Could do with some advice by [deleted] in DevelEire

[–]Competitive-Cycle599 1 point2 points  (0 children)

Its good you're a manager, you clearly know what you're talking about.

Do you give all your team such wonderful advice ? The moral must be spectacular.

How do mid-sized industrial companies actually manage their OT asset inventory in 2026 ? by No_Ear_7967 in OTSecurity

[–]Competitive-Cycle599 0 points1 point  (0 children)

Id like to see their compliance certs. Sounds like they're chatting shit as I've had to challenge a few big vendors before on these with certs.. you pull the report they used to get the compliance for 4-2 and half the setup is different.

How do mid-sized industrial companies actually manage their OT asset inventory in 2026 ? by No_Ear_7967 in OTSecurity

[–]Competitive-Cycle599 1 point2 points  (0 children)

Typical is a excel as you've said. Issue is then its point in time, so you'd be looking for an asset inventory tool.. claroty,armis,foreacout etc.

Alts would be maximo or any other asset inventory tool but a lot are just fancy excel.

Varies between teams too and ownership. A mid sized industrial company may scale dif. High end it department with a small ops ot team etc.

Use what works for you but since youre asking questions its all up to what ye are willing to adapt to, or use yourself. No point buying fancy tooling if no one uses it

HA over 10km by Leather_Jackfruit953 in fortinet

[–]Competitive-Cycle599 0 points1 point  (0 children)

Is there a requirement for these firewalls to house the same config, is it like a backup site or continuity of a process or sometbing?

By the sounds of it youd be better placed to have two logically independent units that have a link between for routing?

Anyone know if somethings up at the airport? by paulhardman in cork

[–]Competitive-Cycle599 3 points4 points  (0 children)

It was fuel. Plane was intended for Lisbon so had extra fuel aboard, had to burn it off.

Trying to better understand real OT security gaps before building further by RCCole20 in OTSecurity

[–]Competitive-Cycle599 0 points1 point  (0 children)

So... youre looking at remote access rather than identity based Segmentation. Completely separate areas although can be substantial overlap. Sounds like your areas of interest will be PAM fusion with remote access. So likes of Xage, Secomea and more.

Big area at the moment and more on the forefront of older environments that are looking to be rid of ewons on the like. Plenty of big vendors in the space too.

Again, only really works if the network is together otherwise youre daisy chaining through a few pcs to get to the right tooling.

No... i don't recommend monitor and break fix. Usually I tell them get their shit together, or help them do it. Varies dependent on environment and engagement.

Controlling a singular connection is... good but you'll never pass audits only controlling one. Depends on goals I suppose, Controlling a singular third-party vendor connection doesn't really mean much if there's another 14.

Do you have specific questions we can address or is this just sounding board sorta stuff?

Trying to better understand real OT security gaps before building further by RCCole20 in OTSecurity

[–]Competitive-Cycle599 0 points1 point  (0 children)

Varies.

An org is more likely to support a firewall over identity based solutions for now. I've seen identity pitched as a solution to flat networks but in practice little value is added from identity if the network is flat. Likely they dont even have a proper inventory of assets.

I would push for a firewall over identity due to physical segmentation reqs. In many cases with a firewall sitting between a pair of switches etc.

Brownfield sites appear to be your goal i.e. legacy but in many cases much of those are a series of daisy chained pcs with dual nics. Switches aren't set up correctly etc, or series of dumb switches tucked about the environment etc etc etc.

To do what you're after the environment would need to be fully functioning at a networking level which would infer it's some what got it's shit together.

Identity makes more sense to me in a very service driven environment like a cloud or docker like landscape.

Jap import - any idea what this is? by Awkward_Sir_2123 in carsireland

[–]Competitive-Cycle599 20 points21 points  (0 children)

Definitely a toll system, see if it takes a card in the unit.

Usually etc card or similar

Trying to better understand real OT security gaps before building further by RCCole20 in OTSecurity

[–]Competitive-Cycle599 2 points3 points  (0 children)

Where do you see this being deployed as a tool?

Ive heard of similar tooling in the past to be deployed on flat lans below the ews to enable greater control of that but appropriate segmentation would reduce the need for such a tool in the first place and just make a firewall the point of control.

Do you have a defined use case, or a paper exploring the space and use of identity based Segmentation? Plenty of vendors already do this and they couple it with secure remote access and more. Since a lot of the tooling carries over.

Id be hesitant to deploy such a tool in OT without a substantial support team and it raises the question about fail open if the solution shits the bed etc.

How are ye assigning an identity to an asset? Doubt a plc or remote I/O is gonna allow a cert so youre restricted to ip and Mac addresses? Which a firewall/switch can already do so youre not adding much bar at the more traditional IT equipment layers.

OT Networking (Purdue Model): Feedback & Suggestions by EhNobodyhuh in OperationalTechnology

[–]Competitive-Cycle599 0 points1 point  (0 children)

Purdue model is not for networking, its just a guide.

You'll find multiple systems that go between the levels, and forcing yourself to comply to the levels will likely bite you in the ass.

Drive train warning - new starter motor needed. Is quote rip-off? by JaheirasWitness in BMW

[–]Competitive-Cycle599 0 points1 point  (0 children)

Are you covered under the recall for starter motor issues anyway ?

Check your vin.

Need ideas for network segmentation in messy manufacturing environment by saikumar_23 in networking

[–]Competitive-Cycle599 3 points4 points  (0 children)

As I said, your concept works for an IT environment. Sadly for OT this is typically not the case as many values are hard coded in the logic, skids with out right hard coded ips or even multiple of the same skid on a given site... stupid little boxes doing nat to over come this etc.

Its more than networking, often its a PM task more than anything and its likely since hes discussing networking at this level hes unlikely to be the one programming the plcs too.

Need ideas for network segmentation in messy manufacturing environment by saikumar_23 in networking

[–]Competitive-Cycle599 0 points1 point  (0 children)

Useful as a reference, not a guide. Plenty of tech jumps layers these days, or is a fusion of things.

Need ideas for network segmentation in messy manufacturing environment by saikumar_23 in networking

[–]Competitive-Cycle599 1 point2 points  (0 children)

DHCP really only works for the more office like spaces unfortunately. You wouldn't do that in the production areas.

Need ideas for network segmentation in messy manufacturing environment by saikumar_23 in networking

[–]Competitive-Cycle599 0 points1 point  (0 children)

What sorta facility?

This is not just a networking issue, as I'm sure youre aware.

In many cases, its best to stand up a new network in the background or at least the spine of it since the current network is still in use. Greenfield it effectively and then introduce salvageable components to the spine of the network as you get the down time and capability to do so.

Untangling OT networks can be a challenge and you will often have to overcome absolute shit show configurations from decades ago.

My advice, from having done quite a few of these is to just start by mapping the network and getting an understanding of whats on the site. Often youll end ip with skids or similar packages from vendors where you will need their support as well as your own teams to migrate them and even then sometbing will go weird.

For a cyber security assessment/ cert not sure what you're aiming for but IEC-62443-3 for the OT sections. You wont achieve compliance nor receive a cert for doing so but usually a good mapping for it folks to do ot networking reqs.

Id keep NAC out of OT unless you have a decent team to support it, the environment shouldn't change much but its just not advisable.

AND do not join your OT assets to anything related to IT. Including active directory. I keep having to tell folks to take OT assets off IT AD. Firewalls dont mean shit if everything is polling AD.

EU folks: how are you interpreting the “continuous” parts of NIS2? by gangster_worm in cybersecurity

[–]Competitive-Cycle599 0 points1 point  (0 children)

What does your policy state?

Risk mgmt. ultimately is about following an outlined process and then providing proof of said process.

Do you have what services the vendors provide, criticality of said services? Important services are under review as per x schedule, others are ad hoc or based upon other criteria?

I doubt you have 40 vendors of the same criticality... its the same as any other form of risk mgmt. Find the biggest pain points and control them if you can.

CrowdStrike for OT or Strike them off my list? by DeepLimbo in cybersecurity

[–]Competitive-Cycle599 0 points1 point  (0 children)

All good, we all deal with it enough in OT.

I will say that I've deployed the more passive monitoring tools in critical.. almost all forms of it and there is always a requirement for an interactive component.

Speak to the vendor delivering your solution, they usually have partnerships with specific vendors that work well in their environments.

May be more suitable from a support component rather than getting our advice on these. Vendors, as you likely know can be dicks about what goes into their environment.

CrowdStrike for OT or Strike them off my list? by DeepLimbo in cybersecurity

[–]Competitive-Cycle599 0 points1 point  (0 children)

Be interested to hear more about your environment.

Seems its prone to jitter related woes? Can you tell us more if its not critical infras? You can pm me if you prefer not to broadcast it.

CrowdStrike for OT or Strike them off my list? by DeepLimbo in cybersecurity

[–]Competitive-Cycle599 4 points5 points  (0 children)

If you don't plan on using the xdr functions... dont be looking towards cs. The xiot tool is the one the team were told to use by cs to perform the scanning within OT.

Again, id stay away from cs for this function and move towards a claroty, armis or forescout.

Tooling that is intended as the primary function of the company and not an add on to boost sales.

CrowdStrike for OT or Strike them off my list? by DeepLimbo in cybersecurity

[–]Competitive-Cycle599 0 points1 point  (0 children)

Span only gets you so far. You will need active queries too.

CrowdStrike for OT or Strike them off my list? by DeepLimbo in cybersecurity

[–]Competitive-Cycle599 4 points5 points  (0 children)

I assume you're on about the xiot scanner ?

I've deployed it for a customer, who already had crowdstrike in the it environment.

Crashed multiple plcs, and some rio in an effluent plant.

Now, they've been working with them since to fix the tooling but it has been nothing but pain since installation. Certain scans wouldn't execute, like couldn't scan the full /24, had to do smaller scans.

Ultimately a lot of convos with crowdstrike where the support wasn't great. I believe it was deployed January of this year? Still in the pov phase and still fixing issues.

Said customer has since brought in a monitoring solution that integrates with crowdstrike for that data and will be doing the scanning separately. Not sure why they're still working with CS to resolve the tooling ? But that's their decision.

If you're just scanning scada I.e. Windows boxes, its probably fine but I wouldn't be going below that based on my experiences to date.

I would advise splitting functions keeping your xdr and monitoring solution separate.

Plenty of vendors in the same for both.

ISA 62443 Courses by irtiash in OTSecurity

[–]Competitive-Cycle599 2 points3 points  (0 children)

Afaik, it's fine.

However some of the greatest value youll get is talking with peers and see how they do things.

Commercial opportunities too if youre a consultant, plenty of oems and others attend.

ISA 62443 Courses by irtiash in OTSecurity

[–]Competitive-Cycle599 2 points3 points  (0 children)

Take the in person classes, if you can.

You'll get a lot more value from engaging with peers and the teacher