Where would be the best mirroring point to accurately detect OT assets?



Where would be the best mirroring point to accurately detect OT assets?

The most common method for safely/widely identifying and detecting assets in OT security is 'Packet mirroring' to monitor and analyze network traffic for anomaly detection, intrusion detection, and forensic analysis. And NetFlow, SNMP, and WMI etc also could be additional options.

So, where would be the best mirroring point to accurately detect OT assets?


Data Collected by Mirroring, NetFlow, SNMP, and WMI

Data Collection MethodWhat It CapturesUse Case in OT Security
Packet MirroringFull packet data (headers + payload)Deep packet inspection (DPI), signature-based IDS (Snort, Suricata), forensic analysis
NetFlow / sFlowFlow metadata (source/dest IP, port, protocol, bytes, duration)Traffic anomaly detection, DDoS mitigation, bandwidth monitoring
SNMP (Simple Network Management Protocol)Device performance (CPU, memory, interfaces, uptime)Monitoring network device health, detecting performance degradation
WMI (Windows Management Instrumentation)Windows system logs, processes, registry changesMonitoring OT workstations, detecting unauthorized software, system changes

Recommendation:

  • Packet Mirroring is essential for in-depth security analysis, especially in OT where protocol-specific threats need to be detected.

  • NetFlow is useful for high-level traffic monitoring without full packet capture.

  • SNMP and WMI help in network and endpoint health monitoring but do not provide security visibility like mirroring.



Most Appropriate Location for the Mirroring Point in OT Security

Selecting the optimal mirroring point is crucial for effective traffic monitoring. Below are the best locations based on security and network architecture:

Primary Mirroring Points in OT Security

  1. Mirroring Point #01: Between Purdue Level 4(IT) and Level 3/3.5 (OT Network/DMZ)

    • Purpose: Monitors traffic entering and leaving the OT environment, detecting unauthorized access attempts.

    • Detects: Lateral movement from IT to OT, unauthorized remote access, VPN tunneling attempts.

  2. Mirroring Point #02: Between Purdue Level 3 (SCADA/Historian) and Level 2 (HMI/EWS) Network

    • Purpose: Ensures visibility into command and response messages between SCADA/Historian and HMI/EWS.

    • Detects: Unauthorized command injection, abnormal communication patterns, Process data manipulation.

  3. Mirroring Point #03: Between Purdue Level 2 (HMI/EWS) and Level 1 (Controllers: PLC/DCS)

    • Purpose: Identifies rogue devices, unauthorized firmware updates, or abnormal control commands.

    • Detects: Unauthorized command injection, abnormal communication patterns, PLC/DCS manipulation.

Recommendation: For best coverage, deploy mirroring at multiple layers (IT/OT boundary, SCADA/Historian-HMI/EWS communication, and HMI/EWS-PLC/DCS layer).



Recap: By following these best practices, OT security teams can ensure robust monitoring and rapid response to cyber threats in industrial environments. 


#CPS #OT #XIoT #IoT #IIoT #IoMT #CPSSecurity #OTSecurity #IoTSecurity #CPS보안 #OT보안 #IoT보안


Comments

Popular posts from this blog

Don't confuse DCS, PLC and SCADA in front of OT specialists

Top 20 Threat Scenarios & Playbooks for OT Security

Let's create our own ICS Labs in the VMs!