Where would be the best mirroring point to accurately detect OT assets?
Where would be the best mirroring point to accurately detect OT assets?
The most common method for safely/widely identifying and detecting assets in OT security is 'Packet mirroring' to monitor and analyze network traffic for anomaly detection, intrusion detection, and forensic analysis. And NetFlow, SNMP, and WMI etc also could be additional options.
Data Collected by Mirroring, NetFlow, SNMP, and WMI
| Data Collection Method | What It Captures | Use Case in OT Security |
|---|---|---|
| Packet Mirroring | Full packet data (headers + payload) | Deep packet inspection (DPI), signature-based IDS (Snort, Suricata), forensic analysis |
| NetFlow / sFlow | Flow metadata (source/dest IP, port, protocol, bytes, duration) | Traffic anomaly detection, DDoS mitigation, bandwidth monitoring |
| SNMP (Simple Network Management Protocol) | Device performance (CPU, memory, interfaces, uptime) | Monitoring network device health, detecting performance degradation |
| WMI (Windows Management Instrumentation) | Windows system logs, processes, registry changes | Monitoring OT workstations, detecting unauthorized software, system changes |
Recommendation:
-
Packet Mirroring is essential for in-depth security analysis, especially in OT where protocol-specific threats need to be detected.
-
NetFlow is useful for high-level traffic monitoring without full packet capture.
-
SNMP and WMI help in network and endpoint health monitoring but do not provide security visibility like mirroring.
Most Appropriate Location for the Mirroring Point in OT Security
Selecting the optimal mirroring point is crucial for effective traffic monitoring. Below are the best locations based on security and network architecture:
Primary Mirroring Points in OT Security
Mirroring Point #01: Between Purdue Level 4(IT) and Level 3/3.5 (OT Network/DMZ)
Purpose: Monitors traffic entering and leaving the OT environment, detecting unauthorized access attempts.
Detects: Lateral movement from IT to OT, unauthorized remote access, VPN tunneling attempts.
Mirroring Point #02: Between Purdue Level 3 (SCADA/Historian) and Level 2 (HMI/EWS) Network
Purpose: Ensures visibility into command and response messages between SCADA/Historian and HMI/EWS.
Detects: Unauthorized command injection, abnormal communication patterns, Process data manipulation.
Mirroring Point #03: Between Purdue Level 2 (HMI/EWS) and Level 1 (Controllers: PLC/DCS)
Purpose: Identifies rogue devices, unauthorized firmware updates, or abnormal control commands.
Detects: Unauthorized command injection, abnormal communication patterns, PLC/DCS manipulation.
Recommendation: For best coverage, deploy mirroring at multiple layers (IT/OT boundary, SCADA/Historian-HMI/EWS communication, and HMI/EWS-PLC/DCS layer).
Recap: By following these best practices, OT security teams can ensure robust monitoring and rapid response to cyber threats in industrial environments.
#CPS #OT #XIoT #IoT #IIoT #IoMT #CPSSecurity #OTSecurity #IoTSecurity #CPS보안 #OT보안 #IoT보안

Comments
Post a Comment