Quotes Icon

Andrew M.

Andrew M.

VP of Operations

"We use TeamPassword for our small non-profit and it's met our needs well."

Get Started

Table Of Contents

    ICS screen with industrial plant in background

    Cybersecurity for Industrial Control Systems: Best Practices

    March 19, 202520 min read

    Cybersecurity

    Imagine a hacker remotely seizing control of your city's power grid, or causing equipment failures at a water treatment plant serving millions. These aren't just plot devices from a Hollywood thriller—they represent very real vulnerabilities in the industrial control systems that power our modern world.

    From the electricity keeping your lights on to the automated systems ensuring your drinking water is safe, industrial control systems (ICSs) silently manage the critical infrastructure we depend on daily. But as these once-isolated systems become increasingly connected to networks and the internet, they've become prime targets for cybercriminals and nation-state actors.

    Industrial control systems (ICSs) are the backbone of critical infrastructure. Power plants, water treatment facilities, and manufacturing plants rely on their smooth operation. These systems monitor and control physical processes, such as temperature, pressure, and flow. However, these systems are also increasingly exposed to cyber threats that can compromise their availability, integrity, and safety. In this guide, we will discuss the common threats to ICSs, why cybersecurity is important for these systems, and the best practices to secure them.

    Here are the key things you need to know about cybersecurity for industrial control systems:

    • ICSs face various cyber threats, such as ransomware, malware, and advanced persistent threats (APTs), that disrupt service and cause permanent damage. 
    • ICS cybersecurity is important to protect critical infrastructure, ensure operational continuity, and prevent physical and environmental harm.
    • ICS cybersecurity differs from traditional IT security and presents challenges such as legacy systems, new technology integration, and regulatory compliance.
    • ICS security requires a holistic approach that includes network segmentation, patching and updating software, training employees, implementing multi-factor authentication, and more.
    Table of Contents

      Common Threats for Industrial Control Systems (ICS)

      ICSs are not immune to cyberattacks. In fact, they are often targeted by malicious actors who seek to disrupt or damage critical infrastructure. Some of the common threats to ICSs include:

      Ransomware: This is a type of malware that encrypts data or systems and demands a ransom for decryption. Ransomware can affect ICSs by locking operators out of their systems or preventing them from accessing vital information. For example, in 2017, the NotPetya ransomware infected several industrial organizations, including a Ukrainian power company and a Danish shipping company.

      Malware: This is a general term for any malicious software that can harm or compromise a system. Malware can affect ICSs by stealing data, altering settings, disrupting operations, or causing physical damage. In 2010, the Stuxnet malware targeted Iranian nuclear facilities and caused centrifuges to spin out of control.

      APTs: These are advanced persistent threats that are carried out by sophisticated and well-resourced adversaries who aim to infiltrate and persist in a network for a long time. APTs can affect ICSs by conducting espionage, sabotage, or theft. In 2015, the BlackEnergy APT group launched a cyberattack against Ukrainian power grids and caused blackouts for hundreds of thousands of customers.

      Why ICS Cybersecurity Is Important

      The importance of ICS cybersecurity cannot be overstated. Securing these systems is essential for:

      • Protecting critical infrastructure: ICSs are responsible for delivering essential services that support the economy and society. A cyberattack on these systems can have severe consequences for public health, safety, and security. For example, a cyberattack on a water treatment plant could contaminate the water supply or cause flooding.
      • Ensuring operational continuity: ICSs are vital for maintaining productivity and efficiency in various industries. A cyberattack on these systems can cause downtime, loss of revenue, or reputational damage. For example, a cyberattack on a manufacturing plant could halt production or compromise product quality.
      • Preventing physical and environmental harm: ICSs control physical processes that involve hazardous materials or high-energy equipment. A cyberattack on these systems can cause physical injury or death to workers or civilians or environmental damage. For example, a cyberattack on a gas pipeline could cause an explosion or a fire.

      The Challenges of Securing Industrial Control Systems

      Securing ICSs is not an easy task. There are several differences between traditional IT security and ICS security that pose various challenges:

      • Legacy systems: Many ICSs were designed decades ago when cybersecurity was not a priority. These systems often run on outdated hardware and software that have known vulnerabilities or lack security features. Moreover, these systems are difficult to replace or upgrade due to high costs or operational constraints.
      • New technology integration: As technology evolves, many ICSs are adopting new technologies such as cloud computing, internet of things (IoT), or wireless communication. These technologies can improve performance and functionality but also introduce new attack vectors and risks. Furthermore, these technologies may not be compatible with legacy systems or existing security measures.
      • Regulatory compliance: ICSs operate in highly regulated environments that require adherence to various standards and regulations. These regulations may vary by industry or region and may impose specific requirements or limitations on security practices. Additionally, these regulations may not keep pace with the changing threat landscape or technology trends.

      1. Segment Networks: Creating Defensive Perimeters in Industrial Environments

      Network segmentation functions as a critical architectural control in industrial environments because of how these systems fundamentally differ from IT networks. Industrial control systems typically have hierarchical structures that naturally lend themselves to segmentation, following what's known as the Purdue Enterprise Reference Architecture.

      When implementing segmentation for ICS environments, you'll need to consider several layers:

      Level 0-1 (Field Devices and Control): This includes your PLCs, RTUs, and direct sensors/actuators. These devices directly interact with physical processes and require the strictest protection. They should reside in their own isolated network segment with extremely limited access from higher levels.

      Level 2 (Supervisory Control): This layer contains HMIs, engineering workstations, and SCADA servers. While these systems need to communicate with field devices, they should exist in a separate network segment with controlled access paths.

      Level 3-5 (Operations and Enterprise): These upper layers house your manufacturing execution systems, historian databases, and business applications. Each should exist in progressively separated network zones.

      To implement effective segmentation:

      Create True Air Gaps When Possible: For the most critical systems, consider complete physical separation from any networks with external connections.

      Implement Industrial Demilitarized Zones (IDMZs): When data must flow between operational and business networks, use IDMZs with specialized proxies and data diodes that permit one-way information flow where appropriate.

      Utilize Industrial Firewalls: Unlike IT firewalls, industrial firewalls are designed to understand industrial protocols (Modbus, DNP3, Profinet, etc.) and can filter traffic based on specific ICS commands, not just IP addresses and ports.

      Application Whitelisting at Boundaries: Implement strict application-layer controls that only permit authorized protocols and commands to cross segment boundaries.

      The effectiveness of your segmentation depends heavily on how well you've mapped your network's communication patterns. Create detailed documentation that shows legitimate data flows between zones, which will serve as the basis for your segmentation rules and help identify anomalous traffic patterns.

      2. Patch and Update: Navigating the Complexity of Industrial Software Maintenance

      Patching industrial control systems involves far greater complexity than typical IT systems for several critical reasons. First, many ICS components have operational lifespans measured in decades rather than years, often running custom or heavily modified operating systems that are no longer supported by vendors. Second, these systems typically require 99.999% uptime, making traditional patching windows impractical.

      To develop an effective patching strategy for industrial environments:

      Build a Comprehensive Asset Inventory: Document every device, its firmware/software version, patch status, and known vulnerabilities. This should include not just control systems but also networking equipment, historians, and engineering workstations. This inventory becomes your baseline for risk assessment.

      Develop a Vulnerability Management Framework: Not all vulnerabilities can be patched immediately (or at all). Create a risk-based approach that considers:

      • The exploitability of the vulnerability
      • The potential impact on safety and operations if exploited
      • The asset's connectivity to other networks
      • Available compensating controls

      Create a Testing Environment: Establish a lab environment that mimics your production systems for patch validation. This should include the same hardware models, software versions, and configurations as your operational environment. For PLCs and similar devices, this means having spare units of the same make and model for testing.

      Implement Compensating Controls: For systems that cannot be patched (common in ICS environments), develop alternative protections:

      • Enhanced monitoring and anomaly detection around vulnerable systems
      • Additional access controls and authentication requirements
      • Network-based virtual patching using IDS/IPS specifically tuned for industrial protocols
      • Application whitelisting to prevent unauthorized code execution

      Develop Standard Operating Procedures: Create detailed, step-by-step procedures for the patching process, including:

      • Pre-patching validation checks
      • Backup procedures for configurations and programs
      • Installation sequence and timing
      • Post-patch testing protocols
      • Rollback procedures if issues arise

      The most effective approach often involves close coordination between IT security teams, OT engineers, and vendors. Establish a cross-functional patch management committee that meets regularly to assess vulnerabilities and plan remediation strategies appropriate for your operational constraints.

      3. Train Employees: Developing ICS-Specific Security Awareness

      undefined

      Industrial cybersecurity training differs significantly from traditional IT security awareness because it must bridge the gap between cybersecurity concepts and operational technology understanding. Effective training programs need to address multiple audiences within your organization, each with different responsibilities and technical backgrounds.

      For Control System Operators and Engineers: These personnel need to understand how cyber attacks can manifest in physical symptoms. Develop training that demonstrates:

      • How normal process indicators might change during a cyber attack
      • What legitimate alarm conditions look like versus those potentially triggered by malicious activity
      • How to recognize when safety systems may have been compromised
      • The proper response procedures that balance safety, production, and security

      For IT Security Personnel: These team members need to understand the unique aspects of industrial environments:

      • The critical differences between IT and OT priorities (availability vs. confidentiality)
      • How industrial protocols function and their security limitations
      • The physical consequences of security controls in industrial settings
      • The regulatory requirements specific to your industry (NERC CIP, CFATS, etc.)

      For Management and Leadership: Decision-makers need to understand:

      • The business risk posed by industrial cybersecurity threats
      • How security investments translate to operational risk reduction
      • The regulatory compliance landscape for industrial systems
      • How to balance security requirements with production demands

      Effective Training Methods for Industrial Environments:

      Hands-On Simulation Exercises: Develop tabletop scenarios or, ideally, training environments where staff can observe the effects of simulated attacks on industrial processes. Companies like the Idaho National Laboratory have developed training platforms specifically for this purpose.

      Process-Specific Attack Scenarios: Create training materials that use your actual processes and equipment as examples. Generic training fails to resonate with operations staff who need to see how attacks apply to their specific systems.

      Cross-Training Opportunities: Create joint training sessions where IT security staff and operations technology personnel work together, helping each understand the other's perspective and priorities.

      Red Team/Blue Team Exercises: Conduct controlled offensive and defensive exercises within test environments to provide practical experience in identifying and responding to attacks.

      The training should culminate in the development of response playbooks specific to different types of industrial cyber incidents, giving all personnel clear guidance on their roles during a security event.

      4. Implement Multi-Factor Authentication: Securing Access in Operational Environments

      Multi-factor authentication in industrial environments presents unique challenges not found in traditional IT settings. While the principle remains the same—requiring something you know, something you have, and/or something you are—the implementation must accommodate operational realities like emergency access, shared workstations, and the physical environment of industrial facilities.

      Critical Access Points for MFA Implementation:

      Engineering Workstations: These systems can make direct changes to control logic and often represent the highest value targets. Prioritize MFA for all engineering software access, particularly for programming functions that modify PLC code.

      Remote Access Pathways: Any remote connection into the industrial network should require strong multi-factor authentication, ideally using methods that provide time-limited access and detailed logging.

      Historian and Data Collection Systems: These systems often bridge OT and IT networks and contain valuable operational data. Applying MFA here helps prevent unauthorized data extraction or manipulation.

      SCADA and HMI Administrator Access: While operator-level access might use simpler authentication for practical reasons, administrative functions that can change system configurations should require MFA.

      Implementation Considerations Specific to Industrial Environments:

      Physical Token Compatibility: Industrial environments may involve hazardous locations, gloved operation, or dirty conditions. Select physical tokens designed for industrial settings—ruggedized smart cards or RFID-based proximity badges often work better than mobile phones or delicate USB tokens.

      Operational Continuity Requirements: Design your MFA solution with emergency override procedures for critical situations. This might involve break-glass accounts with enhanced monitoring and post-use review rather than completely preventing access during emergencies.

      Integration with Existing Systems: Many industrial control systems use proprietary authentication mechanisms that don't easily integrate with modern MFA solutions. Consider implementing MFA at access choke points (jump servers, VPNs, or terminal servers) that serve as gateways to these systems.

      Just-in-Time Privileged Access: For vendor and maintenance access, implement systems that provide time-limited, role-restricted access with MFA that automatically expires after the maintenance window closes.

      Session Management: In environments where workstations are shared, implement session timeout controls that require re-authentication after periods of inactivity, preventing unauthorized use of established sessions.

      The most effective MFA implementation for industrial systems takes a risk-based approach, applying the strongest controls to the most critical functions while ensuring that day-to-day operations remain efficient and responsive to operational needs, including emergency situations.

      5. Improve Password Hygiene: Strategic Authentication Management for Industrial Systems

      Password management in industrial control systems involves unique challenges stemming from legacy systems, shared workstations, and operational requirements that don't align well with traditional IT password policies. An effective ICS password strategy must balance security requirements with operational realities.

      Industrial-Specific Password Challenges and Solutions:

      Legacy Systems with Limited Authentication Options: Many older control systems have significant password limitations—some accept only numeric passwords, have maximum length restrictions, or don't support special characters. Others store passwords in plaintext or use weak hashing algorithms.

      For these systems:

      • Implement compensating controls like network isolation and strict access control
      • When possible, place authentication proxies in front of systems with weak password mechanisms
      • For devices that cannot support strong passwords, implement physical security controls to prevent direct access

      Default and Hardcoded Credentials: Industrial devices often ship with default credentials documented in publicly available manuals. Worse, some have hardcoded passwords that cannot be changed.

      Address this by:

      • Creating a comprehensive default credential inventory during commissioning
      • Changing all changeable default passwords immediately upon installation
      • Isolating devices with unchangeable credentials into strictly controlled network segments
      • Using network-based controls to restrict authentication attempts to these devices

      Shared Workstation and Credential Management: Control rooms and operator stations are typically shared among multiple personnel across shifts, complicating individual accountability.

      Effective approaches include:

      • Implementing time-synchronized shift-change password procedures
      • Using role-based rather than individual accounts for operator functions, with enhanced logging
      • Deploying industrial-focused privileged access management (PAM) solutions that vault credentials for shared systems
      • Creating audit mechanisms that associate specific actions with individuals through secondary authentication for critical operations

      Emergency Access Procedures: Industrial environments require rapid response during emergencies, when normal authentication processes might impede necessary actions.

      Design emergency authentication with:

      • Physical break-glass procedures that provide emergency credentials
      • Automated notifications when emergency credentials are used
      • Post-incident auditing and credential rotation
      • Regular drills to ensure emergency authentication processes function correctly

      Password Rotation Strategies: Traditional 90-day password rotation isn't always practical in industrial environments where system access is infrequent but critical.

      Consider alternatives like:

      • Event-based rotation (after vendor maintenance or personnel changes) rather than time-based rotation
      • Using longer, more complex passwords with less frequent rotation for rarely accessed systems
      • Implementing one-time passwords for vendor and contractor access
      • Separating standard operational passwords from administrative credentials, with stricter policies for the latter

      By developing password policies specifically designed for industrial operational realities, you create security that enhances rather than hinders essential functions while still providing effective protection against unauthorized access.

      TeamPassword is a security-first password vault that allows you to share passwords with your teammates within an AES 256-bit secured environment. 

      TeamPassword helps you create, store, and share passwords securely and easily. You can organize your passwords into groups and assign access permissions to different users. You can also sync your passwords across devices and browsers, so you can access your ICS systems from anywhere. TeamPassword includes a built-in password generator so you can quickly create secure passwords.

      Password management is tedious without the right tools - and if that's the case, people usually don't do it. TeamPassword works to make good password hygiene easy. 

      6. Continuously Monitor: Developing Visibility in Industrial Networks

      Monitoring industrial control systems differs fundamentally from IT network monitoring because it must understand not just network traffic but also the industrial processes being controlled. Effective ICS monitoring combines network security monitoring, process monitoring, and industrial protocol analysis to detect attacks that might otherwise appear as legitimate commands.

      Establishing Baseline Operational Patterns:

      Industrial systems typically operate in predictable patterns, making them well-suited to baseline-deviation monitoring approaches. To establish effective monitoring:

      Document Normal Communication Patterns: Map which devices normally communicate with each other, at what times, using which protocols and commands. Industrial networks tend to be deterministic, with regular communication cycles that should rarely deviate.

      Process Variable Baselines: Beyond network traffic, document normal ranges for process variables like temperatures, pressures, flow rates, and other physical measurements. Attackers targeting physical damage might issue commands that push these variables outside safe ranges.

      Control Logic Baselines: Create integrity monitoring for PLC programs, ladder logic, and configuration files. Any unauthorized changes to these elements could indicate an attempt to manipulate industrial processes.

      Monitoring Techniques Specific to Industrial Environments:

      Passive Monitoring: Active scanning tools used in IT environments can disrupt sensitive industrial protocols. Deploy passive network taps and spans that collect traffic without injecting packets or disturbing communications.

      Deep Packet Inspection for Industrial Protocols: Standard network monitoring tools don't understand industrial protocols like Modbus, DNP3, or EtherNet/IP. Deploy monitoring solutions specifically designed to parse and analyze these protocols, allowing detection of malicious commands even when properly formatted.

      Process Data Analytics: Implement systems that correlate process data (from historians or SCADA systems) with network activity to identify when network commands result in unusual process behavior. This can catch sophisticated attacks that use legitimate commands to cause harmful physical effects.

      Industrial Behavioral Analytics: Deploy solutions that learn normal patterns of operator behavior and flag unusual actions, such as accessing systems at odd hours or issuing commands in unusual sequences.

      Integration with Physical Security: Correlate cybersecurity monitoring with physical security systems to detect when digital activities don't align with physical presence (e.g., control room commands when no personnel are present).

      Setting Up an Effective ICS Security Operations Framework:

      Establish an ICS-Specific Incident Response Plan: Create detailed response procedures for different types of ICS security events, including clear guidelines on when to prioritize operational continuity over security containment.

      Develop Industrial-Specific Alert Thresholds: Generic security alert thresholds often don't apply in industrial environments. Work with engineering and operations staff to establish appropriate alerting based on operational impact and safety concerns.

      Implement Cross-Functional Monitoring Teams: Effective ICS monitoring requires both security and operational technology expertise. Create joint monitoring teams that combine these skill sets or ensure clear communication channels between separate teams.

      Conduct Regular Review of Monitoring Effectiveness: Industrial processes evolve over time. Establish a regular cadence for reviewing monitoring coverage, updating baselines, and tuning alert thresholds to maintain visibility as your operations change.

      By creating monitoring specifically attuned to industrial operations, you significantly increase your ability to detect sophisticated attacks that might bypass traditional security controls.

      7. Ensure Physical Security: The Critical Foundation of ICS Protection

      Physical security for industrial control systems represents the first and most fundamental layer of defense because in operational technology environments, physical access to components often means complete control. While cybersecurity focuses on remote attack vectors, physical security addresses threats from both external actors and trusted insiders with physical presence.

      Critical Physical Access Points in Industrial Environments:

      Control Cabinets and Panels: These contain PLCs, remote I/O modules, and network equipment that directly control physical processes. Unauthorized access to these components can bypass most network security controls.

      Secure these by:

      • Installing electronic access control systems with logging capabilities
      • Using tamper-evident seals on cabinet doors
      • Implementing cabinet intrusion detection alerts
      • Requiring two-person authorization for access to the most critical control equipment

      Engineering Workstations and HMIs: These systems provide direct interfaces to control elements and often have elevated privileges within the industrial network.

      Protection approaches include:

      • Physical locking mechanisms for workstation enclosures
      • Cable locks for portable engineering laptops
      • Screen privacy filters to prevent visual surveillance
      • Physical placement in supervised areas with appropriate access controls

      Network Infrastructure: Switches, routers, and patch panels that connect industrial components are often overlooked but provide critical attack surfaces.

      Secure these by:

      • Locking network equipment in dedicated enclosures
      • Protecting unused network ports with port locks
      • Implementing physical network monitoring to detect unauthorized connections
      • Documenting and regularly auditing all physical network connections

      Removable Media and Portable Devices: These remain common vectors for malware introduction in air-gapped environments (as seen in attacks like Stuxnet).

      Mitigation strategies include:

      • Establishing clean media transfer protocols with dedicated scanning stations
      • Implementing USB port control devices that restrict what devices can connect
      • Creating physical controls for media entering control system areas
      • Maintaining a detailed inventory and chain of custody for all approved media

      Integration of Physical and Cyber Security Controls:

      Physical Security Information Management (PSIM): Implement systems that integrate physical access control, video surveillance, and intrusion detection with cybersecurity monitoring to create correlated alerts (e.g., flagging when network access occurs without corresponding physical access records).

      Defense-in-Depth Physical Layers: Apply the concept of concentric security layers to physical access, with progressively stricter controls as you move toward more critical systems:

      • Facility perimeter control (fencing, gates, guards)
      • Building access controls (badge readers, mantrap doors)
      • Control room access (biometric verification, PIN codes)
      • Critical equipment access (dual authentication, logging)

      Remote and Distributed Sites Considerations:

      Many industrial environments include remote sites like substations, pumping stations, or monitoring locations that present unique physical security challenges:

      • Implement robust enclosures with intrusion detection
      • Use cellular or satellite-based alerts for physical breach attempts
      • Deploy video monitoring with motion detection
      • Consider environmental sensors that can detect tampering attempts (vibration, temperature changes)

      Insider Threat Mitigation:

      Physical security must also address the potential for insider threats:

      • Implement the principle of least privilege for physical access
      • Require two-person authorization for critical changes
      • Maintain detailed logs of physical access to sensitive areas
      • Create clear separation of duties between operations and maintenance personnel

      By integrating comprehensive physical security with cybersecurity controls, you create multiple layers that attackers must overcome, significantly increasing the difficulty of compromising industrial control systems while providing valuable early warning of potential breach attempts.

      Through implementing these seven complementary security practices, each tailored to the specific operational and technical realities of industrial environments, organizations can develop meaningful protection for the systems that control our critical infrastructure. The key to success lies in recognizing that industrial cybersecurity is fundamentally different from enterprise IT security—requiring specialized approaches, cross-functional expertise, and a clear understanding of operational priorities.

      Protect Your ICS Passwords & Data With TeamPassword

      We've discussed some tips on how to protect your ICS systems from cyber and physical threats. If you're looking for a password management solution designed for teams, give TeamPassword a serious look.

      TeamPassword is designed to be so easy to use that your employees won't be tempted to revert to insecure password habits. Divide passwords into groups so that teammates only access what they need, and ensure that your passwords never leave a secure environment. Features like the password generator, reminders, and enforceable 2FA work together to create a practical solution for securing company passwords. 

      To learn more about how TeamPassword can help you protect your ICS passwords and data, sign up for a free trial today!

      Enhance your password security

      The best software to generate and have your passwords managed correctly.

      TeamPassword Screenshot
      facebook social icon
      twitter social icon
      linkedin social icon
      Related Posts
      IT network admins working with a mess of cables

      Business

      April 21, 202520 min read

      The Best Password Management Software for IT and MSPs

      Find the best password management for your IT or MSP business. In-depth comparison of TeamPassword, Keeper Security, Bitwarden, ...

      Person clicking "Login" on an iPad. The iPad screen shows login fields for username and password. The person has a phone that says verify next to the iPad.

      Cybersecurity

      April 20, 20257 min read

      How to Maximize Security with Two-Factor Authentication (2FA)

      Passwords alone are not always enough to keep the bad guys out. That's where 2FA comes in — ...

      college girl working with laptop after lessons

      Cybersecurity

      April 7, 20259 min read

      Higher Education Data Security: 5 Things to Implement Now

      Higher education data security is critical for colleges and universities. In this guide, we discuss what security measures ...

      Never miss an update!

      Subscribe to our blog for more posts like this.

      Promotional image