Potential storms and saboteurs¶
ISO 22301 – disruptions / adversaries (Clause 8.2 & 8.3)
Disruptions are not always malicious, but they affect operations the same way. Think of them as storms or incidents that could stop the factory if unprepared. Understanding them allows targeted continuity measures.
Key disruption categories¶
Technical outages
PLC, SCADA, server, or sensor failure.
Check: Are redundancies and failover systems in place? Are maintenance records current?
Environmental incidents
Power loss, fire, flooding, HVAC failure, or extreme temperatures.
Check: Are backup power, environmental monitoring, and emergency procedures documented and tested?
Human factors
Operator error, procedural mistakes, staff absence, or miscommunication.
Check: Are procedures documented and understood? Is cross-training in place?
Supply chain interruptions
Delays in spares, maintenance services, or vendor support.
Check: Are critical suppliers identified? Are alternative vendors and contingency stock planned?
Cyber incidents
Malware, ransomware, misconfiguration, or protocol abuse affecting OT systems.
Check: Are IT/OT continuity plans aligned? Are recovery procedures defined for cyber disruptions?
Each disruption category is also a test scenario. A technical outage can be simulated through a controlled failover test. An environmental incident can be walked through in a tabletop to check whether backup power procedures and emergency contacts are accessible under time pressure. A cyber incident can be run as a PoC or red team scenario against a staging environment to verify that IT/OT response assumptions reflect what an actual compromise would look like. Disruptions that have only been planned for, and never tested against, remain assumptions about how the factory will behave. The difference between a disruption that is navigated successfully and one that extends into a crisis is usually found in the gap between the plan and the tested reality.
Executive gap‑spotting¶
Does every plausible disruption have a mapped recovery procedure?
Are critical dependencies addressed to prevent cascading failures?
Are responsibilities for response, communication, and decision-making clearly assigned?
Are lessons from past disruptions captured and applied to improve resilience?