Industrial Control System Security
This article is for educational purposes only and does not constitute professional compliance advice or legal counsel. Requirements and standards evolve, and you should consult with a qualified compliance professional about your specific situation.
Your manufacturing facility's production capability depends on systems that were engineered to run for decades with minimal modification. Those same systems are now targets for attackers who understand that disrupting critical infrastructure—including manufacturing—creates cascading effects across supply chains and economies. Industrial control systems are increasingly under attack, and they're not particularly well-defended because the engineers who built them were optimizing for reliability and uptime, not security.
Industrial control systems are fundamentally different from the IT systems that run your business network. They're more fragile, more difficult to monitor, more exposed to vendor dependencies, and less capable of incorporating modern security controls. But they're also more critical—their compromise doesn't just mean losing data, it means losing production, potentially damaging expensive equipment, or in worst cases, creating safety hazards.
The Architecture of Industrial Control
Understanding how industrial control systems work is the prerequisite for securing them. ICS architecture typically consists of several layers, starting with field devices at the very bottom—sensors that measure temperature, pressure, flow rates, and other physical parameters, plus actuators that open valves, adjust speeds, or trigger switches. These field devices communicate upward through protocols that are often proprietary or non-standard, and almost always designed for reliability over security.
Above the field devices sits the programmable logic controller, or PLC, which is the brain of the operation. A PLC takes input from sensors, runs logic against those inputs—if temperature exceeds this level, close that valve; if pressure drops below this threshold, alert an operator—and sends commands to actuators. PLCs are industrial-grade computers. They're built to run the same code continuously for years without reboot, to tolerate wide temperature ranges and electrical noise that would destroy a commercial server, and to have extremely deterministic behavior. A PLC isn't doing general computation. It's executing a loop that reads sensors, runs logic, and writes outputs, hundreds of times per second.
Supervisory control and data acquisition systems, typically called SCADA, layer on top of the PLCs and field devices. A SCADA system aggregates data from multiple PLCs across a facility or even across a distributed network of facilities. It provides human operators with visibility into what's happening, and it enables some higher-level automation. SCADA systems can trigger alerts if parameters fall outside acceptable ranges, can log historical data for analysis, and can accept commands from operators. If your facility has multiple production lines or multiple locations, SCADA is often the system that coordinates across them.
The top layer increasingly consists of historians and analytics systems—databases that record time-series data from your SCADA and PLCs, enabling you to see trends, diagnose problems, and sometimes feed data into machine learning models. This is where industrial control gets connected to the IT world, and this is where the security model starts breaking down.
SCADA and PLC Vulnerabilities
PLCs and SCADA systems have several characteristics that make them particularly vulnerable and particularly difficult to defend. Many of them were engineered in an era when network security wasn't a primary concern. They often support default credentials that can't be changed, have minimal authentication, support older protocols that transmit data in clear text, or have no authentication at all. Some PLCs are directly accessible from the network with no credentials whatsoever—you connect, you can read and modify.
Firmware updates for PLCs are uncommon and often proprietary to specific hardware models. A vulnerability discovered in your PLC might not be patchable at all—you have to call the vendor, arrange a service window, and have a technician install new firmware. For some end-of-life systems, there is no vendor support and no path to patching. The vulnerability exists and will continue to exist for as long as the hardware is in service.
Many older SCADA systems don't support encryption. Data that flows from your field devices to your SCADA system, or from SCADA to your historians, is transmitted in the clear. An attacker with network access can see every sensor reading, every command, potentially every piece of operational data moving through your system. More concerning, they can inject false data or commands into that stream.
The combination of minimal authentication, no encryption, and long operational lifespans creates an environment where network access is tantamount to control. If an attacker reaches your ICS network—through a compromised connection, through supply chain compromise, through an employee's laptop with malware that bridges the gap—they potentially have complete control over your production.
The Safety-Security Trade-off
Manufacturing has been managing safety for decades. Your facility probably has extensive safety systems—mechanical interlocks that prevent physically impossible states, alarm systems that trigger if parameters go out of range, emergency stops and failsafes that protect people and equipment. These safety systems are critical and they're usually well-engineered.
The problem is that safety and security are sometimes at odds. A safety system might be designed to be accessible—so that any operator can trigger an emergency stop, or so that any technician can access control logic to diagnose a problem. That accessibility is good for safety and terrible for security. An attacker who can access what a technician can access can potentially cause exactly the damage that the safety system is meant to prevent.
The classic example is the emergency stop circuit. You want this to be accessible, reliable, and guaranteed to work. You don't want the emergency stop protected by a password that operators might forget, or that requires authentication in a way that might delay stopping a dangerous situation. So the emergency stop is usually hardwired, always accessible, and always enabled. But that design prioritizes safety over security. An attacker with access to that circuit might be able to trigger false emergencies, disrupt production, or even cause damage by stopping equipment at the wrong time.
Another common trade-off is the difference between a tightly locked down control system and one that allows remote access for technician support and vendor maintenance. Remote access is valuable for troubleshooting and for emergency response. It also creates an additional attack surface. Vendors who need remote access to diagnose problems require network paths to your systems. Technicians need connectivity to configure and update PLCs. All of that access is valuable, and all of it represents risk.
The reality is that you can't perfectly optimize for both. Most manufacturing facilities accept that safety comes first and security comes second. They implement security controls that don't compromise safety, but they won't sacrifice safety to strengthen security. That's a reasonable risk decision, but it means you're operating in a threat environment where some vulnerabilities can't be eliminated.
Air-Gapping and Network Segmentation
The traditional security model for industrial control was air-gapping—physically isolating the ICS network from any connection to the outside world or to the corporate IT network. No ethernet cables connecting to the internet, no wireless, no external connections at all. Data had to move manually—if you wanted to know what happened on the production line yesterday, someone physically transported a USB drive from the ICS network to a computer that could access the internet.
Air-gapping works. It eliminates the entire category of network-based remote attacks. But it comes at a cost. You lose real-time visibility into production. You can't integrate your ICS data with your ERP system or your analytics platform without manual data movement. You can't deploy technicians to diagnose problems remotely. You can't maintain a modern supply chain where production systems need to communicate with suppliers and customers.
Most manufacturing organizations now need some level of connectivity. The real-world model is network segmentation—isolating the ICS network from the corporate network but providing carefully controlled bridges between them. You might have a data diode that allows data to flow from ICS to IT but never the reverse. You might have a firewall with strict rules about what traffic is permitted between zones. You might have application-level gateways that mediate communication and validate data before it passes between zones.
The challenge is that segmentation creates a new set of problems. Every connection between zones is a potential attack vector. Attackers increasingly focus on compromising the systems or networks on one side of the boundary, then using that foothold to attack the other side. A compromised IT system connected to your ICS network becomes a pivot point. A compromised external vendor with access to your OT becomes an entry point.
Monitoring and Anomaly Detection
Defending industrial control systems requires understanding normal operation well enough to detect when something abnormal happens. Unlike IT systems, where attack indicators might be suspicious user behavior or unexpected processes running, ICS anomalies are often subtle changes in operational patterns.
A SCADA system that sends 100 temperature readings per minute, day after day, and suddenly starts sending 50 readings—that's an anomaly. A production line that cycles through its operations in 30 seconds and suddenly takes 40 seconds—that's potentially significant. A control variable that oscillates around a setpoint and suddenly becomes completely stable—that might indicate an attacker has taken manual control.
The problem is that implementing monitoring on ICS systems is difficult. Many older SCADA systems can't export data in standard formats. They don't have APIs or standard logging mechanisms. Attaching external monitoring tools might introduce latency or computational overhead that impacts performance. Some systems can only be monitored passively by watching network traffic rather than querying the systems directly.
The other challenge is that IT-style monitoring might trigger false alarms in the manufacturing context. A sudden change in traffic patterns might be a legitimate operational change—a maintenance window, a new production schedule, a rebalancing of load across systems. False alarms create alert fatigue and reduce the credibility of your monitoring system.
Effective ICS monitoring usually requires domain expertise. You need people who understand the specific processes being controlled, who know what normal looks like, and who can evaluate whether an anomaly is a threat or a legitimate operational change. That expertise is in short supply, and it's expensive to maintain.
Vendor Support and the Patching Problem
Industrial control systems typically come from vendors who are not Microsoft, not Apple, not companies operating in the rapid patch-release cycle of commercial software. These are specialized hardware and software providers who might release patches every few years, or not at all.
Many organizations face a situation where there's a known vulnerability in their PLC, SCADA system, or control software, and patching it is not an option. The vendor is out of business, or the system is end-of-life, or the patch requires downtime that the organization can't tolerate. In those cases, the control strategy becomes compensating controls—network segmentation, monitoring, access restrictions—rather than fixing the vulnerability itself.
The relationship with your vendors is therefore different from the relationship IT organizations have with software vendors. You can't simply download a patch and apply it. You need vendor support to test patches in your environment, to apply them without disrupting production, and to back out the patch if something goes wrong. That requires planning, coordination, and often significant lead time.
Some vendors are responding to this by moving to a continuous update model for new products, but the installed base of ICS equipment is decades old. Many facilities are running equipment that hasn't been updated in 10 or 20 years and won't be updated for another 10 or 20 years. That's fine from a reliability perspective. From a security perspective, it means you're stuck with whatever vulnerabilities exist and whatever mitigations you can implement at the network boundary.
Incident Response for Industrial Control Systems
When something goes wrong in an ICS—whether it's a cyberattack, a software glitch, or a hardware failure—your incident response priorities are very different from IT incident response. In IT, you might take a system offline for forensics, for investigation, to prevent further compromise. In ICS, you might need to keep running because downtime costs money and potentially creates safety risks. A process that's been interrupted might need to be safely shut down or brought back to a known state.
ICS incident response requires coordination between your security team and your operations team. Your security team wants to isolate affected systems, gather evidence, and prevent the attacker from moving laterally. Your operations team wants to keep the plant running, and they're willing to accept some security risk to do so. That tension needs to be explicitly discussed and managed before an incident occurs.
The forensics challenge in ICS is also different. Unlike IT systems, which generate extensive logs and create artifacts of attacker activity, industrial control systems generate minimal data. A PLC doesn't log every command it receives. A sensor reading once per minute might be the only record of what happened. If the attacker used capabilities that are indistinguishable from legitimate operator actions, there might be no evidence of compromise at all.
Testing and Validation Without Disruption
Security improvements to industrial control systems need to be tested before they go live. You can't apply a firewall rule, a network change, or a monitoring configuration directly to production and hope it works. But you also can't disrupt production for testing.
This requires maintaining a test environment that accurately mirrors your production ICS environment. That's expensive and difficult. Your production SCADA system is running specific hardware, specific firmware versions, specific control logic. Replicating that in a test environment requires significant investment. Some organizations simply don't have test environments because the cost of setting one up is hard to justify.
The alternative is incremental change in production, carefully monitored, with rapid rollback plans. You implement a change in a way that's reversible, monitor it closely for any indication that it's causing problems, and back out if needed. That works, but it means you're accepting some risk that changes might have unintended consequences.
The Long Game
Industrial control systems will remain a security challenge because their fundamental characteristics—long operational lifespans, minimal ability to patch, vendor dependencies, safety-first design philosophy—are unlikely to change. The attackers have demonstrated that these systems are valuable targets, and the attack sophistication is increasing. Building a security posture for ICS means accepting that you'll operate in a threat environment where some vulnerabilities can't be eliminated, and focusing your investments on the controls that provide the most meaningful protection given your constraints.
Fully Compliance provides educational content about IT compliance and cybersecurity in specific industry contexts. This article reflects general information about industrial control systems security as of its publication date. Threat landscapes, technology capabilities, and vendor offerings evolve—consult with qualified professionals for guidance specific to your manufacturing environment.