Why this topic matters
Segmentation and safety are the language defenders use to describe OT resilience. Offensive work has to test whether those promises hold under real routing, real trust exceptions and real operator workflows.
Operator checks
- Validate network boundaries with actual path testing, not with diagrams alone.
- Identify vendor tunnels, jump hosts, dual-homed systems and historian links that blur process boundaries.
- Think in terms of safety degradation, view manipulation and process drift, not only in terms of shell access.
- Write findings in language that operations teams can action without guessing the consequence.
Reporting lens
Write findings in terms of trust crossed, scope enlarged and business or operational effect reached. That keeps the note useful whether you are validating a lab, an internal research target or a live customer environment.
Curated public references
- CISA ICS Recommended PracticesSegmentation and operational hardening guidance.
- SANS ICSOperational ICS security references.
- MITRE ATT&CK for ICSTechnique framing for process manipulation and control.
