ICS/SCADA_
testing

protecting your industrial control systems

The impact of an Industrial Control System (ICS) breach goes beyond data loss, it can result in huge financial manufacturing losses and, in the case of critical infrastructure, could potentially impact lives.

Many systems do not undergo regular security updates and it’s common for a system to run for years without patching. This makes them extremely vulnerable to attacks that may have been patched decades ago.  

Our ICS testing can help overcome the many issues associated with testing industrial systems and we are committed to providing an outstanding service that is tailored to your individual requirements.

 

the benefits of ICS/SCADA testing

understand your risk

Understanding your risk is the first step to improving your ICS security posture. Our testing allows you to discover what attack vectors could be used to reach your ICS infrastructure and what the implications of a successful attack would be.

uncover vulnerabilities & prioritise efforts

ICS testing allows you to identify and classify your most critical vulnerabilities, providing you with vital remediation advice. This gives you the information you need to make informed decisions regarding your security and to effectively prioritise your improvement efforts.   

test your defences

How effective are you at detecting an ICS breach? Do you have the necessary readiness plans in place? Our testing can help you evaluate your capabilities in reacting to such a threat.

evaluate third-party systems

Many ICS utilise third-party systems and devices, these need to be tested to ensure they are not providing threat actors with a potential route into your critical systems.

what we test

Our testing is tailored to your requirements and can cover the following areas of an ICS/SCADA system.

  • Firmware 
  • Application 
  • Encryption 
  • Hardware 
  • Network 

The following provides an example of the tests we may perform, note this is not an exhaustive list as many of the checks will depend on the specific system under review:

  • Network architecture: network seperation between control and node networks, network protocol vulnerabilties, identification of network access points, traffic capture, interception/modifcation of Command and Control, denial of service
  • Node service: Weak authentication/authorisation, Sandbox issues
  • RTU/PLC/IED firmware: removal and overwriting, password/crypto key capture, hardening
  • System tests: Control server, IO Server, HMI, Data Historian, Engineering workstations

our approach

Every ICS test goes through a rigorous process, ensuring you get the best possible outcome for your organisation. Below we outline the key stages our testing goes through:

1.scoping

We work with you and your subject matter experts to evaluate the precise requirements of the test and the risks involved.

2. proposal & prerequisites

A proposal will be drawn up outlining the planned scope of work and the preparation needed to start testing.

3. testing

Our consultants are given access to the target system, using their expertise to evaluate it from a security standpoint. This is usually executed on site and can be performed on either test/UAT or live environments.

Penetration testing approach - Pentest - Information security assurance

4. ongoing communication

We communicate with you throughout the test, to your set requirements. Our consultants will also gain explicit authorisation before they conduct any action which may impact the system.

5. reporting

A comprehensive, quality assured report of test findings will be delivered.

6. post-test support

Our consultants will be available to offer guidance on any aspect of the report, as well as remediation efforts.

7. retest

You have the option to retest, ensuring reported vulnerabilities have been addressed.

why choose us?

Our ICS tests are designed to support your organisation’s overall information security efforts. It’s this support that truly sets us apart and our team is dedicated to reducing your cyber threat, to pass on our wealth of expertise and to provide you with the security assurances you need.

experience and expertise

Our team of security sonsultants have years of experience and a depth of expertise in ICS/SCADA testing. We invest significant time into security research projects, honing and developing skills which allow our consultants to deliver the best possible results for your organisation.

dedicated contact throughout

Every organisation we work with is appointed a dedicated account manager. Our account managers understand the complexity of coordinating tests and will work with you to ensure your test runs smoothly.

testing tailored to your business

No two organisations are the same and neither are our ICS tests. We work closely with you to fully understand your goals, the system in question, the security challenges, operational needs and priorities before we undertake any work.

quality reporting

Every penetration test report undergoes an internal QA process and is peer reviewed. Our reports provide you with a managerial overview of findings, an in-depth technical review of the vulnerabilities found and our remediation advice.

post-test support

Our job doesn’t finish on the delivery of a report and our expert consultants will be available to answer any questions, to share their expert knowledge, and to provide remediation support to internal development teams or external suppliers.  

optional retest

We can provide an optional retest into our testing, making sure issues have been understood and remediation efforts have been implemented as effectively as possible. 

added value

Value is about more than just cost. Our value comes from scoping engagements accurately, our detailed reports, providing your team with post-test support, the expert knowledge we impart and by going above & beyond the tick box deliverables used by other information security providers.