalate to CISO and plant managerSL 3–4
HighHigh × High or Medium × CriticalProduction shutdown, product quality failure, data breachRemediate within 30 days; assign ownerSL 2–3
MediumMedium × Medium or Low × HighPartial production impact, unauthorized monitoringRemediate within 90 days; track in risk registerSL 2
LowLow × Low or Low × MediumMinor operational disruption, non-critical data exposureAccept or remediate within 180 daysSL 1

6.3 Common Design Vulnerabilities and Mitigations

Many OT/IT segmentation implementations contain design vulnerabilities that undermine the intended security posture. These vulnerabilities often arise from operational convenience requirements that were not properly balanced against security requirements during the design phase. The following table documents the most frequently observed design vulnerabilities and their recommended mitigations.

Vulnerability Description Detection Method Mitigation
Direct IT-OT PathA firewall rule or routing entry allows direct traffic between IT and OT zones, bypassing the DMZFirewall rule audit, penetration testRemove direct rules; enforce all traffic through DMZ services
Overly Permissive DMZ RulesDMZ firewall rules allow broad IP ranges or protocols instead of specific hosts and portsFirewall rule review, traffic analysisImplement least-privilege rules; review all rules quarterly
Shared CredentialsMultiple users share a single account for OT system access, preventing individual accountabilityUser account auditIndividual accounts with MFA; PAM for privileged access
Unencrypted ManagementFirewall or switch management uses Telnet, HTTP, or SNMPv1/v2 instead of encrypted protocolsProtocol scan, configuration reviewEnforce SSH, HTTPS, SNMPv3 for all management; disable legacy protocols
Unsecured USB PortsUSB ports on OT workstations or servers are enabled and unmonitored, allowing unauthorized mediaEndpoint configuration auditDisable unused USB ports; use USB write blockers; log all USB events
Missing OT IDS CoverageNo passive monitoring on OT network segments, making anomalous behavior invisibleNetwork architecture reviewDeploy passive OT IDS sensors on all critical OT segments
Unpatched DMZ SystemsDMZ servers and appliances are not included in the patch management processVulnerability scan, patch status auditInclude DMZ systems in patch management; test patches in staging

6.4 Incident Response for OT Environments

OT incident response requires a fundamentally different approach from IT incident response. The primary constraint is that containment actions (such as isolating a compromised system) may have direct physical process consequences. The incident response plan must define the decision authority for containment actions and must include pre-approved isolation procedures that can be executed without disrupting safety-critical functions.

IR Phase OT-Specific Considerations Decision Authority Target Timeframe
DetectionOT IDS alerts, historian anomalies, operator reports of unexpected behaviorOT Security Team<15 minutes from alert
TriageAssess process impact of potential containment; consult process engineerOT Security + Process Engineer<30 minutes
ContainmentIsolate affected zone without disrupting safety systems; use pre-approved isolation runbooksPlant Manager + CISO<60 minutes
EradicationRemove malware from OT systems using validated, offline tools; restore from known-good backupsOT Security Team + VendorHours to days
RecoveryRestore OT systems in controlled sequence; validate process behavior before resuming productionPlant Manager + OT EngineeringDays to weeks
Post-IncidentRoot cause analysis; update firewall rules, IDS signatures, and runbooks; regulatory notification if requiredCISO + ComplianceWithin 30 days