A public energy provider overseeing power systems required a circuit with enhanced cybersecurity for industrial control systems (ICS) and critical infrastructure with regulatory compliance obligations.
Tasks:
-
Install Circuit(Fixed Wireless)
-
Audit ICS/SCADA systems and air-gapped environments
-
Deploy sensors for OT anomaly detection
-
Establish secure remote access protocols for technicians
-
Segment IT and OT networks using firewalls and VLANs
-
Align systems with NERC CIP standards
Skills Involved:
-
Operational Technology (OT) security
-
SCADA monitoring and anomaly detection
-
Secure remote access (VPN, bastion hosts)
-
Compliance alignment with NERC CIP and IEC 62443
-
Network forensics and protocol analysis
Discovery & Process Outline:
The MSSP performed site visits to substations and water treatment facilities to document device-level configurations and existing security policies. Vulnerabilities in legacy PLCs and exposed HMI terminals were identified. Specialized OT sensors were installed to monitor for anomalies such as command injection or firmware changes. Remote access was consolidated under a hardened gateway requiring MFA and time-restricted access. Continuous logging and integrity checks were built into a custom NERC CIP compliance dashboard.
Outcomes:
-
NERC CIP compliance achieved within regulatory deadlines
-
24/7 anomaly detection across critical infrastructure
-
Hardened remote access process with full audit trails
-
Prevention of known ICS malware variants