MEQuest
Module 10Unit 4 of 57 min

OT Incident Response

When a cybersecurity incident occurs in an OT environment, the response must balance two competing priorities: containing the threat and maintaining safe operations. Unlike IT incident response where you can isolate and shut down systems, abruptly disconnecting OT systems can itself cause dangerous conditions - loss of visibility, uncontrolled shutdowns, or disabling safety systems.

OT Incident Response Phases

1

Preparation

Before an incident happens: develop OT-specific response plans, identify critical assets, establish communication channels, define roles (who makes the call to shut down?), and conduct tabletop exercises.

Key question: Who has the authority to disconnect the OT network from IT during an active attack? This must be pre-agreed and documented.

2

Detection & Analysis

Identify the incident through OT network monitoring, anomalous process behaviour, or alerts from security tools. Determine the scope - which zones, which assets, what is the attacker doing?

OT-specific challenge: Distinguishing between a cyber attack and an equipment malfunction. A PLC sending unexpected commands could be compromised or simply faulty.

3

Containment

Isolate affected systems while maintaining safe operations. This may mean switching to manual control, activating backup systems, or severing the IT-OT connection at the DMZ firewall.

Critical rule: Never disable a Safety Instrumented System (SIS) during incident response. The SIS is the last barrier against catastrophic failure.

4

Eradication & Recovery

Remove the threat, rebuild compromised systems from known-good backups, re-validate PLC programmes against master copies, and restore normal operations in a controlled, phased manner.

5

Lessons Learned

Conduct a thorough post-incident review. What was the root cause? How did the attacker get in? What detection failed? Update defences, procedures, and training based on findings.

OT-Specific Considerations

Manual Fallback

Operators must be trained to run the plant manually if SCADA is compromised. Regular drills ensure this capability is maintained.

PLC Programme Integrity

Maintain verified master copies of all PLC programmes. After an incident, compare running programmes against masters to detect tampering.

Forensic Challenges

OT devices have limited logging. Network traffic captures and historian data may be the only forensic evidence available.

Regulatory Reporting

Many jurisdictions require mandatory reporting of cyber incidents affecting critical infrastructure within 24-72 hours.

Practice before it happens
The worst time to discover gaps in your OT incident response plan is during an actual attack. Conduct annual tabletop exercises that bring together OT engineers, IT security, operations management, and legal/compliance. Simulate realistic scenarios - not just theoretical ones.