OTFIELD

SCADA Security Checklist

Comprehensive Security Assessment for Industrial Control Systems

December 2025 | OTFIELD

How to Use This Checklist

This checklist provides a comprehensive framework for assessing SCADA system security. Items are organized by security domain and prioritized by criticality. Use this checklist to:

Priority Levels:

CRITICAL Immediate action required
HIGH Address within 30 days
MEDIUM Address within 90 days
LOW Address as resources permit

1. Network Architecture & Segmentation

Proper network segmentation is the foundation of SCADA security, limiting attack propagation and isolating critical systems.

Deploy industrial firewalls or unidirectional gateways between IT and OT zones
Safety instrumented systems must be physically or logically isolated from process control networks
Document security zones by criticality level and trust boundaries
Default-deny firewall policies with explicit allow rules for required protocols
Minimum segmentation using VLAN isolation for different system types
Separate wireless infrastructure with additional access controls
Remove all direct internet exposure; use secure remote access architecture instead

2. Access Control & Authentication

Strong access controls prevent unauthorized access to critical SCADA systems and limit insider threat risks.

Audit and change default passwords on HMIs, PLCs, RTUs, switches, and all SCADA components
Minimum password length and complexity requirements aligned with NIST guidelines
Implement MFA for VPN, jump servers, and remote desktop access
Granular permissions aligned to job functions (operator, engineer, administrator)
Users have only the minimum permissions required for their role
Privileged access management for administrator credentials with check-out/check-in
Regular review and recertification of user access rights
Account lifecycle management integrated with HR processes

3. Patch Management & Vulnerability Management

Timely patching and vulnerability remediation reduce exposure to known exploits.

Maintain current inventory of all SCADA systems with software versions
Risk-based patching schedule prioritizing critical vulnerabilities
Test patches on representative systems before production deployment
Network isolation, IPS virtual patching, or application whitelisting for legacy systems
Authenticated scanning using OT-aware tools during maintenance windows
Subscribe to ICS-CERT advisories and vendor security notifications

4. Logging, Monitoring & Incident Detection

Comprehensive logging and monitoring enable early detection of security incidents and support forensic analysis.

Enable Windows Event Logs, syslog, and application logs
Real-time log aggregation for correlation and long-term retention
Alerting on failed logins, privilege escalation, configuration changes
OT-specific network monitoring for protocol anomalies and baseline deviations
Adequate retention period for incident investigation and compliance
Periodic manual review of logs for anomalies not caught by automated alerts

5. Remote Access Security

Secure remote access architecture protects against unauthorized external connections.

IPsec or SSL VPN with AES-256 encryption as minimum
MFA using tokens, smart cards, or authenticator apps
Dedicated hardened systems for remote access with session recording
Isolated vendor access zone with time-limited credentials
Session recording for audit trail and forensic analysis
Restrict VPN access to known IP ranges where feasible

6. Endpoint Protection

Protecting SCADA workstations and servers from malware and unauthorized software.

OT-tested antivirus with controlled update mechanisms
Only approved applications can execute, blocking malware and unauthorized software
Device control policies to prevent removable media attacks
Prevent automatic execution of malware from removable media
Automatic workstation locking after inactivity period

7. Backup & Disaster Recovery

Reliable backups enable rapid recovery from cyber incidents or system failures.

PLC logic, HMI projects, database configs, network device configs
Protect backups from ransomware encryption
Quarterly recovery testing to verify backup integrity
Emergency restore capability without internet/vendor access
DR procedures with RTO/RPO objectives for critical SCADA systems

8. Physical Security

Physical access controls protect SCADA infrastructure from tampering and unauthorized access.

Badge access, visitor logs, and surveillance cameras
Temperature, humidity, water detection, and power monitoring
Physical tamper protection for field-located equipment

9. Security Governance & Training

Organizational policies and awareness programs create a culture of security.

Formal security policies covering access control, change management, incident response
OT-specific training covering phishing, removable media, physical security
OT-specific IR procedures with safety considerations
Formal approval and testing before production changes
Simulated cyber incident exercises with IT and OT teams

10. Vendor & Third-Party Management

Managing security risks from vendors and third-party service providers.

Contractual obligations for security controls and incident notification
Temporary credentials requiring manager approval
Document all remote access mechanisms and connection details
Annual review of critical vendor security practices