twinos Assess · Industrial

OT cyber assessment for process and discrete plants. Computed, not authored. Risk you can defend on a P&ID.

twinos

Most Industrial Cyber Assessments Are IT Audits in OT Clothing.

The current state of the practice: pull a CVE list off the engineering workstation, point an IT VA scanner at the PLCs, sum CVSS into a heatmap, recommend patches that demand a line-stop window that does not exist. The deliverable looks rigorous and answers the wrong question — and sometimes crashes a controller on the way.

The plant manager recognises this report. The OT security lead has filed three of them. None of them changed what the control-room operator is afraid of on Sunday night.

02 / 12
twinos

Plant OT Risk Is a Consequence Equation. Not a Patch Backlog.

Plant OT risk has three terms and CVE count is not one of them. A PLC can carry a CVSS 9.8 vulnerability and present negligible OT risk — and a fully patched controller can sit one parameter write away from a silent interlock bypass. The rubric matters.

CONSEQUENCEinterlock · batch ·EHS · stop×CAPABILITYopportunist ·insider · criminal×EXPOSUREEWS · key-switch ·IT/OT boundaryOT RISKper controllerper techniqueThree terms. CVE count is not one of them.
TermWhat it measuresWhat it ignores
ConsequenceLoss of view, loss of control, interlock bypass, off-spec batch, batch-record integrity loss, unplanned shutdown, quality excursion, EHS event, regulatory notification — measured in plant outcomes, not data recordsCVE severity in isolation
Adversary capabilityPlausible threat actor tier for this plant, this product, this geography — opportunist, insider, criminal, nation-state — and the techniques each can actually deploy against a control systemTheoretical exploits no realistic adversary will weaponise against a process controller
ExposureReachable attack surface accounting for IT/OT segmentation, conduit boundaries, EWS hygiene, key-switch policy, vendor remote access, contractor identity and physical access to control roomsOpen-port counts on a flat-OT-network assumption

Risk = Consequence × Capability × Exposure. Every finding in our report scores on this rubric. Every recommendation moves one of these three terms — and is sized against a production calendar, not a patch calendar.

03 / 12
twinos

Our Method — ATT&CK for ICS, Mapped to the Protocols and Devices in Your Plant.

MITRE ATT&CK for ICS is the public scaffold. On its own it is a vocabulary, not an assessment. We add three layers of mapping that turn a vocabulary into a finding the control engineer can act on.

ATT&CK FOR ICS · TECHNIQUEPROTOCOLModbus TCP / RTU · Profinet · EtherNet/IP · OPC UA · S7 · HART · IEC 60870-5-104what runs on the busDEVICEPLCs (S7 / ControlLogix / M580) · DCS (DeltaV / Experion / Centum) · SIS (Triconex / AC800-HI) · HMIs · EWS · historianswhat sits in the cabinetCONSEQUENCELoss of view · loss of control · interlock bypass · off-spec batch · production stop · environmental release · EHS eventwhat breaks in the plant
LayerWhat we mapExample
Protocol layerEach ATT&CK technique against the protocols actually on the plant network — Modbus TCP / RTU, Profinet, EtherNet/IP (CIP), OPC UA, S7, HART / WirelessHART, Foundation Fieldbus, IEC 60870-5-104 for utility-tied plantsT0843 Program Download → S7 project download to a production PLC
Device layerEach technique against the devices on the rack — PLCs (Siemens S7, Rockwell ControlLogix, Schneider M340/M580, Mitsubishi), DCS controllers (DeltaV, Experion, Centum, 800xA), SIS logic solvers (Triconex, ProSafe-RS, AC800-HI), HMIs, historians, engineering workstations, safety relaysT0836 Modify Parameter → interlock threshold change via engineering workstation
Consequence layerEach technique against the plant outcome it produces — loss of view, loss of control, interlock bypass, off-spec batch, production stop, environmental release, EHS eventSilent widening of safe operating envelope on a critical interlock

The library is curated for the control-system stacks and protocol mixes we see in process, discrete and hybrid plants — and it grows with every engagement.

04 / 12
twinos

Worked Example — Engineering Workstation to Silent Interlock Bypass.

One real chain, end to end, against the rubric. This is what twinos Assess · Industrial emits against a plant control network — not a hand-written finding, not a CVE row, not a CVSS number. One row out of a generated register.

StepFinding
TechniqueT0843 Program Download / T0836 Modify Parameter / T0858 Change Operating Mode — engineering workstation to production PLC over vendor management protocol
Protocol exposureS7 / CIP / Modbus management functions unauthenticated at the controller; no project-change baseline; no audit log on mode change or parameter write
Device exposureProduction PLC governing a critical interlock; PLC key-switch permanently in REMOTE; reachable from the engineering workstation; engineering workstation reachable from plant LAN with a shared local-admin credential
Adversary capabilityTier-2 actor with a stolen engineer credential or unattended-workstation access — observed reachable path during scoping; insider risk concurrent and not separable
ConsequenceInterlock threshold silently widened by a single parameter write; safe operating envelope expanded without HMI annunciation; downstream quality excursion under normal operations, potential EHS event under upset conditions; batch record carries the new threshold as if it were normal
Risk score (our rubric)Consequence: High · Capability: Medium · Exposure: High → Aggregate: High. CVE-only view of this chain: zero CVEs, no scanner output, would not appear on any quarterly VA report
RecommendationPLC key-switch returned to RUN with audit alerting on mode change; segment the engineering-workstation network behind a jump host; enforce per-engineer named identities and MFA on the EWS; baseline the PLC project and continuously diff for unauthorised parameter changes

Zero CVEs. EHS-grade OT risk. Generated, not authored. The next three slides are how.

05 / 12
twinos

twinos Assess · Industrial — ATT&CK at the Tag · Member Level.

Public ATT&CK for ICS publishes technique names. twinos Assess holds a database of realisation conditions per technique — mapped to vendor protocol primitives (S7, CIP / EtherNet-IP, Modbus, OPC UA), down to controller / program / routine / tag / member; extended to OS hardening gaps and hardware exposure. For any controller whose project archive or tag database we hold, we can compute which techniques are realisable today — before we walk on site.

CONTROLLERPROGRAMROUTINETAGMEMBER / TYPEPLC-A1PROG_INTLKRUNG_007SP_HIREAL · writableREALISATION CONDITIONSvendor mgmt protocol unauthenticated· key-switch in REMOTE· EWS shared local-adminT0836 · REALISABLEVendor tag hierarchy — every leaf is a query against the realisation-condition database.
TechniqueProtocol primitiveMapped pointRealisation conditionsRealisable?
T0843 Program DownloadS7 / CIP / EtherNet-IP project downloadPLC program imageManagement protocol unauthenticated · key-switch in REMOTE · no project baseline / diffYes — High consequence (silent logic mod)
T0836 Modify ParameterEWS to controller (vendor mgmt)PROG_INTLK.RUNG_007.SP_HIEWS shared local-admin · no per-engineer identity · no audit on tag writeYes — High consequence (interlock bypass)
T0858 Change Operating ModeS7 STOP / RUNproduction PLC mode registerManagement protocol unauthenticated · no audit on mode change · physical key-switch policy not enforcedYes — Medium consequence (loss of view)

Every row in our risk register starts as a realisation-condition query. The report is a join, not a narrative.

06 / 12
twinos

Two Scanners. Same Realisable Surface. Zero Impact on Production.

Most assessments collect what an engineer can write down in a notebook. twinos Assess collects what the controller, its project archive and its hardware actually say — and feeds it into the realisation-condition library.

ModeWhat it readsBus impactWhat we see
Active — protocolModbus reads, Profinet / EtherNet-IP browse, OPC UA reads, S7 read under signed read-only ground rulesNegligible — read-only, rate-limited, vendor-recommended cadenceLive controller state, online tag values, mode and key-switch state
Passive — protocolVendor project archives (S7 .ap*, Rockwell .ACD, Studio 5000 exports), tag databases, controller online uploads, network drawingsZero packets on the OT networkFull program / routine / tag hierarchy, interlock logic, write paths, vendor-managed I/O bindings
Passive — OSConfiguration exports from EWS, HMIs, historians, jump hosts — services, accounts, patch state, hardening postureZeroOS-level realisation conditions per technique
Passive — HWController datasheets, FAT documents, panel port surveys, key-switch and door-contact policiesZeroDebug ports, console exposure, firmware extraction reachability, physical interlock surface

On a typical plant, around 80 percent of the answer comes from vendor project archives and EWS exports alone. We bring the bus in only when the archives do not tell us.

07 / 12
twinos

Risk-Based Scoring. Not CVE-Based.

The industry default

  • Count CVEs per asset from a vulnerability database
  • Sum or average CVSS — produce a per-PLC 'severity'
  • Rank assets by patch backlog the plant cannot apply
  • Heatmap by colour, file the report, present at the SteerCo
  • Production cannot reboot a controller mid-batch
  • Same finding next quarter, same colour, same shelf

The twinos rubric

  • Score consequence per technique per controller — what breaks in the plant
  • Tier the plausible adversary for this plant, this product, this geography
  • Score exposure with segmentation, key-switch policy and EWS hygiene credited
  • Risk = Consequence × Capability × Exposure — defensible line by line
  • Recommendations sized against the production calendar, not a patch calendar
  • The same controller can be 'CVSS 9.8' and negligible risk — and vice versa
08 / 12
twinos

What You Get — Artefacts, Not Adjectives.

DeliverableWhat it containsWho reads it
Prioritised Plant-OT Risk RegisterPer-controller, per-technique findings — protocol, device class, consequence, capability tier, exposure, aggregate risk, recommendationOT security lead, plant manager, process engineer
Device-Level Remediation RoadmapSequenced 0–3 month, 3–9 month, 9–24 month actions — segmentation, EWS hardening, key-switch and identity policy, project baselining, compensating controls; replacement only where it pays backCISO, head of engineering, production head
Compliance Evidence PackFindings mapped to IEC 62443-3-3 system requirements, NIST SP 800-82 controls, NAMUR NA 163 where applicable, NIS2 obligations — auditor-ready, citation-gradeAuditor, compliance officer, regulator-facing team
Executive & EHS ReadoutBoardroom narrative paired with an EHS-facing annex — what the plant is exposed to, what we are doing about it, what we are accepting and whyC-suite, EHS officer, board risk committee

Every artefact is defensible — line by line, against a documented rubric. The auditor, the EHS officer and the board read it the same way.

09 / 12
twinos

How an Engagement Runs — Without Touching Production.

Operations-conscious by design. We do not actively scan PLCs or DCS controllers. We do not patch in flight. We do not require a line-stop window to deliver the assessment.

Indicative duration — 4 weeks for a single plant area, 6–10 weeks plant-wide or multi-site. No faulted PLCs. No unplanned shutdowns during the assessment itself.

10 / 12
twinos

Where This Sits in Your Programme.

The assessment is the entry point — and complete in itself. The risk register, roadmap and evidence pack stand on their own; many plants stop here and use the output to drive their internal OT security programme for a year.

When the next question is asked, the same methodology extends:

No upsell pressure. The assessment is sold standalone, priced standalone, and delivered standalone.

11 / 12

Book a Scoping Call.

30 minutes. Bring your P&ID, your control-network architecture and your last audit. We will tell you what an assessment of your plant looks like — duration, deliverables, indicative number.