Minas Tirith

Minas Tirith

This guide transforms theoretical cybersecurity into operational reality through four functional segments. It begins with the Strategic Pillars of OT Resilience to align culture and visibility, followed by a Starter Questions Checklist to spark dialogue between IT and engineering. For crisis management, it provides a printable First-Hour Incident Response Reference, concluding with a Table Top Scenario and After-Action Template to pressure-test readiness and justify security investments.

For decades, the industrial world relied on a single, comforting myth: the air gap. The idea was simple: if the OT network wasn’t connected to the internet or the corporate IT network, it was safe.

But in today’s landscape of remote vendor support, interconnected data, and sophisticated living off the land attacks, the air gap is effectively dead. Securing critical infrastructure requires a shift from theoretical isolation to threat-informed resilience.

To build a program that actually works, organizations must move away from overwhelming spreadsheets and focus on three pillars: culture, visibility, and the critical controls.

Build Trust Before You Build Firewalls

The biggest hurdle in OT security isn’t technical; it’s cultural. IT teams often prioritize data confidentiality and frequent patching, while Engineering teams prioritize safety and “nines” of uptime. When IT enters the plant floor with standard corporate policies, they are often met with resistance, rightfully so.

The Solution: The Engineering Champion.

The most mature programs don’t just hire IT security experts, but they deputize engineers. An engineer who understands the process flow and safety protocols carries more credibility on the plant floor than a remote analyst. By training an internal engineering champion in cybersecurity basics, you bridge the gap between “it’s secure” and “it’s operational.”

Prioritize the Critical Controls

Industrial environments are often filled with legacy systems, some of which have been running for 20 years. Trying to fix every vulnerability at once is a recipe for paralysis. Instead, focus on the controls that mitigate the highest percentage of real-world threats:

Move Visibility “East-West”

Most organizations focus their monitoring on the firewall (North-South traffic)1. However, once an adversary is inside the network, they often live off the land using authorized engineering tools to change PLC logic.

To catch these movements, you need East-West visibility. You need to know what normal looks like between your Engineering Workstation and your Controllers. If a PLC is suddenly being reprogrammed at 2:00 AM on a Sunday, your system should flag it, even if no malware was ever detected.

Use Tabletops as a Relationship Tool

The best time to meet the person responsible for the water pumps is not during a ransomware attack.

Tabletop Exercises (TTX) are often viewed as a compliance “check-the-box” activity, but their true value lies in relationship building. When you sit IT, Engineering, and Leadership in a room for a few hours to walk through a realistic scenario, you discover the gotchas that aren’t in the manual.

Who actually has the password to the controller? If we pull the plug on this switch, does the backup generator still kick in? Who calls the regulator?

Moving these exercises from an annual event to a quarterly, low-stress routine transforms security from a “department of no” into a core part of operational excellence.

Final Thought

OT security is a marathon, not a sprint. You don’t need a multi-million dollar AI solution to start. You need to understand your process, protect your boundaries, and most importantly to listen to the engineers who keep the lights on.


Below is the complete OT Security Workshop kit

This checklist is designed to move beyond “What if a hacker gets in?” and focus on operational realities of an OT incident. These questions are meant to trigger discussion between IT, Security, and Engineering.

Discovery & Communication

The first hour of an incident determines the next 48. These questions test how information flows between the plant floor and the corporate office.

Technical Context & Visibility

OT security is about the “East-West” movement inside the network. These questions challenge your technical assumptions.

Operational Impact & Safety

In OT, the priority is always safety and reliability. These questions force a choice between “security” and “operations.”

Recovery & Restoration

Restoring an OT environment is rarely as simple as “reimaging the drive.”

Next Steps

A great way to start is to pick just three of these questions and spend 30 minutes discussing them with your lead engineer over coffee


OT Incident Response Quick-Reference below is designed to be printed and kept in a physical binder on the plant floor and in the SOC. It bypasses the 50-page manual to provide immediate, actionable ground truths during the first hour of a crisis.

OT Incident Response: The First Hour Reference

Emergency Contacts (Physical Phone Numbers)

Operational Ground Truths

QuestionLocation / Answer
Manual Control: Can the process be run manually if the HMI fails?Yes / No
Safety System: Is the SIS physically/logically isolated?Isolated /Integrated
Backups: Where is the physical location of offline PLC code?_________________________
Network Kill-Switch: Where is the primary IT/OT firewall/gateway?_________________________

Decision Matrix: Who Authorized the Stop?

Immediate Action Checklist

Recovery Preparation


To help you put that reference sheet to the test, here is a plug-and-play scenario script. This is designed for a 2-hour workshop involving both your IT and Engineering teams.

Scenario: “The Ghost in the Machine”

Sector: General Manufacturing / Water Treatment Estimated Time: 90 - 120 Minutes

Phase 1: The Subtle Shift (0–30 Mins)

Phase 2: The Pivot (30–60 Mins)

Phase 3: The Ransom (60–90 Mins)

Phase 4: The Recovery (90+ Mins)

Tips for Facilitating


This After-Action Report template is designed to translate the chaos of a tabletop exercise into a professional business case. Use this to show leadership that cybersecurity isn’t just an IT expense, it’s an investment in operational uptime.

After-Action Report: OT Cybersecurity Tabletop

Date:

Facilitator:

Participants: IT/Security, Engineering, Plant Operations, Leadership

Executive Summary

Key Findings & Gap Analysis

Use this section to highlight where the friction occurred during the drill.

CategoryDiscovery / ObservationRisk Level
Communicatione.g., No out-of-band contact list for vendors.High
Visibilitye.g., Could not detect unauthorized PLC logic changes.Critical
Authoritye.g., Confusion over who can authorize a plant shutdown.Medium
Recoverye.g., Primary backups were networked and encrypted.Critical

What Went Right

It is vital to show management what is already working to maintain morale and support.

Technical Architecture Review

Document how the network handled the stress.

Required Budget & Resource Allocation

Translate the gaps into specific requests.

Improvement Plan (30/60/90 Day)


  1. East-West traffic refers to data flow between devices within the same network, while North-South traffic involves data exchanges between internal devices and external networks. ↩︎

  2. Original Equipment Manufacturer ↩︎

  3. Purdue Enterprise Reference Architecture is a framework for organizing industrial control systems (ICS) and their data flows. It segments the network into different layers to enhance security and efficiency in computer-integrated manufacturing. ↩︎