homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured

    Get a Free Hour of SANS Training

    Free Course Demos

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured: Solutions for Emerging Risks

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. SANS ICS Site Visit Plan
SANS_social_88x82.jpg
SANS Institute

SANS ICS Site Visit Plan

Maximize your efforts to identify critical assets during on-site ICS visits.

May 10, 2021

Are you planning to visit your industrial control system (ICS) or operational technology facilities to advance your control system security program? Use this guide to prepare for discussions on cybersecurity and safety, conduct ethical hacks of the physical security perimeter, and establish an ICS asset inventory for proactive defense and information security.

Consider the points outlined below to maximize your efforts to identify critical assets during on-site ICS visits, promote ICS security awareness, and facilitate a smooth ICS cyber incident response process.


1. OSINT for ICS Defenders

Picture1.jpg

While often overlooked, an open-source intelligence (OSINT) exercise provides a starting point to understand an organization’s information attack space, and it does not disrupt or introduce any risk to industrial operations and is not detectable by ICS defenders.

An OSINT exercise reveals the Internet-connected devices, remote access services, open ports, and protocols that are in use at an organization. In the hands of an adversary, this information can be pieced together to build an attack against a target.

ICS defenders should at least know what information is publicly available about their organization and operations through common search engines such as Google. They should also know which Internet-connected devices are deployed from search results from Shodan or similar tools. An OSINT exercise shows what adversaries already know, which is critical to building defenses. Common Shodan website filters examples are:

Search organization IP range: net:x.x.x.x/y

Search by organization name: org:”name”

Search by IP : x.x.x.x

Search by city: city:”name of city”

Search by webpage title: title:”text here”

Search for common remote access: port:"3389"

BacNET port:"47808"

Modbus port:”502"

EtherNet/IP port:”44818"

After conducting an OSINT exercise, ensure that Internet-connected assets are removed where feasible and that remote access has secure multi-factor authentication with monitoring and auditing in place. Verify with the key stakeholders and applicable on-site teams before changing anything.


2. Coordinate with Safety and Security Teams

Picture2.jpg

Establish and maintain relationships with fire and safety, physical security, and engineering teams before arriving at the site. These teams know just about everything about the facilities, including the location of physical assets, how to navigate the site, network architecture, and critical assets. You may have to rely on these teams for help throughout the ICS incident response process going forward.

Site safety is always going to be top of mind, even above cybersecurity. Follow the lead of the safety team and the safety protocols to ensure that you and your team remain physically safe. This means wearing your personal protective equipment (PPE), among other measures. Most sites require that you have completed safety training and show certificates of completion before entering the site.


3. Ethically Hack the Physical Security Perimeter

Picture3.jpg

When arriving at the site, there’s always an opportunity to audit physical security controls. This can be done by observing authentication processes, starting with the front gate. Wait to show a badge until it is requested, document tailgating observations, and look for unlocked doors, doors being propped open, fences with gaps, etc. – all while keeping safety as the highest priority. Conduct passive wireless sweeps looking for rogue access points and/or unsecured wireless settings.

Always seek documented approval from management for ethical hacking exercises of this nature before attempting them.


4. Plant Floor Cybersecurity Discussions

Picture4.png

Organizing direct discussions on security and safety at the facility allows for direct observations and provides operational context for the environment where digital assets are located. However, some operating environments may have prohibitive noise, safety or access limitations that make it necessary to hold these discussions elsewhere. The discussions should include process engineers, field technicians, programmers, operators, and managers. Cybersecurity staff need to know how the physical processes and the plant operates, and which systems are critical to operations and safety. Walk the teams through industry case studies such as CRASHOVERRIDE, TRISIS, HAVEX, STUXNET, etc.

Start a discussion around what might constitute an impactful event in the environment. The individuals who operate the facilities will certainly have thoughts about what could fail, or even experiences with something that has failed before.

Leverage the physical engineering safety culture by drawing parallels between physical and cyber safety, and highlight the cyber defense safeguards that are in place to ensure the safety and reliability of engineering operations.

In security awareness memos, replace cyber “security” with “cyber “safety.”


5. Spreadsheet, Laptop Stand, and Network Diagrams

Picture5.jpg

Start by reviewing network diagrams. Use an encrypted laptop with at least a basic spreadsheet application to start storing your ICS asset information. At a minimum, capture the following attributes for commonly targeted assets such as Data Historian, HMI, PLCs, engineering workstations, core network devices, and Safety Instrumented Systems (SIS):

  • Site name, location, facility type
  • Asset type and ID tag
  • Asset location: Room, cabinet, rack
  • Description of asset function Impact to operations if unavailable
  • IP and MAC address
  • Operating ICS protocols
  • Model/manufacturer, serial number
  • Firmware version 
  • Applications installed and versions


6. Follow Up with Traffic Analysis

Picture6.jpg

Maintenance windows and safety risks can prevent the physical inspection of certain assets. Augment the physical inspection inventory with passive network traffic capture. This will require coordination and approval from operations staff and a configured SPAN with a network security monitoring platform such as Security Onion. Common capture times range from 2 to 24 hours. Identify critical assets through packet analysis and by observing ICS protocol traffic patterns. Use features in free tools like Wireshark to help:

Wireshark > Statistics > Endpoints

Wireshark > Statistics > Protocol

Hierarchy Wireshark > Statistics > Conversations


7. Storing Asset Inventory Back at the Office

Picture7.jpg

The asset inventory is incredibly valuable. When back at the office, store inventory updates in a database that is:

Scalable - Scalable databases help ensure that site inventories can be updated or expanded; back them up regularly.

Searchable - All fields should be indexed to enable quick searches across inventories gathered when used in conjunction with threat intelligence or vulnerability information.

Secure - Standard data protection and security practices, including authentication and network segmentation, should be used to protect this sensitive data.


8. Asset Inventory for ICS Defense

Picture8.jpg

Use threat intel to drive searches across an established inventory database for vulnerabilities and targeted assets for proactive defense changes. Targeted assets include the following:

Data Historian – This is a database that stores operational process records. It can be abused to pivot from a compromised asset in IT to one in the ICS network(s).

Engineering Workstation – This workstation has access to software to program and change programmable logic controllers and other field device settings/configurations.

Human Machine Interface - The HMI is a visual interface between the physical process and operators that is used to review and control the process.

Programmable Logic Controllers – PLCs connect the physical hardware in the real world and run logic code to read the state or change the state of the engineered process.


Check out the SANS ICS Cheat Sheets and Other Free ICS Resources here!

Join the SANS ICS Community Forum for Tips, Tricks, and a Q&A to secure your ICS!

Learn more about Dean Parsons’ ICS contributions and check out his bio here!

Dean Parsons’ Upcoming ICS515 teaches here:

  • SANS Paris June 2021 Online | June 14 - 19 | Register Today
  • SANSFIRE 2021 Online | July 12 - 17 | Register Today


Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Recommended Training

  • ICS456: Essentials for NERC Critical Infrastructure Protection™
  • LDR414: SANS Training Program for CISSP® Certification™
  • SEC401: Security Essentials - Network, Endpoint, and Cloud™

Tags:
  • Industrial Control Systems Security

Related Content

Blog
Blog: Living Off The Land Attacks and Countermeasures in Industrial Control Systems
Industrial Control Systems Security
October 10, 2023
Living Off the Land Attacks and Countermeasures in Industrial Control Systems
As attacks on critical infrastructure and industrial control systems become brazen, ICS defenses must go beyond just preventative security.
DeanParsons_340x340.png
Dean Parsons
read more
Blog
ICS_blog_-_Developing_ICS_OT_Engineering_Cyber_Defense_Teams2.jpg
Industrial Control Systems Security
August 17, 2022
Developing ICS/OT Engineering Cyber Defense Teams
ICS security managers don't get to choose if they're a target of a cyber attack, but do get to choose many things about their OT security program.
DeanParsons_340x340.png
Dean Parsons
read more
Blog
ICS_Blog_Series-_A_Look_into_ICS-Part_22.jpg
Industrial Control Systems Security
April 4, 2022
A Look Into ICS612: ICS Cybersecurity In-Depth: Part 2
In OT security, you'll eventually be placed in an environment where you'll face the pressures of dealing with a process that's not responding.
Jeffrey Shearer
Jeffrey Shearer
read more
  • Company
  • Mission
  • Instructors
  • About
  • FAQ
  • Press
  • Contact Us
  • Careers
  • Policies
  • Training Programs
  • Work Study
  • Academies & Scholarships
  • Public Sector Partnerships
  • Law Enforcement
  • SkillsFuture Singapore
  • Degree Programs
  • Get Involved
  • Join the Community
  • Become an Instructor
  • Become a Sponsor
  • Speak at a Summit
  • Join the CISO Network
  • Award Programs
  • Partner Portal
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
© 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn