Technical Guides
Comprehensive technical guides on OT security architecture, standards implementation, and industrial network protection. Authored by OT security practitioners.
Modbus TCP Security: Vulnerabilities, Attacks, and Defenses
A deep-dive technical guide to Modbus TCP security. Covers the protocol's inherent security limitations, known attack techniques including the ones used in PIPEDREAM, Modbus-aware firewall configuration, unauthorized read/write detection, monitoring for anomalies, and compensating controls for legacy Modbus installations.
Read GuideOT Security Monitoring Platform Deployment Guide
A step-by-step deployment guide for OT security monitoring platforms. Covers platform selection criteria, sensor placement using TAPs and SPAN ports, protocol decoder configuration, baseline learning periods, alert tuning methodology, SIEM integration, and multi-site deployment.
Read GuideMITRE ATT&CK for ICS: A Practitioner's Implementation Guide
A detailed guide to implementing MITRE ATT&CK for ICS as a practical security tool. Covers the ICS matrix structure, mapping detection capabilities to techniques, using ATT&CK for threat modeling and gap analysis, building detection rules, and integrating with risk assessment and reporting.
Read GuideOT Backup, Recovery, and Business Continuity Planning
A practical guide to backup strategy, recovery procedures, and business continuity planning for OT environments. Covers PLC logic backup, HMI and server imaging, offline storage, recovery time objectives, and testing recovery procedures through tabletop exercises.
Read GuideIndustrial DMZ Design and Implementation Guide
A complete design and implementation guide for the IT/OT Industrial Demilitarized Zone. Covers dual-firewall architecture, component placement, data flow patterns, high-availability design, monitoring the DMZ, and a step-by-step implementation checklist.
Read GuideOT Asset Inventory and Management: Tools, Techniques, and Processes
A complete guide to building and maintaining OT asset inventory programs. Covers passive and active discovery methods, required data fields per device type, inventory accuracy maintenance, integration with vulnerability management, and tools comparison for industrial environments.
Read GuideSecure Remote Access Architecture for OT Environments
Remote access to OT systems is among the highest-risk areas in industrial cybersecurity. This guide provides a complete architecture for secure OT remote access, covering jump server design, MFA implementation, session recording, vendor access management, and IEC 62443 alignment.
Read GuideOT Endpoint Security: Hardening Workstations, Servers, and Controllers
A hands-on guide to securing OT endpoints, from Windows-based HMIs and engineering workstations to industrial servers and PLCs. Covers application whitelisting, OS hardening, antivirus limitations, USB controls, and controller-level protection for industrial environments.
Read GuideBuilding an OT Security Operations Center: Design, Staff, and Operate
A practical guide to designing and operating a Security Operations Center for OT environments. Covers SOC model selection, technology stack, staffing requirements, playbook development, integration with enterprise security operations, and maturity measurement.
Read GuideOT Firewall Design and Rule Management for Industrial Networks
A technical guide to designing, deploying, and maintaining industrial firewalls in OT environments. Covers architecture selection, OT protocol-specific rule design, change management, and rule lifecycle management for IEC 62443-aligned segmentation.
Read GuideOT Security for CISOs: A Strategic Guide to Industrial Cybersecurity Governance
A strategic guide for CISOs and security leaders inheriting OT security responsibility, covering governance structures, organizational models, metrics, vendor management, board-level reporting, and building an OT security program from enterprise security foundations.
Read GuideIEC 62443 Compliance Guide: From Gap Assessment to Security Level Certification
A practitioner's guide to achieving IEC 62443 compliance in industrial environments, covering the complete standard series, Security Level targeting, gap assessment methodology, zone and conduit modeling, control implementation priorities, and preparing for third-party certification audits.
Read GuideOT Cybersecurity Risk Assessment: A Practitioner's Guide to Quantifying Industrial Risk
A complete guide to conducting cybersecurity risk assessments for OT environments, covering threat modeling for industrial processes, consequence analysis, likelihood estimation, risk scoring methodologies aligned with IEC 62443, and building risk treatment plans that operations teams will actually implement.
Read GuideIndustrial Protocol Security: Protecting Modbus, DNP3, OPC, and Beyond
A technical guide to securing industrial communication protocols in OT environments, covering the vulnerabilities of legacy protocols like Modbus TCP and DNP3, the security capabilities of OPC UA, deep packet inspection strategies, protocol-aware firewalling, and encryption options for industrial networks.
Read GuideOT Access Control and Identity Management: Securing Human and Machine Access
A practical guide to implementing access control and identity management in OT environments, covering the unique challenges of shared accounts, vendor access, role-based access, multi-factor authentication, privileged access management, service account governance, and physical-cyber convergence.
Read GuideOT Network Segmentation: Implementing Zones and Conduits for Industrial Security
A practical guide to designing and implementing network segmentation for OT environments using the Purdue model and IEC 62443 zones and conduits, covering DMZ architecture, firewall rule design for industrial protocols, and common segmentation pitfalls.
Read GuideSCADA Security Best Practices: Protecting Supervisory Control Systems
A detailed guide to securing SCADA systems covering architecture, network segmentation, protocol security, access control, monitoring, remote access, and defense-in-depth strategies for protecting supervisory control and data acquisition infrastructure.
Read GuideOT Incident Response Planning: Preparing for Cyber Events in Industrial Environments
A complete guide to building an OT incident response capability, covering team structure, playbook development, containment strategies that preserve safety, evidence collection, tabletop exercises, and recovery procedures for industrial environments.
Read GuideOT Vulnerability Management: A Complete Guide for Industrial Environments
A practical guide to building and maintaining a vulnerability management program for OT environments. Covers asset inventory, risk-based prioritization, compensating controls for unpatchable systems, and metrics for sustainable improvement.
Read GuideOT Security Architecture: Designing Defense-in-Depth for Industrial Environments
A practical guide to designing defense-in-depth security architecture for OT environments. Covers network segmentation, the Purdue model, remote access, asset management, monitoring, patch management, and incident response.
Read Guide