73%
Of OT organizations experienced a cyberattack affecting OT systems in the past 12 months, per Claroty 2025 survey
3 years
Average unpatched vulnerability age in OT environments versus 65 days in IT environments
13
Nation-state aligned threat groups tracked by Dragos specifically targeting industrial control systems as of 2026
VOLTZITE
CISA-designated Chinese-linked threat group documented pre-positioning in US critical infrastructure OT networks for potential disruption operations

Operational technology (OT) and industrial control systems (ICS) security operates under fundamentally different constraints than IT security. The systems being protected were designed for reliability and availability, not confidentiality and integrity. A patch that takes a manufacturing line offline for four hours has direct business impact measured in hundreds of thousands of dollars. An EDR agent that consumes 5% of a Programmable Logic Controller's (PLC) compute capacity may interfere with real-time control loop timing.

These constraints do not make security impossible. They make it different. OT security requires controls that operate out-of-band, detection approaches that do not require agents on controlled systems, and incident response plans that account for the consequences of containment on physical processes.

In 2026, the threat is not theoretical. CISA has documented VOLTZITE (Chinese state-aligned) pre-positioning in US critical infrastructure OT networks for potential disruption. Darktrace analyzed ZionSiphon, OT malware targeting Israeli water treatment infrastructure with hardcoded facility names and chlorine dosage manipulation commands. The Dragos OT threat landscape report tracks 13 dedicated ICS threat groups. This guide provides the practical controls for security practitioners responsible for defending these environments.

OT Architecture and the Purdue Model

The Purdue Enterprise Reference Architecture (PERA), commonly called the Purdue Model, provides the conceptual framework for OT network segmentation. Understanding it is prerequisite to understanding both the historical security design and its current challenges.

The Purdue Model defines five levels: Level 0 (physical process: sensors, actuators, motors); Level 1 (basic control: PLCs, RTUs, DCS controllers managing the physical process); Level 2 (area supervisory control: SCADA systems, HMI workstations displaying process state to operators); Level 3 (site operations: historian servers, batch management, site-level data aggregation); Level 3.5 (the DMZ separating OT from IT); and Level 4/5 (enterprise IT: business systems, ERP, email, corporate network).

The original Purdue design assumed physical air gaps between levels. Communication moved strictly upward from the physical process to business systems; no direct connectivity existed between corporate IT and industrial controllers. This model provided strong security by architectural isolation.

The air gap has eroded extensively in modern OT environments. Business drivers for OT/IT convergence are real: operational data fed directly to ERP systems for production planning, remote vendor access for equipment maintenance, cloud-connected industrial IoT devices, and corporate IT tools deployed on Level 2 and 3 systems. Each connectivity bridge creates a potential path for IT-born malware to reach OT systems and for OT-focused attackers who have compromised IT networks to traverse into the operational layer.

The security task is not to restore the original air gap, which is neither practical nor desirable in most operations, but to implement controlled connectivity with appropriate detection and segmentation at each boundary.

Map your OT network topology

Document every system, communication path, and protocol in your OT environment. You cannot protect what you have not mapped. Asset discovery tools (Dragos, Claroty, Nozomi) provide passive network traffic analysis that identifies OT assets without active scanning that could disrupt control systems.

Implement OT/IT network segmentation

The Level 3.5 DMZ should enforce unidirectional data flow from OT to IT using data diodes or enforced proxies where possible. Where bidirectional communication is required (remote access, vendor connectivity), use an application-aware firewall with protocol-specific allowlisting.

Control all remote access paths

Every remote access path into the OT network is a potential attack vector. Use a dedicated OT jump server with MFA, record all sessions, require approval workflows for vendor access, and enforce time-limited access windows rather than persistent VPN connections.

Inventory all vendor remote access

Third-party vendors often have persistent VPN or RDP access to OT systems for maintenance. Audit and revoke unnecessary persistent connections. Enable vendor access on demand through a privileged access management solution rather than through always-on connectivity.

OT-Specific Threat Actors and Their TTPs

OT environments face a distinct threat actor landscape from corporate IT. While ransomware groups occasionally reach OT systems through IT/OT convergence (as in the Colonial Pipeline incident), the most sophisticated OT threats are nation-state groups with specific ICS capabilities and objectives.

Dragos tracks 13 dedicated ICS threat groups, the most significant of which include: VOLTZITE (overlaps with Volt Typhoon), assessed as Chinese state-aligned, which has been documented pre-positioning in US water, power, and communications infrastructure. VOLTZITE's TTPs emphasize living-off-the-land techniques and long-term persistent access designed to enable future disruption operations, not immediate impact. ELECTRUM (assessed Russian state-aligned), responsible for the CRASHOVERRIDE/Industroyer malware used against Ukrainian power infrastructure. KAMACITE, which serves as an initial access broker for Russian state-aligned groups targeting energy sector OT environments.

ICS-specific attack patterns differ from IT attacks in important ways. OT attackers invest significant time in reconnaissance before taking any action with physical consequences. They learn the specific process they intend to disrupt: what equipment is running, what protocols are in use, what process values are normal, and what manipulations would cause damage. The ZionSiphon malware analyzed by Darktrace contained hardcoded facility names and specific process parameter values for Israeli water infrastructure, demonstrating the depth of reconnaissance that precedes sophisticated OT attacks.

For defenders, this reconnaissance phase is the best detection opportunity. Anomalous HMI queries, unusual protocol traffic between levels, and unauthorized read operations against process historians often precede the destructive phase by weeks or months.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Asset Inventory and Vulnerability Management for OT

OT asset inventory is more complex than IT inventory for two reasons: OT devices often cannot respond to standard network scanning without disrupting their control functions, and OT networks contain a wider variety of proprietary protocols (Modbus, DNP3, S7comm, EtherNet/IP, PROFINET) that standard IT network tools cannot parse.

Passive network monitoring is the OT-safe approach to asset discovery. OT-specific platforms including Dragos, Claroty, Nozomi Networks, and Microsoft Defender for IoT analyze network traffic in span or tap mode, identifying OT assets, their communication relationships, and their protocol behaviors without sending any active scanning traffic that could affect control system operation. These platforms build an asset inventory from observed traffic, identify protocol anomalies, and detect communication patterns inconsistent with baseline OT behavior.

Vulnerability management in OT operates under a different risk framework than IT. The CVSS-based SLA model (critical vulnerabilities patched in 24 hours) is unworkable when patching a PLC requires a maintenance window, vendor support, and potentially recertification of the device's safety functions. ICS-CERT advisories provide the primary vulnerability intelligence source for OT systems.

The Dragos Platform and Claroty both offer OT-specific vulnerability prioritization that accounts for whether a vulnerability is exploitable via the protocols and network paths present in your specific environment, not just the CVSS score. This context-aware prioritization is essential for managing the large volumes of vulnerabilities in legacy OT systems that will never be patched in a typical enterprise timeframe.

Detection Engineering for OT Environments

OT detection strategy must balance two requirements that are in tension: detecting threats effectively, and doing so without active interrogation of control systems that could interfere with operational processes.

The primary detection architecture for OT is passive network traffic analysis with protocol-aware inspection. Industrial protocols like Modbus, DNP3, and S7comm have defined vocabularies of function codes and register addresses. A Modbus write command to a register address that controls a pump speed, arriving from a workstation that normally only reads process data, is anomalous. Protocol-aware detection engines can identify these anomalies even without understanding the specific physical process they control.

The detection hierarchy for OT should cover four layers: the IT/OT boundary (firewall logs, VPN access events, DMZ traffic); the OT network (protocol anomalies, new device appearances, unusual communication paths between levels); individual OT devices where possible (historian access logs, HMI command logs, PLC program change events); and the physical process (process variable anomalies that could indicate manipulation, such as a valve position that does not match the commanded position).

SIEM integration for OT events requires custom parsers for OT-specific data sources, since most SIEMs are designed for IT log formats. Dragos and Claroty both offer SIEM integrations that normalize OT events into SIEM-compatible formats. Build OT-specific correlation rules: an OT engineer who normally accesses the SCADA HMI during business hours accessing the historian at 2 AM from a new IP address warrants different treatment than the same activity from a standard IT account.

For OT environments that use standard IT protocols (Windows-based HMIs, active directory-joined engineering workstations), standard IT detection techniques apply at those layers. The presence of lateral movement techniques on Windows systems in OT environments, such as Pass-the-Hash or PsExec, is a critical detection signal because these techniques are inconsistent with normal OT operations.

Incident Response in OT Environments

OT incident response requires adapting standard IR procedures to account for the physical consequences of containment decisions. In IT, isolating a compromised endpoint from the network is a routine early-stage containment action. In OT, isolating a compromised HMI that is actively displaying process state to operators, or a historian that is feeding data to a safety system, could create immediate operational and safety risks.

The fundamental difference is that OT incident response must involve operations leadership from the first decision point, not just security and IT. The decision to isolate, shut down, or continue running a potentially compromised OT system is an operations and safety decision as much as a security decision. Define the decision authority and escalation chain before an incident, not during one.

OT-specific IR planning should define: which systems can be isolated without operational impact (engineering workstations, historian clients); which systems require a controlled shutdown procedure before isolation (HMIs actively controlling processes); which systems cannot be safely isolated without first transitioning the process to manual control; and what the manual operation fallback procedures are for each critical process.

Forensic investigation in OT requires OT-specific expertise. Standard digital forensics tools may not correctly acquire or parse data from PLCs, DCS controllers, or proprietary historian databases. Dragos, Claroty, and specialized ICS security firms offer OT incident response services with the engineering expertise to safely investigate OT systems without interfering with operational recovery.

Post-incident, the OT security program should address the root cause with the same rigor as an IT incident. If the breach path was an overprivileged vendor VPN account, that is a systemic access control gap, not a one-off event.

The bottom line

OT security is not IT security applied to a different environment. The constraints are different, the protocols are different, the threat actors are different, and the consequences of getting it wrong can extend beyond financial loss to physical damage, process disruption, and public safety risk. The foundational controls are OT asset inventory via passive monitoring, network segmentation at OT/IT boundaries, passive detection for protocol anomalies, and IR planning that accounts for physical process continuity. Build these before a VOLTZITE or Sandworm-level adversary forces the conversation under pressure.

Frequently asked questions

What is the difference between OT, ICS, SCADA, and DCS?

Operational Technology (OT) is the umbrella term for hardware and software that detects or causes changes in physical processes. Industrial Control Systems (ICS) is a category of OT that includes all types of automated control systems. SCADA (Supervisory Control and Data Acquisition) systems monitor and control geographically distributed processes, commonly used in utilities, pipelines, and transportation. Distributed Control Systems (DCS) are used for continuous process control within a single facility, common in oil refining, chemical plants, and power generation. PLCs (Programmable Logic Controllers) and RTUs (Remote Terminal Units) are the field-level control devices that DCS and SCADA systems supervise.

Can we use standard EDR on OT systems?

Some OT systems, particularly Windows-based HMIs and engineering workstations, can run lightweight EDR agents with careful validation. The risks are: resource consumption interfering with real-time control timing; EDR updates requiring reboots that violate OT change management processes; and EDR behavioral monitoring triggering alerts on normal OT activities. For true OT devices (PLCs, DCS controllers), EDR is not applicable. The OT-appropriate security layer for these devices is passive network monitoring, not endpoint agents.

How should we handle patching in OT environments?

OT patching follows a risk-prioritized, maintenance-window-constrained model rather than the IT model of rapid patch deployment. Prioritize patches using ICS-CERT advisories and OT-specific vulnerability platforms (Dragos, Claroty) that assess exploitability in your specific environment. Patches requiring system restart should be scheduled during planned maintenance windows, often quarterly or annually for critical control systems. Until a patch can be applied, deploy compensating controls: network-level blocks for the vulnerable service, enhanced monitoring for exploitation indicators, and vendor-provided workarounds.

What is NERC CIP and who must comply with it?

NERC CIP (North American Electric Reliability Corporation Critical Infrastructure Protection) is a set of cybersecurity standards mandatory for organizations that own or operate bulk electric system assets in North America. It covers electronic security perimeters, physical security, configuration management, vulnerability management, incident reporting, and recovery planning. Applicability is determined by asset classification: High, Medium, and Low impact designations drive which standards apply. Non-compliance carries substantial financial penalties.

How is OT incident response different from IT incident response?

The key differences are: physical consequences (containing a compromised OT system may require shutting down a physical process); operational continuity requirements (OT systems often cannot be taken offline without significant operational impact); manual fallback requirements (IR planning must define how to operate the physical process manually while digital systems are offline or under investigation); and specialized forensics (OT systems use proprietary data formats and protocols that require specialized tools and expertise to investigate safely).

What protocols are used in ICS environments and what are their security implications?

Common ICS protocols include Modbus (no authentication, no encryption, trivial to manipulate), DNP3 (designed for SCADA communication over unreliable links, limited authentication in standard implementations), S7comm (Siemens proprietary, used in Stuxnet), EtherNet/IP (Ethernet-based but with weak authentication), and PROFINET (Siemens/Ethernet-based). Most legacy OT protocols were designed for reliability and determinism, not security. Protocol-aware firewalls and passive monitoring tools that understand these protocols are essential for detecting command anomalies that standard network tools cannot interpret.

Sources & references

  1. CISA: ICS-CERT Advisories and OT Security Guidance
  2. NIST SP 800-82r3: Guide to OT Security
  3. IEC 62443: Industrial Automation and Control Systems Security
  4. Dragos: OT Cybersecurity Year in Review 2025
  5. Claroty: Global State of Industrial Cybersecurity 2025

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.