In IT, a failed patch means a server reboots and an application is unavailable for 15 minutes. In OT, a failed patch can mean a turbine shuts down, a chemical process loses containment, or a city loses power. This fundamental difference in consequence drives everything about how vulnerability management works in operational technology environments.
OT/ICS environments present challenges that IT-focused vulnerability management programs were never designed to handle. Equipment runs for decades without upgrades. Protocols like Modbus, DNP3, and OPC UA have no built-in authentication. Patching requires maintenance windows that may only occur twice a year. And the vendor who supplied the programmable logic controller (PLC) may not even exist anymore.
Despite these challenges, the threat is accelerating. The number of ICS-CERT advisories has grown 67% since 2022. State-sponsored threat actors have demonstrated the ability and willingness to target industrial control systems, from Stuxnet to the TRITON malware to Volt Typhoon's infiltration of US critical infrastructure networks.
The Purdue Model: Understanding OT Network Architecture
The Purdue Enterprise Reference Architecture (PERA) defines a hierarchical model for industrial network segmentation. Understanding this model is essential for vulnerability management in OT because the scanning approach, patching cadence, and risk tolerance change at each level.
- Level 0 - Physical Process: Sensors, actuators, and the physical equipment they control. These devices typically have no operating system to patch. Vulnerabilities are in the firmware, and remediation may require physical replacement.
- Level 1 - Basic Control: PLCs, RTUs, and safety instrumented systems (SIS). These run proprietary firmware or embedded operating systems. Patching is rare and requires vendor-specific procedures with extensive testing.
- Level 2 - Area Supervisory: SCADA servers, HMIs (Human Machine Interfaces), and engineering workstations. Often running Windows or Linux, but locked to specific versions validated by the ICS vendor. Patching requires vendor approval.
- Level 3 - Site Operations: Historians, domain controllers, and application servers that serve the OT environment. These are closest to standard IT systems and are the most patchable layer in OT.
- Level 3.5 - DMZ: The boundary between OT and IT networks. Data diodes, jump servers, and security appliances. This is the critical segmentation boundary that prevents direct IT-to-OT access.
- Levels 4-5 - Enterprise IT: Standard IT infrastructure. Managed with conventional VM programs.
Why Traditional Vulnerability Scanners Fail in OT
Running a Nessus or Qualys scan against an OT network is not just ineffective, it is potentially dangerous. Traditional IT vulnerability scanners were designed for systems that can handle unexpected network traffic gracefully. OT devices were not.
The Risks of Active Scanning
- Device crashes: Many PLCs and RTUs will crash or reboot when they receive unexpected network packets. A SYN scan that is harmless against a Windows server can cause a Siemens S7 PLC to enter a fault state, shutting down the process it controls.
- Protocol confusion: OT protocols like Modbus have no concept of authentication or session management. A scanner probing Modbus port 502 can inadvertently send commands that change setpoints or toggle outputs.
- Network saturation: OT networks often run at lower bandwidths than IT networks. A scanner generating high packet volumes can saturate the network and cause communication timeouts between controllers and sensors.
- Deterministic timing disruption: Many OT processes require deterministic network timing. Scanner traffic can introduce jitter that causes timing violations in real-time control loops.
OT-Safe Scanning Approaches
The OT security industry has developed scanning approaches specifically designed for industrial environments:
- Passive network monitoring: Instead of actively probing devices, deploy network sensors that passively observe OT traffic and identify devices, firmware versions, and protocols through traffic analysis. Tools like Claroty, Nozomi Networks, and Dragos use this approach.
- Configuration file analysis: Export device configurations (PLC programs, HMI projects) and analyze them offline for vulnerabilities and misconfigurations. No network traffic to the device required.
- Vendor-approved active scanning: Some ICS vendors have validated specific scanner configurations for their devices. Use only vendor-approved scan profiles and only during maintenance windows.
- Manual inventory and cross-reference: For the most sensitive Level 0-1 devices, maintain a manual asset inventory with firmware versions and cross-reference against ICS-CERT advisories and vendor security bulletins.
ICS-CERT Advisories: The Primary Intelligence Source
CISA's ICS-CERT publishes advisories specifically for vulnerabilities in industrial control systems. These advisories are the primary intelligence source for OT vulnerability management, and they differ from standard CVE records in important ways:
- Vendor-specific remediation: ICS-CERT advisories include vendor-provided mitigation guidance that accounts for OT-specific constraints. This is far more actionable than generic NVD remediation advice.
- Impact assessment for OT: Advisories describe the potential impact in OT terms (process disruption, safety system bypass, unauthorized access to control functions) rather than generic CIA impact ratings.
- Compensating controls: When patches are unavailable or cannot be applied, ICS-CERT advisories recommend compensating controls such as network segmentation, access restrictions, and monitoring enhancements.
- Coordinated disclosure: Advisories are published after vendor coordination, meaning patches or mitigations are typically available when the advisory is released.
Patching in OT: When You Cannot Just Apply the Update
The IT patching model of "test briefly, deploy broadly, roll back if broken" does not apply in OT. OT patching requires:
- Vendor validation: Before applying any patch to an ICS component, confirm with the vendor that the patch has been validated for your specific product version and configuration. Applying an unvalidated patch can void warranties and break certified safety systems.
- Lab testing: Test the patch in an environment that replicates your production OT configuration. This is expensive (lab environments for OT can cost hundreds of thousands of dollars) but essential for critical systems.
- Maintenance window coordination: OT patches can only be applied during scheduled maintenance windows, which may occur quarterly or annually. Plan patches months in advance and batch related updates.
- Rollback planning: Have a tested rollback procedure before applying any patch. In OT, "roll forward" is not an option when the patch causes a process disruption.
- Revalidation: After patching, revalidate that the OT system operates within its safety and operational parameters. This may require process engineers, not just IT staff.
Compensating Controls: Protecting What You Cannot Patch
Given that many OT systems cannot be patched promptly (or at all), compensating controls are the primary risk mitigation strategy:
- Network segmentation: Enforce strict segmentation between IT and OT networks (Level 3.5 DMZ). Use data diodes for unidirectional data flow where possible. Segment within OT based on process criticality.
- Access control: Implement multi-factor authentication for all remote access to OT networks. Restrict engineering workstation access to authorized personnel only. Disable unnecessary protocols and services on OT devices.
- Network monitoring: Deploy OT-aware intrusion detection systems that understand industrial protocols. Baseline normal traffic patterns and alert on anomalies that may indicate compromise.
- Physical security: OT devices at Levels 0-2 should be in physically secured locations. Limit USB port access. Control physical access to engineering workstations.
- Application whitelisting: On HMIs and engineering workstations (Level 2-3), deploy application whitelisting to prevent unauthorized executables from running, even if an attacker gains access.
Building an OT Vulnerability Management Program
Step 1: Asset Inventory
You cannot protect what you do not know exists. Build a comprehensive OT asset inventory that includes device type, manufacturer, model, firmware version, network address, physical location, and process criticality. Passive discovery tools can bootstrap this inventory, but manual validation is essential for accuracy.
Step 2: Vulnerability Identification
Cross-reference your asset inventory against ICS-CERT advisories, vendor security bulletins, and NVD data. This is a continuous process, not a one-time exercise. New advisories are published weekly.
Step 3: Risk-Based Prioritization
Prioritize based on: process criticality (does this device control a safety-critical function?), network exposure (is the device reachable from IT or the internet?), exploit availability (is there a public exploit?), and compensating control status (are existing controls effective?).
Step 4: Remediation or Mitigation
For each vulnerability, determine whether to patch (during the next maintenance window), mitigate (apply compensating controls), or accept the risk (with documented justification and monitoring). The majority of OT vulnerabilities will be mitigated rather than patched.
Step 5: Continuous Monitoring
Deploy passive monitoring to detect exploitation attempts, unauthorized changes, and anomalous behavior. Monitor the IT/OT boundary aggressively. Treat any unexpected traffic crossing the DMZ as a high-priority security event.
The Bottom Line
OT vulnerability management is not IT vulnerability management applied to different devices. It is a fundamentally different discipline that requires different tools, different processes, and different risk tolerance. Active scanning can cause physical harm. Patching requires months of planning. And many devices will never be patched at all.
The organizations that secure their OT environments effectively accept these constraints and build programs around them: passive discovery, continuous monitoring, aggressive segmentation, and compensating controls for what cannot be patched. They also invest in IT/OT convergence security, recognizing that the most common attack path to OT systems is through the IT network.
The threat to critical infrastructure is not theoretical. It is documented, growing, and backed by nation-state resources. The question is not whether your OT environment has vulnerabilities. It does. The question is whether you have the visibility, prioritization, and compensating controls to manage them before an adversary exploits them.