top of page
ICON-Final-05_edited.png

Checklist: Getting started with OT security

  • Writer: Cyber Instincts AB
    Cyber Instincts AB
  • Nov 26, 2025
  • 1 min read

A short and practical checklist to quickly create structure in OT environments without disrupting production.


1. Map the OT environment

  • Identify control systems, SCADA, PLC and HMI

  • Highlight critical processes and dependencies


2. Identify exposed surfaces

  • Remote access

  • Supplier connections

  • Networks bordering IT

  • Wireless networks in production environments


3. Inventory existing protection

  • Firewalls

  • Antivirus or whitelisting

  • Logging and monitoring

  • Backup and recovery procedures


4. Review remote connections

  • List all accounts

  • Check who is using them

  • Check if access is always active

  • Remove or time limit unnecessary access


5. Ensure incident procedures for OT

  • Who makes the initial assessment?

  • How the impact on operations is evaluated

  • When systems should be isolated or stopped


6. Compare the current situation against the framework

  • IEC 62443 (industry)

  • ISO/IEC 27019 (energy)

  • Identify gaps and document


7. Prioritize three actions that will have the greatest impact

Example:

  • Close or restrict remote access

  • Improve segmentation

  • Increase the level of logging and detection


8. Create a simple OT roadmap

  • 3–6 months: rapid improvements

  • 12 months: stabilising measures

  • 24 months: long-term maturation journey


Read more about OT security:

 
 
bottom of page