When Incidents Get Physical: A View Of Incident Response In Critical Infrastructure
This talk explores the unique challenges of incident response within Operational Technology (OT) and critical infrastructure environments, where cyber incidents can trigger real-world physical consequences. It contrasts the priorities of IT (confidentiality) with OT (safety and availability) and highlights how legacy systems and air-gapped architectures complicate remediation. The presentation emphasizes the necessity of cross-team coordination and the critical nature of early decision-making to prevent cascading failures in systems like power grids and water treatment plants.
Why Your Next Pentest Needs to Account for Physical Consequences in OT
TLDR: Operational Technology (OT) environments prioritize safety and availability over the confidentiality models common in IT, creating a high-stakes landscape where a simple misconfiguration can trigger physical disasters. Attackers are increasingly targeting these systems through weak credentials and exposed interfaces, often using IT-to-OT pivot points to gain access. Pentesters must shift their mindset from data exfiltration to understanding the physical process, as the impact of a breach here extends far beyond the network.
Most security professionals spend their careers inside the comfortable abstraction of IT. We worry about data exfiltration, privilege escalation, and lateral movement within Active Directory. We treat systems as replaceable, ephemeral, and inherently patchable. But when you step into the world of Operational Technology (OT) and critical infrastructure, that entire model collapses. A misconfigured SCADA system is not just a potential data leak; it is a potential physical catastrophe.
The fundamental disconnect between IT and OT security lies in their core objectives. In IT, the CIA triad places confidentiality at the top. In OT, safety and availability are the only metrics that matter. If a water treatment plant’s control system goes offline, the physical process—the actual movement of water—is at risk. If an attacker gains control over chemical dosing, the result is not a stolen database; it is a public health crisis.
The Reality of OT Exposure
Modern OT environments are rarely the isolated, air-gapped fortresses they are often imagined to be. The convergence of IT and OT networks has created a massive attack surface. We see weak or default credentials remaining the primary entry point for attackers, just as they are in IT. However, the impact of a successful login is vastly different.
Attackers often gain initial access through T1190-exploit-public-facing-app or by abusing T1078-valid-accounts on internet-exposed devices. Once inside, they find legacy systems—often running Windows XP or unpatched Windows Server versions—that cannot be easily updated or rebooted. These systems are fragile. A standard vulnerability scan that might be routine in an IT environment can crash a legacy PLC or HMI, causing the very downtime you are trying to prevent.
Understanding the Cascading Failure
When you are testing an OT environment, you must map the dependencies. A single compromised HMI might not have the capability to shut down a power grid directly, but it likely has the ability to manipulate setpoints or disable monitoring. The danger is the cascading effect. If a monitoring system is taken offline, the operators lose visibility. If they lose visibility, they cannot respond to physical faults.
Consider the water treatment scenario. An attacker manipulates the chemical dosing logic. The first-order effect is incorrect chemical levels. The second-order effect is the loss of clean water, forcing hospitals and schools to close. The third-order effect is a total loss of public trust and massive financial liability. As a researcher, you need to look for these paths. Ask yourself: if I can change this value, what physical process does it control, and what happens if that process goes out of bounds?
The Pentester’s Approach to OT
During an engagement, your reconnaissance should focus on identifying the bridge between IT and OT. Look for dual-homed machines, jump boxes, or VPNs that lack strict segmentation. Once you identify an OT asset, stop the aggressive scanning. Instead, focus on passive traffic analysis. Use tools that can identify industrial protocols like Modbus or DNP3 without flooding the network with packets.
If you find an exposed interface, document it, but do not attempt to exploit it unless the engagement rules explicitly allow for it and you have a clear understanding of the physical process. The goal is to demonstrate the risk of unauthorized access, not to prove you can cause a blackout. You are looking for the "Black Swan" events—the rare, high-impact scenarios where a minor IT compromise leads to a major physical failure.
Bridging the Gap
Defenders in the OT space are often fighting an uphill battle against legacy hardware and a lack of visibility. They need your help to identify the most critical paths. When you report a finding, don't just list the CVE or the misconfiguration. Explain the physical impact. If you find a way to access a controller, explain what that controller does. Does it manage pressure? Does it manage temperature? Does it manage flow?
The most effective way to secure these environments is through strict network segmentation and the removal of unnecessary remote access. If a device does not need to talk to the internet, it should not have a route to it. If it does not need to talk to the IT network, it should be behind a robust firewall with deep packet inspection.
We are moving into an era where the digital and physical worlds are inextricably linked. As researchers and pentesters, we have a responsibility to understand the physical consequences of our work. The next time you are looking at a network diagram, look past the servers and the workstations. Find the controllers, find the sensors, and ask yourself what happens when the bits and bytes turn into physical motion. That is where the real work begins.






