// OT & IOT SECURITY

ICS Security Assessment

Security assessment of Industrial Control Systems using IEC 62443 and NIST frameworks.

IEC 62443Framework
NIST 800-82Aligned
CRESTCertified
ZeroProduction Disruption

ICS Security Assessment

Industrial Control Systems underpin the operation of power grids, water treatment plants, oil and gas pipelines, and manufacturing facilities — making their security a matter of national importance. Intelliroot's CREST-certified ICS specialists conduct comprehensive security assessments aligned to IEC 62443 and NIST SP 800-82, covering the full Purdue model from Level 0 field devices through to the enterprise DMZ. Every assessment is conducted with a passive-first methodology to ensure absolutely zero disruption to live industrial processes.

Our assessors bring hands-on experience across diverse OT environments including DCS, PLC, RTU, and historian platforms from major vendors such as Siemens, Rockwell Automation, ABB, Honeywell, and Emerson. We move beyond checklist audits to provide a true adversarial perspective on how an attacker could traverse from the IT network into the OT environment — and what that means for operational safety and business continuity.

Why ICS Security Cannot Be Deferred

OT Is Under Active Attack

Nation-state actors and ransomware groups are actively targeting ICS environments. Incidents at Colonial Pipeline, TRITON/TRISIS, and Industroyer demonstrate that OT attacks can halt operations and endanger lives.

IT/OT Convergence Opens New Paths

Digital transformation and remote access requirements have bridged traditionally air-gapped OT networks to corporate IT — creating lateral movement paths that attackers exploit before operators are aware of the exposure.

Regulatory Mandates Are Tightening

NCIIPC CII sector guidelines, CERT-In Directions 2022, NIS2 in Europe, and NERC CIP in North America all require periodic security assessments of operational technology environments.

Legacy Systems Cannot Be Patched Like IT

OT asset lifecycles span decades. Unpatched PLCs, legacy SCADA software, and unsupported operating systems require compensating controls and network-layer mitigations that only a specialist OT assessment can correctly prescribe.

What the Assessment Covers

Asset Inventory & Architecture Review

  • Passive OT asset discovery and inventory validation
  • Purdue model zone and conduit mapping
  • IT/OT interface and DMZ architecture review
  • Remote access path enumeration (VPN, jump servers, vendor access)
  • Undocumented or rogue device identification

Network Segmentation & Protocol Security

  • Firewall rule review for OT-facing interfaces
  • VLAN and zone boundary validation
  • Industrial protocol security (Modbus, DNP3, Profibus, EtherNet/IP)
  • Unencrypted protocol exposure analysis
  • Broadcast domain assessment for OT segments

Engineering Workstation & Historian Security

  • Engineering workstation hardening review
  • Historian server security configuration
  • Removable media and USB policy assessment
  • Patch management feasibility and compensating controls
  • Anti-malware and application whitelisting review

Access Control & Patch Management

  • Privileged access management for OT systems
  • Default and shared credential review
  • Vendor remote access governance
  • OT patch management programme assessment
  • Safety system separation and interlock review

Our Assessment Approach

01

Scoping & OT Environment Briefing

Engage plant managers, ICS engineers, and IT/OT teams to understand the operational environment, define assessment boundaries, agree on passive-first rules of engagement, and identify safety-critical systems that require additional protection protocols.

02

Passive Asset Discovery & Architecture Mapping

Deploy passive network monitoring (aligned to Dragos and Claroty methodologies) to build a comprehensive asset inventory without generating traffic that could disrupt controllers or trigger safety interlocks. Map all Purdue model zones, conduits, and IT/OT interfaces.

03

Configuration Review & Document Analysis

Review firewall configurations, network diagrams, access control lists, patch records, vendor access logs, and change management documentation against IEC 62443 and NIST SP 800-82 control requirements.

04

Targeted Vulnerability Analysis

Perform controlled, low-impact vulnerability analysis against identified OT assets — prioritising known ICS CVEs, default credentials, unencrypted communications, and unsafe remote access configurations using purpose-built OT security tooling.

05

Risk Characterisation & Reporting

Characterise each finding in OT risk terms — operational impact, safety implications, likelihood of exploitation, and regulatory relevance. Deliver a detailed technical report and executive summary with a prioritised remediation roadmap tailored to OT maintenance windows.

IEC 62443 NIST SP 800-82 Purdue Model PLC Security DCS Security Modbus / DNP3 Historian Security OT Asset Inventory Network Segmentation Remote Access OT

Frequently Asked Questions

No. Our passive-first methodology ensures zero disruption to live industrial processes. We use passive network taps and out-of-band monitoring before any active analysis is performed. Any active testing is conducted only during agreed maintenance windows with plant safety personnel present.
Our ICS assessors are OT specialists with hands-on experience in industrial environments. They hold GICSP, CSSA, and CREST certifications and have worked in power, oil and gas, water, and manufacturing sectors. They understand PLC ladder logic, DCS configuration, and the operational constraints that make OT security fundamentally different from IT security.
The assessment is primarily aligned to IEC 62443-2-1 (security management) and IEC 62443-3-3 (system security requirements), cross-referenced with NIST SP 800-82 Rev 3 and NCIIPC sector-specific guidelines where applicable. Findings are mapped to relevant framework controls to support regulatory submissions.
Yes. We regularly assess environments with strict air-gap policies. Our assessment approach for air-gapped systems relies on on-site passive monitoring, direct device configuration review, and manual inspection of engineering workstations and removable media controls rather than network-level testing.

Deliverables

ICS Security Assessment Report

Comprehensive technical findings covering all Purdue model zones, vulnerabilities identified, and risk characterisation in OT operational terms.

OT Asset Inventory

Validated inventory of all discovered OT assets with vendor, model, firmware version, communication protocols, and zone classification.

Network Architecture Diagram

Annotated network topology showing Purdue model zones, conduits, IT/OT interfaces, and identified exposure points.

IEC 62443 / NIST 800-82 Gap Register

Control-by-control gap assessment mapped to IEC 62443 and NIST SP 800-82 with maturity scoring and remediation priorities.

OT Remediation Roadmap

Phased remediation plan structured around OT maintenance windows, operational constraints, and asset lifecycle considerations.

GET STARTED
Accepting New Engagements · 24h Response

Request a Security Assessment

Tell us about your environment and security objectives. We'll design a bespoke assessment and deliver a detailed proposal within 48 hours.

Scoping Call with a Certified Consultant 45-minute deep-dive with a senior practitioner — no sales pitch.
Proposal Delivered in 48 Hours Fully scoped engagement plan with pricing and timeline.
Free Attack Surface Analysis Preliminary external exposure report at no cost.
Fully Confidential. NDA Available. No obligation. Your data is never shared.
200+ Engagements
40+ Services
98% Satisfaction
CERT-In Empanelled ISO 27001 OSCP · CEH · CISSP
1
You
2
Service
3
Details

About You

We'll use this to route you to the right expert.

What Do You Need?

Select all that apply — you can pick multiple.

Select at least one area to continue.

Final Details

Optional context to help us scope your engagement.

By submitting, you agree to our Privacy Policy. We'll never share your data.