Engagements across OT security assessment, IEC 62443 advisory, and SOCI Act compliance for Australian critical infrastructure operators.
A regional water utility operating multiple treatment plants and a network of remote pumping stations was notified of its status as a responsible entity under the SOCI Act. The board had commissioned a CIRMP. The IT team had been tasked with extending the existing ISO 27001-aligned program to cover OT. Neither task could proceed without a clear, accurate picture of what the OT environment actually looked like.
"The OT environment had grown organically over 15 years. No formal security architecture. No documented zone and conduit model. No prior OT-specific security assessment — ever."
The core problem was not a lack of intent — it was a lack of visibility. Leadership did not know what assets were on the OT network, how they were connected, or what the realistic threat surface looked like. The CIRMP could not be defensible without that foundation.
The engagement followed the IEC 62443-3-2 risk assessment methodology, structured across four phases. Scope covered the primary treatment plant, two remote pumping stations, the IT/OT boundary, and all third-party vendor access pathways.
Selected findings from the 18-item remediation register. Four findings were rated Critical under the IEC 62443-3-2 risk scoring methodology — each representing a condition where the gap between current state and target security level created material operational risk.
Treatment plant control systems, remote pump station RTUs, and the corporate network shared a single flat network. No firewall, conduit, or zone boundary existed between the IT environment and OT control systems. The network architecture was inconsistent with any security level above SL 0.
The process historian had no DMZ separation, data diode, or unidirectional gateway between itself and the corporate network. Read and write access was available to any authenticated domain user. The historian also maintained direct connectivity to the OT control network.
The primary SCADA vendor maintained a persistent, always-on VPN connection to the OT environment. Credentials were static, shared across vendor support staff, never rotated, and not subject to any access review cycle. Multi-factor authentication was not in use. No session logging existed.
No network visibility, anomaly detection, or security monitoring existed on the OT network. The security team had no mechanism to detect unauthorised connections, protocol anomalies, device configuration changes, or lateral movement activity across any OT zone.
A single shared account was used by all control room staff on the primary HMI. No individual user accounts, no role-based access control, and no session audit trail. All operators had equivalent access to all control functions regardless of role.
Primary HMI workstations at the treatment plant ran Windows 7 — unsupported since January 2020 and unpatched for over three years at the time of assessment. Vendor support constraints prevented OS upgrades without a full system replacement, creating a patching impasse.
Remote pump station RTUs connected directly to the treatment plant control network with no intervening conduit controls. A compromised device at any remote site had an unobstructed network path to the primary control zone.
Assessed against IEC 62443-3-3. Target security levels (SL-T) derived from the IEC 62443-3-2 risk assessment. Achieved security levels (SL-A) reflect verified current state across all seven foundational requirements.
| Foundational Requirement | Ref | SL-T | SL-A | Gap Rating |
|---|---|---|---|---|
| FR 1 — Identification & Authentication | SR 1.1–1.13 | 2 | <1 | Critical |
| FR 2 — Use Control | SR 2.1–2.12 | 2 | 1 | High |
| FR 3 — System Integrity | SR 3.1–3.9 | 2 | <1 | Critical |
| FR 4 — Data Confidentiality | SR 4.1–4.2 | 1 | 1 | Met |
| FR 5 — Restricted Data Flow | SR 5.1–5.4 | 2 | <1 | Critical |
| FR 6 — Timely Response to Events | SR 6.1–6.2 | 2 | 0 | Critical |
| FR 7 — Resource Availability | SR 7.1–7.8 | 2 | 1 | High |
All deliverables were structured to serve a dual purpose: provide the technical evidence base for IEC 62443 gap remediation, and satisfy the documentary requirements of the SOCI Act CIRMP cyber hazard vector.
The board had the technical evidence they needed to attest to CIRMP currency. Three critical remediation projects were scoped and funded within six weeks of report delivery.
Prior to the engagement, the utility had no documented OT architecture, no security baseline, and no clear pathway to SOCI Act compliance. The assessment changed all three. The zone and conduit model and SL gap analysis were incorporated directly into the CIRMP cyber vector as the technical evidence base — giving the board a defensible, auditable record underpinning their annual attestation.
CIRMP development, gap assessment, and board reporting for responsible entities under the SOCI Act. Every engagement is scoped to your sector and operational environment.
Client details withheld by mutual agreement. Findings, methodology, and outcomes are representative of engagements conducted in the water and wastewater and electricity sectors.