Checklist: Getting started with OT security
- Cyber Instincts AB

- Nov 26, 2025
- 1 min read
A short and practical checklist to quickly create structure in OT environments without disrupting production.
1. Map the OT environment
Identify control systems, SCADA, PLC and HMI
Highlight critical processes and dependencies
2. Identify exposed surfaces
Remote access
Supplier connections
Networks bordering IT
Wireless networks in production environments
3. Inventory existing protection
Firewalls
Antivirus or whitelisting
Logging and monitoring
Backup and recovery procedures
4. Review remote connections
List all accounts
Check who is using them
Check if access is always active
Remove or time limit unnecessary access
5. Ensure incident procedures for OT
Who makes the initial assessment?
How the impact on operations is evaluated
When systems should be isolated or stopped
6. Compare the current situation against the framework
IEC 62443 (industry)
ISO/IEC 27019 (energy)
Identify gaps and document
7. Prioritize three actions that will have the greatest impact
Example:
Close or restrict remote access
Improve segmentation
Increase the level of logging and detection
8. Create a simple OT roadmap
3–6 months: rapid improvements
12 months: stabilising measures
24 months: long-term maturation journey



