Dr. Antje Winkler
OT/IT Security Test
OT/IT Security Test
With our expertise, we support you in comprehensively examining your OT systems and identifying potential security gaps. Due to our broad range of services, we can examine both externally and internally accessible systems and thus identify threats in a wide variety of areas:
Nowadays, OT systems are increasingly connected to a wide variety of external and internal IT systems (e.g., cloud or on-premises solutions) in order to implement various use cases like:
For this, various network technologies such as Ethernet or LoRaWAN are used. The necessary interconnection of OT and IT systems results in a large number of attack vectors.
To counter this risk, we examine the interfaces and components of your OT solutions in a penetration test.
Targeted attacks on production systems such as Stuxnet or Industroyer have shown the scope of successful attacks on industrial systems and highlight the need to evaluate the security measures implemented in such systems.
Penetration tests of networked production plants or individual components (ICS/SCADA systems, PLC/SPS, sensors/actuators, network hardware or embedded devices) allow to identify weak points in these systems at an early stage and thus minimize vulnerabilities.
Freely accessible interfaces and devices in public areas, such as conference rooms and supplier entrances, can pose a significant security risk. They can be used by attackers to manipulate individual devices in your OT environments and, in the worst case, to compromise the entire network. We help you to uncover these entry points and protect your OT infrastructure.
OT systems often use resource-efficient hardware and sometimes outdated software components, which makes classic penetration tests more difficult as they can lead to undesirable behavior and crashes with serious consequences. Therefore, a manual configuration check is often better suited.
Such hardening checks can also be useful before new components are rolled out in the productive environment. We are happy to support you in determining and checking suitable hardening measures for your OT environments.
The penetration testing process of BDO Cyber Security GmbH is based on the five-step approach defined in “Study A Penetration Testing Model”, published by the German Federal Office for Information Security (BSI) and adapted to the special features of tests in the OT environment:
During the first phase of the penetration test, test objectives as well as organizational, technical, and legal aspects are coordinated with the client. As critical infrastructures must not be impaired by the test activities, particular care must be taken when planning a penetration test in an OT environment. Depending on the environment under test, the depth of the test and the resulting consequences must be weighed up.
The results of this phase are documented in a contract, which serves as the legal basis for commissioning the penetration test.
In phase 2, the information and documents provided by the customer are examined, thereby gathering preliminary information about components and protocols of the OT environment to be tested.
In parallel, it will be verified whether access to all test components is possible.
Based on the information gathered during previous phases, the list of planned test cases - and therefore the time required - can be adjusted for selected components according to their relevance. This involves identifying, analyzing, and prioritizing potential threats and attack vectors (e.g., based on damage potential, likelihood of success, and possible impacts).
Following the initial analyses, active intrusion attempts are conducted. For this purpose, selected test cases for each component in scope will be executed.
In the OT environment, especially in production environments, testing is carried out with the utmost care to minimize disruption or damages. Due to the unique nature and complexity of the devices and protocols in OT infrastructures, the approach differs fundamentally from traditional IT penetration tests. Industrial control systems, for example, often use resource-efficient hardware and outdated software, which usually precludes automated scans and attacks on known vulnerabilities as these can lead to undesirable behavior and crashes with serious consequences.
If a test case reveals a (potential) vulnerability, its exploitability and impact are examined:
Furthermore, evidence is gathered for each vulnerability, such as screenshots or step-by-step instructions to reproduce the attack or provoke specific system behaviors.
All tests are mainly carried out manually.
The penetration test is concluded with the Final Analysis and Clean-Up Phase. During the final analysis, all results from the previous phases are compiled into a detailed report, including:
If necessary, remnants of the test activities are also removed in this phase.
In the context of the penetration test, test cases are selected and executed based on testing guidelines. While the BSI model for penetration tests categorizes test cases into modules for information gathering (I-Modules) and intrusion attempts (E-Modules), BDO Cyber Security GmbH employs its own framework. The primary reason for this is that the I- and E-Modules can only be applied to OT environments to a limited extent.
BDO Cyber Security GmbH's framework is based on recognized, current standards. In addition, BDO Cyber Security GmbH has developed its own catalog with detailed test cases for individual technologies and standards. This catalog is based on current recommendations and best practices for the respective technologies and is constantly being developed further, taking new security vulnerabilities into account.