Detection Priorities

Based on the likelihood and impact in the threat landscape, detection priorities ranked from highest to lowest.

Priority 1: Detect what is actually happening now

Technique

What to detect

How

IT/OT boundary lateral movement

Unusual logins on EWS, historian, HMI from unexpected IT subnets; vendor VPN connections outside maintenance windows

Network flow logs between IT and OT zones; EWS authentication logs; VPN session monitoring

Trust exploitation and misconfiguration

Anonymous OPC UA access; default credentials in use; traffic crossing zone boundaries that should be blocked

Passive protocol monitoring (OPC UA, Modbus, S7) for unauthenticated sessions; periodic credential audits; firewall rule reviews

Reconnaissance

Scans on OT ports (502, 20000, 2404, 102, 4840, 1883) from IT or vendor networks

OT-aware IDS/IPS (e.g., Snort with ICS rules); netflow monitoring to OT zones

Priority 2: Detect what has high impact even if less frequent

Technique

What to detect

How

Denial of control

Loss of telemetry from field devices; unexpected CPU stops on PLCs; communication session resets

Heartbeat monitoring from critical PLCs/RTUs; controller status polling; alert on “loss of view” conditions

Control logic manipulation

Unexpected program uploads to PLCs (especially S7, Modicon); changes to alarm thresholds or setpoints

Change detection on PLC logic (baseline and checksum); historian trend analysis for subtle drift

Data integrity manipulation

Sensor readings that disagree with physical models or redundant sensors; replayed values that repeat exactly

Physical process cross-checking (e.g., flow in equals flow out plus accumulation); redundant sensor comparison

Priority 3: Lower likelihood, monitor for completeness

Technique

What to detect

How

Data exfiltration

Large or unusual data transfers from historian to corporate network; OPC UA or MQTT subscriptions from unexpected clients

Historian egress monitoring; netflow to and from historian; unusual OPC UA browse patterns

Protocol abuse and malformed input

Protocol parsing errors; unexpected PLC crashes or restarts

PLC health monitoring; error logs on protocol gateways; crash-and-recovery alerts

Replay and timing attacks

Sequence number anomalies (where supported); unexpected command repetition

DNP3 sequence number tracking (challenging); command logging with timestamps

Detection feasibility by technique

Technique

Detection Feasibility

Primary Detection Layer

Notes

IT/OT lateral movement

High

Network and authentication logs

Well-understood; needs visibility at boundary

Trust exploitation

Medium

Network and configuration audits

Anonymous access is easy to detect once you look

Reconnaissance

Medium

Network

Scans are noisy but OT teams rarely watch

Denial of control

Medium

Process and controller health

Loss of view is detectable; slow loss is harder

Control logic manipulation

Low-Medium

Change detection and process behaviour

Logic changes are invisible to network monitoring

Data integrity manipulation

Low

Physical process cross-checking

Requires domain knowledge and redundant sensors

Data exfiltration

Low

Historian egress

Looks like normal traffic without baselining

Protocol abuse

Low

Controller health and error logs

Crash is detectable; cause rarely is

Replay attacks

Very Low

Sequence number tracking

Most legacy protocols lack sequence protection

The gap

The techniques with the highest likelihood (IT/OT lateral movement, trust exploitation, reconnaissance) are also the most detectable, if you are looking. Most European operators are not looking at the OT boundary with sufficient visibility.

The techniques with the highest impact (control logic manipulation, data integrity manipulation, denial of control) are often the hardest to detect, often requiring physical process knowledge or redundant sensors.

The hard truth: you cannot detect what you cannot see. Most European OT environments lack the network monitoring, authentication logging, or change detection required for even the Priority 1 detections above.