Which of the Critical Controls Includes Performing a Risk Assessment in the ICS/OT Network?

Introduction

Industrial Control Systems (ICS) and Operational Technology (OT) networks are the backbone of modern infrastructure—power plants, water systems, oil refineries, chemical plants, and manufacturing operations. Yet these environments are increasingly targeted by cyberattacks, from ransomware to nation-state intrusions.

To defend against these threats, organizations turn to critical cybersecurity controls—structured best practices that reduce risk, strengthen defenses, and ensure continuity of operations.

But here’s the key question:

Which of the Critical Controls addresses performing a risk assessment of a known issue in the ICS/OT environment that could be exploited by an attacker?

The answer lies in the Center for Internet Security (CIS) Controls and NIST SP 800-82, specifically within Asset Management, Vulnerability Management, and Risk Management practices.

Let’s break it down.


Understanding ICS/OT Risk Assessments

A risk assessment is the process of identifying, analyzing, and evaluating vulnerabilities, threats, and impacts to determine the level of risk to an asset or system.

In ICS/OT, risk assessments must account for:

  • Legacy systems with no patches
  • Flat networks with high trust
  • Critical processes that can’t be interrupted
  • Safety, human life, and environmental consequences

Answer: CIS Critical Control 6 — Access Management & Control AND Control 7 — Continuous Vulnerability Management

The CIS Critical Security Controls, especially Control 7 (Vulnerability Management) and Control 4/6/8, explicitly involve the steps required to perform risk assessments based on known vulnerabilities in OT systems.

Let’s focus on the most relevant:


✅ CIS Control 7: Continuous Vulnerability Management

What it is:

Control 7 requires organizations to continuously acquire, assess, and take action on information regarding new and existing vulnerabilities, especially those that could be exploited by attackers.

This is the control that covers performing a risk assessment of known vulnerabilities in ICS/OT networks.

Key Activities:

  • Maintain asset inventory and software list
  • Use vulnerability scanning tools tailored for OT (non-intrusive scanning)
  • Map known vulnerabilities (CVEs) to specific devices
  • Prioritize based on exploitability and criticality
  • Take risk-based remediation action (patch, isolate, monitor)

ICS/OT-Specific Considerations:

  • Use passive detection tools (e.g., Nozomi, Claroty, Dragos) to avoid disrupting control devices.
  • Leverage vendor-provided security advisories (e.g., Rockwell Automation, Siemens, Schneider).
  • Risk assessments must balance cybersecurity risk vs operational risk (e.g., downtime, safety).

✅ NIST SP 800-82 + NIST CSF (Cybersecurity Framework)

NIST SP 800-82 Revision 3 is the authoritative guide on securing ICS environments. It emphasizes risk assessment as part of the Identify function in the NIST Cybersecurity Framework (CSF).

Key NIST Categories:

NIST CSF CategoryRelevance
ID.RA-1Asset vulnerabilities are identified and documented
ID.RA-2Threats are identified and documented
ID.RA-3Potential impacts are identified
ID.RA-4Risk tolerance is determined
ID.RA-5Risk response is prioritized and tracked

So, the risk assessment of known vulnerabilities aligns with:

🔍 ID.RA-1 to ID.RA-5 in the Identify Function of NIST CSF


How the Risk Assessment Process Works in ICS/OT

Step 1: Identify Known Vulnerabilities

  • Use vulnerability databases (NVD, CISA ICS Advisories)
  • Monitor vendor advisories (e.g., Siemens CERT)
  • Collect asset details (firmware version, protocol, OS)

Step 2: Determine Asset Criticality

  • Is the asset controlling a critical safety loop?
  • Does downtime result in production loss or environmental impact?
  • Is it connected to other sensitive assets?

Step 3: Assess Exploitability

  • Is the vulnerability remotely exploitable?
  • Is it already being exploited in the wild?
  • Are there published proof-of-concepts (PoCs)?

Step 4: Calculate Risk

Risk=Likelihood×Impact\text{Risk} = \text{Likelihood} \times \text{Impact}Risk=Likelihood×Impact

Use scoring frameworks like:

  • CVSS (Common Vulnerability Scoring System)
  • MITRE ATT&CK for ICS
  • Custom OT risk matrix (e.g., SIL, HAZOP integration)

Step 5: Prioritize and Act

  • Apply patches if available
  • Isolate vulnerable assets (network segmentation)
  • Increase monitoring/logging
  • Implement compensating controls (e.g., firewall rules)

Real-World Example: ICS Risk Assessment in Action

Scenario:

A Rockwell Automation PLC running outdated firmware has a known vulnerability (CVE-2021-22681) that allows unauthenticated remote access.

Actions Taken:

  1. Identify the vulnerable firmware version using passive OT asset discovery.
  2. Assess that this PLC controls a critical compressor in a chemical plant.
  3. Determine that exploitation is possible over the engineering workstation subnet.
  4. Calculate Risk as high due to exploitability + high consequence of failure.
  5. Mitigate by:
    • Blocking engineering port access from all but one workstation
    • Scheduling firmware update during next shutdown window
    • Logging all connections to the PLC IP for forensic readiness

Why This Matters in ICS/OT

Traditional IT vulnerability scanning tools are often too aggressive for fragile ICS systems. That’s why OT risk assessments require:

  • Non-intrusive techniques
  • Human-in-the-loop decision making
  • Alignment with process safety

A failed or misconfigured scan can crash a PLC or HMI, bringing down production or safety systems.


Other Critical Controls That Support Risk Assessment

ControlDescriptionOT Relevance
Control 1: Inventory of AssetsKnow what’s in your networkFoundation for risk analysis
Control 2: Software InventoryKnow what versions and software runIdentify where vulnerabilities exist
Control 4: Secure ConfigurationHarden systems to reduce attack surfaceBaseline comparison
Control 10: Logging & MonitoringDetect signs of exploitationValidate risk exposure
Control 11: Incident ResponsePrepare for risk realizationEvaluate consequence side of risk

Best Practices for OT Risk Assessments

Build a detailed asset inventory with firmware and protocol data
Use passive tools to avoid system disruption
Regularly review vendor security advisories and CISA alerts
Train ICS engineers on basic cyber risk scoring
Use an OT-specific risk matrix that accounts for both process and IT risk
Document and communicate risk findings to both OT and IT teams


Conclusion

In the context of ICS and OT security, CIS Control 7 (Vulnerability Management) and the Identify Function of the NIST CSF (ID.RA) are the most directly related to performing a risk assessment of known issues that could be exploited.

These assessments are not optional—they are a critical part of securing your plant, process, and people.

🎯 If you don’t know your vulnerabilities, attackers will find them for you.

A mature risk assessment process in OT not only prevents attacks, but also supports compliance, asset management, and operational resilience.


FAQs

Q1: Is vulnerability scanning safe in ICS environments?

Not always. Use passive scanning or manual validation for ICS/OT assets to avoid disrupting operations.

Q2: How often should OT risk assessments be performed?

At minimum:

  • Quarterly for high-risk systems
  • After any major firmware/software update
  • Following any known vulnerability disclosure

Q3: What tools are recommended for OT risk assessments?

  • Claroty, Dragos, Nozomi (for passive asset & vulnerability mapping)
  • CISA ICS advisories
  • MITRE ATT&CK for ICS framework
Share The Post :

Leave a ReplyCancel reply

Exit mobile version