News and blog
NXLog main page
  • Products
    NXLog Platform
    Log collection
    Log management and analytics
    Log storage
    NXLog Community Edition
    Integrations
    Professional Services
  • Solutions
    Use cases
    Specific OS support
    SCADA/ICS
    Windows event log
    DNS logging
    MacOS logging
    Open Telemetry
    Solutions by industry
    Financial Services
    Government & Education
    Entertainment & Gambling
    Telecommunications
    Medical & Healthcare
    Military & Defense
    Law Firms & Legal Counsel
    Industrial & Manufacturing
  • Pricing
    Licensing
    Plans
  • Partners
    Find a Reseller
    Partner Program
    Partner Portal
  • Resources
    Documentation
    Blog
    White papers
    Videos
    Webinars
    Case Studies
    Community Program
    Community Forum
  • About
    Company
    Careers
  • Support
    Support portals
    Contact us

NXLog Platform
Log collection
Log management and analytics
Log storage
NXLog Community Edition
Integrations
Professional Services

Use Cases
Specific OS support
SCADA/ICS
Windows event log
DNS logging
MacOS logging
Open Telemetry
Solutions by industry
Financial Services
Government & Education
Entertainment & Gambling
Telecommunications
Medical & Healthcare
Military & Defense
Law Firms & Legal Counsel
Industrial & Manufacturing

Licensing
Plans

Find a Reseller
Partner Program
Partner Portal

Documentation
Blog
White papers
Videos
Webinars
Case Studies
Community Program
Community Forum

Company
Careers

Support portals
Contact us
Let's Talk
  • Start free
  • Interactive demo
Let's Talk
  • Start free
  • Interactive demo
NXLog search
  • Loading...
Let's Talk
  • Start free
  • Interactive demo
June 8, 2023 strategysecurity

Industrial cybersecurity - The facts

By Roman Krasnov

Share
ALL ANNOUNCEMENT COMPARISON COMPLIANCE DEPLOYMENT SECURITY SIEM STRATEGY RSS
scada iot security

In Feb 2021, a major cybersecurity incident was declared when a hacker gained malicious access to the water treatment system of Oldsmar, Florida. Officials said the hacker tried to increase the level of sodium hydroxide in the city’s water supply, putting thousands at risk of being poisoned. Fortunately, it was quickly confirmed that this potential terroristic act did not come to fruition.

Two years later, we still have no details on the malicious actor. However, recently Al Braithwaite, the former city manager of Oldsmar, Florida, stated that hackers did not cause this potentially world-altering episode. It was, in fact, a "non-event" sparked by a user error.

It may sound like you’ve been fooled around, and in real life, there is no sophisticated cyber-physical threat security companies keep telling us about for many years already. Is this so? If not, how to protect technology from being tampered with by adversaries? And how to avoid blind spots in the evidence?

Let’s find it out.

Long-lasting secure-over-technology supremacy

Operation Technology incidents are especially memorable because of their distinct cyber-physical impact. And that played a nasty trick on OT security.

All the hype began in 2010 with Stuxnet. The Stuxnet worm was as much a fascinating technological advancement as it was an act of political warfare. It wouldn’t have looked out of place in a Mission Impossible movie. Long story short: US/Israel intelligence agencies (as is supposed) created a sophisticated piece of Windows malware. It penetrated an Iranian nuclear plant’s network and caused uranium centrifuges to be damaged by tampering with their technical parameters. You can read more about Stuxnet in our previous blog post, The EU’s response to cyberwarfare.

The case is remarkable, and no wonder it triggered countless new cybersecurity offerings, followed by a wave of marketing materials all crying "You must control your OT parameters with exceptional OT security tools!". Fair enough, but there was a slight issue with the threat model.

Hypnotized by the buzz, many neglected to notice that the threat actor was a collection of nation-states with unlimited offensive resources; something that’s hard to compete with, having an average of 5-10% of IT spending for defense. Just like many closed their eyes on anti-virus overlooked the malware before its payload triggered at the cyber-physical edge. But the idea of cross-cutting cyber-physical protection based on technology process monitoring owned the minds.

The market has spent almost a decade trying to understand that technology process monitoring for security purposes costs a lot and eventually gets minimal effect on security posture.

Show me the real cyberattack on SCADA!

For many, it is still a surprise that no other such attack like Stuxnet has ever been registered. Instead, all the following well-known breaches against OT infrastructure had the primary goal of (or resulted in) making OT infrastructure access unavailable for personnel. But doesn’t that sound equally dangerous?

To achieve that goal, a hacker (surprisingly) needs no OT knowledge at all. A typical scenario for an OT or SCADA attack is:

  • The hacker gets access to a Windows computer inside an OT network

    • Option 1: default/weak password

    • Option 2: brute-force remote desktop software

    • Option 3: find credentials kindly stored in a spreadsheet

    • Option 4: ask for credentials via chat or e-mail :-)

    • Option 5: send a regular trojan

    • Option 6: and so on…​

  • The hacker logs onto the target computer with the acquired credentials

  • The hacker installs ransomware or wipes out the entire storage drive

  • PROFIT

That’s it. The technology process was disrupted, headlines were in the media, and the hackers used zero "SCADA skills". It may seem a bit simplified, but it’s easy to introduce additional malicious actions (like randomly clicking SCADA buttons on the operator’s dashboard), and that’s how the actual attacks go in real life. For example, check out the next famous cyberattack on Ukranian electric substations in 2014-2016 in another previous blog post.

As we’ve seen, causing industrial system damage oftentimes requires no specialized OT hacking knowledge at all. It makes sense that a hacker wanting to invest as little as possible to achieve the largest possible media furor should want to target OT environments.

Unfortunately, in the real world, many OT environments still lack the very basic and common security countermeasures that are prevalent in IT environments. This needs to change.

Industrial security aspects

While it’s a widely exaggerated theory that "SCADA is very different," it’s still got Ethernet, Windows, and TCP/IP - all the same IT technologies for hackers to turn against OT. From that perspective, building solid OT protection requires establishing a defense-in-depth strategy with all its well-known layers like Network, Software, and Hardware Security.

You may hear from a security perspective what you "can’t" do with OT:

  • Can’t re-segment OT network

  • Can’t install antivirus in OT

  • Can’t patch OT systems

  • Can’t update OT systems

  • Can’t etc

Thanks to these, passive network monitoring replaced first-choice security technology for OT, claiming it’s fast to deploy and safe for the industrial environment.

The problem is that network monitoring tools (NTA/NDR) alone have a natively limited number of actionable insights. And it was one of the reasons why technology parameter monitoring has been added to industrial NTA offerings, as an attempt to enhance product value. Still, it was the wrong direction, as we know now.

According to NIST SP 800-82 Industrial Controls guidelines, there are a lot of important log events that have to be continuously tracked in an industrial environment, like:

  • Multiple failed login attempts

  • Locked-out accounts

  • Unauthorized creation of new accounts

  • Unexpected remote logins (e.g., logons of individuals that are on vacation, remote login when the individual is expected to be local, remote logon for maintenance support when no support was requested)

  • Cleared event logs

  • Unexpectedly full event logs

  • Disabled antivirus or other disabled security controls

Being just a part of a SOC Visibility Triad (events management, evolved anti-malware, network detection), passive network monitoring cannot fulfill that alone and must be complemented with a SIEM system for the security team to get enriched and actionable insights throughout the whole kill chain.

Although, there are a couple of issues that stop SIEM adoption in OT:

  • SIEMs require heavy log collection agents installed (OT is not happy with this)

  • SIEMs lack industrial software/hardware logs support

Simply put, you must carefully design a log collection system while planning SIEM expansion to OT, and pass a FAT (Factory Acceptance Test) if necessary.

Compared to specific industrial network monitoring as a first-choice tool to secure an OT network (albeit, firewall and antivirus are the number one), SIEM has a good advantage. Security engineers are familiar with SIEMs and can start working with them immediately. As a part of an OT network security program covered by log collection and analysis, SIEMs can increase your security posture dramatically, leaving fewer blind spots for a real hacker to hide in.

And establishing industrial security events management and, at least, generic network monitoring (NTA-like) enables an insightful mechanism to detect a hacker before he starts tampering with technology parameters. Is this what we aim for?

How NXLog helps to secure operation technology

NXLog Enterprise Edition has the capabilities to help CISOs and security engineers in charge of OT security solve these challenges quickly:

  • Enables a lightweight log collection pipeline, proven to be used in OT networks based on various technologies from Siemens, Schneider Electric, and others.

  • Supports all the major SIEM and APM systems for log forwarding, like Splunk, IBM QRadar, Google Chronicle, Microsoft Sentinel, Microfocus ArcSight, Datadog, Graylog, and others.

  • Supports both agent-based and agentless collection, critical for heterogeneous environments like OT.

  • With its ultimate events processing system, NXLog Enterprise Edition allows filtration and routing of security events both from the system level (like Windows, Linux, AIX, etc., including legacy) and SCADA application level (like Siemens WinCC, Siemens Step7, Siemens SICAM, and others).

  • NXLog Enterprise Edition provides generic network monitoring capabilities to introduce insightful data for the security team without leaving the SIEM dashboard.

Need a log collection tool to help secure your OT environment? Try NXLog Enterprise Edition for free today, or get in touch to learn more.

NXLog Platform is an on-premises solution for centralized log management with
versatile processing forming the backbone of security monitoring.

With our industry-leading expertise in log collection and agent management, we comprehensively
address your security log-related tasks, including collection, parsing, processing, enrichment, storage, management, and analytics.

Start free Contact us
  • Cybersecurity
  • SCADA
  • OT
  • IIoT
Share

Facebook Twitter LinkedIn Reddit Mail
Related Posts

NXLog in an industrial control security context
9 minutes | August 10, 2022
Using Raijin Database Engine to aggregate and analyze Windows security events
11 minutes | July 29, 2021

Stay connected:

Sign up

Keep up to date with our monthly digest of articles.

By clicking singing up, I agree to the use of my personal data in accordance with NXLog Privacy Policy.

Featured posts

Security dashboards go dark: why visibility isn't optional, even when your defenses keep running
February 26, 2026
Building a practical OpenTelemetry pipeline with NXLog Platform
February 25, 2026
Announcing NXLog Platform 1.11
February 23, 2026
Adopting OpenTelemetry without changing your applications
February 10, 2026
Linux security monitoring with NXLog Platform: Extracting key events for better monitoring
January 9, 2026
2025 and NXLog - a recap
December 18, 2025
Announcing NXLog Platform 1.10
December 11, 2025
Announcing NXLog Platform 1.9
October 22, 2025
Gaining valuable host performance metrics with NXLog Platform
September 30, 2025
Security Event Logs: Importance, best practices, and management
July 22, 2025
Enhancing security with Microsoft's Expanded Cloud Logs
June 10, 2025

Categories

  • ANNOUNCEMENT
  • COMPARISON
  • COMPLIANCE
  • DEPLOYMENT
  • SECURITY
  • SIEM
  • STRATEGY
  • Products
  • NXLog Platform
  • NXLog Community Edition
  • Integration
  • Professional Services
  • Licensing
  • Plans
  • Resources
  • Documentation
  • Blog
  • White Papers
  • Videos
  • Webinars
  • Case Studies
  • Community Program
  • Community Forum
  • Compare NXLog Platform
  • Partners
  • Find a Reseller
  • Partner Program
  • Partner Portal
  • About NXLog
  • Company
  • Careers
  • Support Portals
  • Contact Us

Follow us

LinkedIn Facebook YouTube Reddit
logo

© Copyright NXLog Ltd.

Subscribe to our newsletter

Privacy Policy • General Terms of Business