Key Enablers

At DeepSeas, we see three fundamental enablers to successfully integrating an OT environment into an existing SOC.

People

An escalation point is imperative, as the response process must involve the client organization. Clients must identify someone within their organization who is onsite, has access to the necessary systems, and the right professional for a member of the DeepSeas SOC crew can contact in the case of an event. This person must be available and able to support the response needed to mitigate and/or remediate a particular threat. This need is often new to manufacturing organizations and can result in the need for cross-organizational transformation. This blends directly into the next key enabler – process.

Process

The person within the client organization who is responsible for working an active threat with the DeepSeas SOC crew must understand the batch processes that are happening on the shop floor and what the proper response actions need to look like at the time of an incident. 

There are also adjustments that DeepSeas will make to ensure effective response when responding to an OT threat. Our SOC analysts understand that interfacing with an Operational Technology environment is fundamentally different from a standard IT environment. Consequently, playbooks and runbooks are updated to account for this fact. 

Technology

Critical to securing OT environments is the implementation of OT-centric detection and response technologies – whether it’s agent-based endpoints or more passive listening to the lower levels of the Purdue model that you have on your manufacturing floor – critical visibility into these layers is absolutely essential to the success of any detection and response efforts. 

At DeepSeas, we advocate for a transformative understanding of the Operational Technology landscape, recognizing its unique challenges and distinctions from traditional IT environments and safeguarding its critical processes. 

Watch as one of our Deeps, David Lavinder, answers the question: “Do I need an OT Security Operations Center?”