Skip to content

Chapter 21: OT/ICS/SCADA Security

Overview

Operational Technology (OT) and Industrial Control Systems (ICS) represent the convergence of the digital and physical worlds — systems that control power grids, water treatment plants, oil pipelines, manufacturing facilities, and hospital life-support equipment. Unlike IT systems where the worst-case outcome is data loss, ICS compromise can cause physical harm, environmental disasters, and loss of life. This chapter covers ICS architecture, the Purdue Model, attack methodologies from Stuxnet through TRITON, detection strategies unique to industrial environments, and the frameworks governing OT cybersecurity.

Learning Objectives

By the end of this chapter, students SHALL be able to:

  1. Describe the Purdue Enterprise Reference Architecture and its security zones
  2. Identify the unique threat landscape facing OT/ICS environments
  3. Analyze real-world ICS attacks including Stuxnet, CRASHOVERRIDE, and TRITON
  4. Apply the ICS ATT&CK matrix to threat modeling and detection
  5. Design network segmentation and monitoring solutions for OT environments
  6. Develop OT-specific incident response procedures that prioritize safety over security

Prerequisites

  • Basic understanding of industrial control system concepts (PLC, HMI, SCADA)
  • Familiarity with IT networking (TCP/IP, VLAN, firewalls)
  • Understanding of the IT/OT convergence challenge

Why This Matters

In February 2021, an attacker gained remote access to the water treatment plant in Oldsmar, Florida, and attempted to increase sodium hydroxide (lye) levels to 111 times normal — a lethal concentration. The attack was caught only because an operator was watching the screen in real time. In 2022, Industroyer2 was deployed against Ukrainian power substations, causing blackouts. ICS attacks are no longer theoretical — they are active and escalating. Every critical infrastructure operator needs personnel who understand both IT security and OT safety.


21.1 ICS Architecture and the Purdue Model

The Purdue Enterprise Reference Architecture (PERA) defines a hierarchical model for industrial control networks, separating business, operational, and field levels.

graph TB
    subgraph "Level 5: Enterprise Network"
        ERP[ERP / SAP\nBusiness Systems]
        CORP[Corporate IT\nEmail, AD, Web]
    end

    subgraph "Level 4: Site Business Planning"
        MES[MES\nManufacturing Execution]
        HIST[PI Historian\nData Aggregation]
    end

    subgraph "DMZ: IT/OT Boundary"
        DMZ[Demilitarized Zone\nData Diodes, Firewalls]
        JUMP[Jump Server\nControlled OT Access]
    end

    subgraph "Level 3: Site Operations"
        SCADA[SCADA Server\nSupervisory Control]
        HMI[Engineering\nWorkstation / HMI]
    end

    subgraph "Level 2: Area Control"
        DCS[DCS\nDistributed Control]
        PLC[PLC Controllers]
    end

    subgraph "Level 1: Basic Control"
        RTU[RTUs\nRemote Terminal Units]
        IED[IEDs\nIntelligent Electronic Devices]
    end

    subgraph "Level 0: Physical Process"
        SENS[Sensors\nActuators\nMotors\nValves]
    end

    ERP --> MES
    CORP --> DMZ
    MES --> DMZ
    DMZ --> SCADA
    SCADA --> DCS
    DCS --> PLC
    PLC --> RTU
    RTU --> IED
    IED --> SENS

    style DMZ fill:#e63946,color:#fff
    style SENS fill:#2d6a4f,color:#fff
    style ERP fill:#1d3557,color:#fff

21.1.1 Key ICS Components

Component Function Common Vendors
PLC (Programmable Logic Controller) Execute control logic in real time, interface with field devices Siemens S7, Allen-Bradley, Schneider Modicon
RTU (Remote Terminal Unit) Remote monitoring and control over wide areas (pipelines, substations) ABB, GE, Emerson
DCS (Distributed Control System) Process control for continuous manufacturing (refinery, chemical plant) Honeywell, ABB, Siemens
HMI (Human-Machine Interface) Operator displays and control panels Wonderware, FactoryTalk, WinCC
SCADA Supervisory control across distributed geographies OSIsoft PI, Ignition, GE CIMPLICITY
Historian Long-term time-series data storage OSIsoft PI, Honeywell PHD
IED (Intelligent Electronic Device) Digital relays in power systems SEL, GE MultiLink

21.2 ICS-Specific Threats

21.2.1 The IT/OT Difference

Aspect IT OT
Priority Confidentiality > Integrity > Availability Safety > Availability > Integrity > Confidentiality
Patch cycle Monthly or faster Yearly or never (vendor certification required)
Protocols TCP/IP standards Modbus, DNP3, IEC 61850, EtherNet/IP, PROFINET
System lifetime 3–5 years 20–30 years
Downtime tolerance Minutes–hours Zero (safety-critical processes)
Security tools Standard EDR/AV Many endpoints unsupported (XP, embedded)
Authentication Passwords, MFA, PKI Often none (Modbus has no authentication)

21.2.2 ICS Attack Lifecycle

flowchart LR
    A[IT Network\nInitial Access] --> B[IT/OT Lateral\nMovement]
    B --> C[OT Network\nEstablishment]
    C --> D[ICS Protocol\nLearning / Mapping]
    D --> E[Stage\nPayload]
    E --> F[Execute\nAttack]
    F --> G[Physical\nImpact]

    style G fill:#e63946,color:#fff
    style F fill:#780000,color:#fff
    style E fill:#e63946,color:#fff

This lifecycle is demonstrated in all major ICS attacks: Stuxnet (2010), CRASHOVERRIDE (2016), TRITON (2017), Industroyer2 (2022).


21.3 Landmark ICS Attacks

21.3.1 Stuxnet (2010)

Target: Iranian nuclear centrifuges (Natanz enrichment facility) Attribution: NSA/Unit 8200 (USA/Israel joint operation) Impact: Physically destroyed ~1,000 IR-1 centrifuges

Technical Details: - Spread via USB, Windows shares, Step 7 project files, print spooler vulnerability - Used 4 zero-days simultaneously (unprecedented) - Fingerprinted specific Siemens S7-315 PLCs connected to frequency converter drives from specific vendors - Manipulated centrifuge rotor speeds while reporting normal values to operators (first known rootkit for PLCs) - Intercepted and replayed safe process values to HMI — operators saw nothing wrong

Lessons: Air gaps alone are insufficient; supply chain and USB vectors bypass air gaps; PLC firmware can be manipulated to cause physical destruction.

21.3.2 CRASHOVERRIDE/Industroyer (2016)

Target: Ukrainian power grid (Kyiv district) — December 17, 2016 Attribution: Sandworm (GRU Unit 74455) Impact: Blackout affecting approximately 230,000 customers for 1–6 hours

Technical Details: - Framework with loadable payload modules for different industrial protocols: IEC 60870-5-101, IEC 60870-5-104, IEC 61850, OPC DA - Issued OPEN commands to protective relays, tripping circuit breakers across substations - Denial of Service component targeted serial ports to prevent operator recovery - Wiper module destroyed master boot records of Windows workstations

Lessons: ICS attacks now use modular frameworks designed for specific protocols; attacks specifically degrade operator visibility to prevent recovery.

21.3.3 TRITON/TRISIS (2017)

Target: Petro Rabigh petrochemical facility, Saudi Arabia Attribution: Sandworm (later attributed) / XENOTIME Impact: Safety Instrumented System (SIS) compromise — could have triggered explosion

Technical Details: - First known attack specifically targeting Safety Instrumented Systems (Triconex SIS) - SIS is the last line of defense — if process goes out of safe range, SIS shuts everything down to prevent explosion - Attackers reprogrammed SIS controllers to remain silent while enabling unsafe conditions - Attack failed (accidentally triggered safe state) — investigation revealed compromise

MITRE ATT&CK for ICS Mapping: - T0804: Block Reporting Message - T0816: Device Restart/Shutdown - T0836: Modify Parameter - T0857: System Firmware (SIS firmware modification)

21.3.4 Colonial Pipeline (2021)

Target: Colonial Pipeline (largest US refined products pipeline) Attribution: DarkSide ransomware affiliate Impact: 5,500 miles of pipeline shut down; ~45% of East Coast fuel supply disrupted

Key Details: - IT network ransomware (DarkSide RaaS) — OT systems not directly compromised - Company shut down OT as precautionary measure — IT/OT not properly segmented - $4.4M ransom paid (partially recovered by DOJ) - Demonstrated that IT ransomware can cause OT shutdown even without directly attacking ICS


21.4 ICS ATT&CK Framework

MITRE ATT&CK for ICS extends the enterprise framework with ICS-specific tactics and techniques.

21.4.1 ICS ATT&CK Tactics

Tactic ID Description
Initial Access TA0108 Drive-by compromise, external remote services, spearphishing
Execution TA0104 Native API, scripting, change operating mode
Persistence TA0110 Hooking, module firmware, valid accounts
Evasion TA0103 Block reporting message, spoof reporting message, rootkit
Discovery TA0102 Network sniffing, remote system information, I/O module discovery
Lateral Movement TA0109 Default credentials, remote services, valid accounts
Collection TA0100 Automated collection, monitor process state, point and tag identification
Command and Control TA0101 Connection proxy, standard application layer protocol
Inhibit Response Function TA0107 Activate firmware update mode, block command message, denial of view
Impair Process Control TA0106 Brute force I/O, change parameter, unauthorized command message
Impact TA0105 Damage to property, denial of control, loss of safety, manipulation of control

21.5 OT Network Security

21.5.1 Network Segmentation

Proper segmentation implements the Purdue model with security controls at each boundary:

IT Network → [Firewall] → DMZ → [Data Diode/Firewall] → OT Network

DMZ contains:
- Historian proxy (data aggregation without direct IT→OT connection)
- Remote access jump server (monitored, time-limited, no persistent sessions)
- Patch management server for approved OT patches
- Antivirus update server

Data Diode (hardware-enforced one-way communication):
- Allows data from OT→IT only (telemetry, historian)
- Physically impossible for data to flow IT→OT
- Products: Waterfall Security, OWL Cybersecurity, BAE Systems

21.5.2 OT Network Monitoring

Traditional EDR/SIEM cannot be deployed on PLCs and RTUs. OT-specific passive monitoring solutions parse industrial protocols and detect anomalies:

Product Approach Detection Capabilities
Claroty Passive tap + protocol DPI Modbus/DNP3/EtherNet-IP baseline, anomaly detection
Dragos Passive + active (limited) ICS-specific threat intelligence, Neighborhood Keeper
Nozomi Networks AI-based OT/IoT monitoring Vulnerability assessment, behavioral baseline
Tenable.OT Asset inventory + vulnerability Passive + selective active scanning
Fortinet FortiSIEM IT/OT convergence SIEM Unified visibility
Cisco Cyber Vision Network traffic analysis Embedded in network switches
# Zeek/Bro — parse ICS protocols
# Install ICS analysis packages
zkg install zeek/mitchellkrogza/zeek-bricata-modbus
zeek -i eth0 modbus.zeek

# Snort/Suricata ICS rules
# Emerging Threats ICS ruleset
suricata -r capture.pcap -l /tmp/logs -S /etc/suricata/rules/ics.rules

21.5.3 OT-Safe Security Controls

Because patching and deploying security tools on OT systems can cause outages:

IT Control OT Equivalent Caveat
EDR on endpoint Passive network monitoring Cannot install agents on PLCs
Patch management Compensating controls Patch only after vendor validation, in maintenance window
Vulnerability scanning Passive asset discovery Active scanning can crash PLCs
Password policy Out-of-band management + key rotation Many OT protocols have no auth
Encryption in transit Encrypted tunnels at network boundary OT protocols often cleartext
MFA Jump server MFA Can't enforce on PLC console

21.6 OT Incident Response

OT IR differs fundamentally from IT IR: safety comes first.

21.6.1 OT IR Decision Framework

flowchart TD
    A[ICS Incident Detected] --> B{Immediate Safety\nRisk?}
    B -->|YES| C[Execute Safety Procedure\nEmergency Shutdown\nNotify Operations]
    B -->|NO| D{Can Process\nContinue Safely?}
    C --> E[Safety First\nThen Investigate]
    D -->|YES| F[Monitor and Collect\nDo NOT Isolate Yet]
    D -->|NO| G[Controlled Shutdown\nFollowing SOP]
    F --> H[Engage OT IR Team\n+ Safety Engineer]
    G --> H
    H --> I[ICS Forensics\nNetwork capture\nHMI logs\nHistorian data]
    I --> J[IT IR Integration\nTrace to IT compromise]
    J --> K[Recovery\nVendor-assisted if needed]

    style C fill:#e63946,color:#fff
    style E fill:#e63946,color:#fff

Critical Rule: Never isolate a running process without coordination with operations and safety engineers. Cutting a network cable to a PLC controlling a chemical reaction could result in uncontrolled conditions.

21.6.2 OT Evidence Sources

Data Historian (OSIsoft PI, Honeywell PHD):
  - Process values at time of incident (pumps, temperatures, flows, pressures)
  - Can show manipulation of setpoints

HMI / SCADA Logs:
  - Operator commands, alarm acknowledgments, screen captures

Engineering Workstation Logs:
  - Project file modifications (PLC ladder logic changes)
  - Vendor software activity (Step 7, Studio 5000)

Network Captures:
  - Industrial protocol commands (Modbus FC16=write, FC03=read)
  - Anomalous write commands to PLC holding registers

Firewall/Historian Proxy Logs:
  - IT→OT connection attempts
  - Unusual data volume or timing

21.7 Regulatory Frameworks for OT Security

Framework Sector Mandated By
NERC CIP Electric utilities (North America) FERC (mandatory)
NIST SP 800-82 General ICS NIST (guidance)
IEC 62443 Industrial automation International standard
AWIA 2018 Water utilities (US) America's Water Infrastructure Act
TSA Security Directives Pipelines, aviation DHS/TSA (mandatory)
NIS2 Directive Critical infrastructure (EU) EU (mandatory from 2024)
ISA/IEC 62443 Any industrial sector International (voluntary)

21.8 Benchmark Controls

Control ID Title Requirement
Nexus SecOps-OT-01 IT/OT Network Segmentation Purdue Model zones implemented with DMZ; data diode preferred for IT→OT
Nexus SecOps-OT-02 OT Asset Inventory Complete inventory of all PLCs, RTUs, HMIs, engineering workstations
Nexus SecOps-OT-03 OT Network Monitoring Passive protocol-aware monitoring deployed on OT network
Nexus SecOps-OT-04 Remote Access Control MFA on jump server; session recording; no persistent VPN tunnels into OT
Nexus SecOps-OT-05 OT IR Capability Dedicated OT IR procedure; safety engineer in IR team; annual tabletop
Nexus SecOps-OT-06 Regulatory Compliance NERC CIP (electric), AWIA (water), TSA directives (pipeline) as applicable

Exam Prep & Certifications

Relevant Certifications

The topics in this chapter align with the following certifications:

  • GIAC GICSP — Domains: ICS Security, SCADA Systems, OT Network Architecture
  • GIAC GRID — Domains: OT Incident Response, Industrial Defense, ICS Threat Detection

View full Certifications Roadmap →

Key Terms

DCS (Distributed Control System) — A control system for continuous manufacturing processes (oil refinery, chemical plant) using distributed controllers and centralized monitoring.

Defense-in-Depth (OT) — Layered security controls in OT environments: physical security → network segmentation → protocol monitoring → endpoint hardening → detective controls.

DNP3 (Distributed Network Protocol 3) — A protocol used in SCADA systems for communication between control centers and remote sites. Has no native authentication in older versions.

IEC 62443 — A series of international standards for industrial cybersecurity, covering security levels (SL-1 through SL-4) for products, systems, and operations.

Modbus — A serial communication protocol (1979) used extensively in PLCs. Has no authentication or encryption — any device on the network can send commands.

NERC CIP — North American Electric Reliability Corporation Critical Infrastructure Protection — mandatory cybersecurity standards for the bulk electric system in North America.

Safety Instrumented System (SIS) — An independent system that monitors process safety parameters and automatically takes action (emergency shutdown, alarm) if values exceed safe limits.

TRITON/TRISIS — The first known malware designed to target Safety Instrumented Systems, discovered at a Saudi petrochemical facility in 2017.