
Minas Tirith - Charcoal
TL;DR
- OT visibility is now a regulatory, operational, and safety requirement.
- You can’t manage risk, segment networks, or respond to incidents without knowing what assets exist.
- Passive discovery is the safest and fastest approach for legacy and fragile environments.
- Discovery improves uptime, troubleshooting, and prevents catastrophic outages.
- Asset visibility is the foundation of any NIS2‑aligned OT program.
Context & Stakes
Most manufacturing environments still run on tribal knowledge.
Ask for the list of PLCs, HMIs, firmware versions, or who has admin rights, and you’ll often get the same answer: “Peter knows that.”
This is not an edge case, it’s the norm. Here is what many plants lack:
- Any centralized inventory
- Network diagrams
- Versioning or configuration management
- Clarity on who has access to what
- Visibility of unmanaged IoT/IIoT devices
At the same time, regulatory pressure is rising fast:
- NIS2 requires asset identification, risk management, monitoring, and incident response.
- The Cyber Resilience Act mandates lifecycle security and product transparency.
- The Machinery Directive imposes requirements for logging, integrity protection, and identification of critical software.
And then there’s the operational reality:
- Legacy systems can’t be patched.
- Firewalls are misconfigured.
- Some devices are directly connected to the internet.
- Vendors deploy equipment/changes without notifying IT/OT.
- Accidental actions cause more outages than hackers.
Without visibility, you can’t secure or sustain production. And without sustained production, nothing else matters.
What Good Looks Like
An effective OT discovery program produces:
- A complete hardware & software inventory: Every PLC, HMI, robot, RTU, sensor, engineering workstation, server, and switch.
- Known firmware versions & vulnerabilities: For legacy systems that cannot be patched, compensating controls become part of the plan.
- Mapped communication patterns: OT devices behave predictably, baselining normal traffic makes anomaly detection simple.
- Identified risky connections:
- Direct internet exposure
- Vendor laptops with admin rights
- IoT devices deployed without approval
- Shadow HMIs or engineering stations
- Ownership for every asset: Someone must be accountable for configuration, updates, and change control.
When plants reach this state, uptime, safety, and troubleshooting will all improve immediately.
Practical Path
Based on your maturity model you should utilize Crawl - Walk - Run approach.
Crawl: Build Visibility
- Deploy passive discovery tools.
- Interview operators and control engineers to seed documentation.
- Identify critical assets and single points of failure.
- Clean up obvious risks (default passwords, abandoned devices).
Goal: “What do we actually have?”
Walk: Turn Findings Into Security
- Add vulnerability insights to each OT asset.
- Map access paths (who can access what).
- Document process dependencies: production, safety, quality.
- Begin designing segmentation and secure remote access.
Goal: “What matters most and how do we protect it?”
Run: Operationalize & Mature
- Enable continuous monitoring.
- Add anomaly detection (OT is perfect for this because traffic is predictable).
- Integrate alerts into SOC and incident response workflows.
- Automate updates, evidence collection, and change logging.
Goal: “How do we stay secure without slowing down production?”
Trade‑Offs & Gotchas
Manual discovery becomes obsolete in weeks
Plants tend to change, new vendor panels, replaced PLCs, reconfigured lines. Excel dies on day one.
Active scanning can break devices
Legacy equipment can’t handle port scans, SMB probes, or anything intrusive. This is why passive tools dominate OT.
Tools without process = zero value
Asset discovery is not a silver bullet.
It must integrate with:
- Change management
- Vulnerability management
- Incident response
- Procurement standards
- Risk assessments
KPIs: What to Measure
- % of OT assets discovered vs. estimated (goal: >95%)
- % of assets with assigned owners
- Reduction in “unknown” or “unauthorized” communication flows
- Mean time to troubleshoot incidents (visibility reduces this dramatically)
- Number of devices with unsupported / end‑of‑life firmware
These KPIs reinforce both cyber and operational value.
Conclusion
Asset discovery is no longer a “nice to have”, it is the first domino in modern OT security and regulatory compliance.
You can’t segment, you can’t respond, you can’t protect, and you certainly can’t comply with NIS2 or CRA unless you know:
- What you have
- What it talks to
- Who can touch it
- How fragile it is
- What happens if it fails
Visibility is uptime. Visibility is safety. Visibility is compliance.