OT
Delinea
PAM Training Platform
MODULE 7 — OT/ICS SECURITY
0%
Specialized Training Module

Privileged Access in
Operational Technology

Master the unique security challenges of ICS, SCADA, PLCs, and HMI environments — and learn how to extend Delinea PAM controls without disrupting critical operations.

6 Learning Sections
~45 Minutes
18 Quiz Questions
CPE Credit Eligible

Understanding the OT Environment

Before deploying PAM controls, you must understand what makes OT systems fundamentally different from enterprise IT — and why the same attacks hit very differently.

What is Operational Technology?

Operational Technology refers to hardware and software that monitors or controls physical devices, processes, and infrastructure. Unlike IT systems where data confidentiality is the primary concern, OT systems directly interface with the physical world — disruptions can cause equipment damage, environmental harm, or even loss of human life.

ICS
Industrial Control Systems
The broad category encompassing all automated control solutions for industrial processes — from chemical plants to water treatment facilities.
SCADA
Supervisory Control & Data Acquisition
Systems that collect real-time data from remote field devices and enable centralized supervisory control of distributed industrial processes.
DCS
Distributed Control Systems
Dedicated controllers placed throughout a facility to manage localized processes, providing redundancy and lower latency than centralized SCADA.
PLC
Programmable Logic Controllers
Ruggedized digital computers used for automation of electromechanical processes — pumps, motors, valves, and assembly lines. The "arms and legs" of OT.
HMI
Human-Machine Interfaces
The graphical dashboards that allow operators to monitor and control OT processes. Often Windows-based, representing a significant attack surface.

The Purdue Reference Model

The Purdue Enterprise Reference Architecture defines logical security zones in industrial environments. Understanding these zones is essential for applying PAM controls at the right boundaries.

ENTERPRISE ZONE (Level 4-5)
Corporate Network
ERP / MES Systems
Active Directory
Email / Web
⬇ DMZ / Data Diode ⬇
DEMILITARIZED ZONE (Level 3.5)
Historian Servers
Jump Servers
Remote Access Gateway
⬇ Firewall ⬇
CONTROL ZONE (Level 2-3)
SCADA Servers
HMI Workstations
Engineering Stations
OT Active Directory
⬇ Firewall ⬇
FIELD ZONE (Level 0-1)
PLCs / RTUs
Sensors / Actuators
Safety Systems (SIS)

Key OT Characteristics vs. IT

CharacteristicIT EnvironmentOT EnvironmentPAM Impact
Availability PriorityHigh (99.9% SLA)Extreme — downtime = physical impactNo reboot tolerances
Patch CycleMonthly / on-demandAnnual or longer; some never patchedLegacy auth protocols
System Lifespan3–7 years15–30+ yearsWindows XP/2003 common
AuthenticationMFA / SSO / PKIShared local accounts, no MFAHigh priority vault
Network ProtocolsTCP/IP standardModbus, DNP3, PROFINET, OPCProtocol awareness req.
Change ManagementAgile / frequentStrict change windows onlyWorkflow integration needed
QUESTION 1 OF 3 Which component directly interfaces with physical actuators like pumps and valves, executing automated control logic at the field level?
A
SCADA Server
B
HMI Workstation
C
Programmable Logic Controller (PLC)
D
Historian Server
Progress is saved automatically

Security Gaps in the OT Perimeter Model

OT security was historically built on physical isolation and implicit trust. Understanding why this model fails is the foundation for a modern PAM strategy.

CRITICAL CONTEXT

OT systems were designed in an era when "air gap = security." Operators assumed that if an attacker couldn't physically touch the network, they couldn't cause harm. Stuxnet (2010) permanently invalidated this assumption. Today, 89% of critical infrastructure organizations have experienced at least one OT security incident in the past two years.

The Air-Gap Myth

Myth
"Our OT network is air-gapped"
In practice, true air gaps are extraordinarily rare. Maintenance laptops, USB drives, historian connections, vendor remote access, and monitoring tools all create unintended connectivity that operators may not document.
Reality
Every connection is an attack path
Attackers use legitimate access vectors: vendor VPNs, engineering workstations connected to both zones, or compromised IT credentials used to pivot through the DMZ into control systems.

The Five Critical Security Gaps

Gap 1 — Shared & Hardcoded Credentials
CRITICAL

OT systems routinely use shared "admin" accounts known to dozens of engineers and vendors. Many PLCs and HMIs ship with hardcoded default passwords that are never changed, or cannot be changed due to vendor support requirements. These credentials are often documented in plaintext on sticky notes near equipment, in shared spreadsheets, or inside vendor documentation stored on uncontrolled file shares.

PAM Impact: Delinea Secret Server must vault all SCADA admin credentials, service accounts, and vendor-supplied credentials. Automated password rotation must be carefully planned to avoid breaking active sessions.

Gap 2 — Legacy Operating Systems & No MFA
CRITICAL

HMI workstations running Windows XP, Windows 2003, or embedded Windows CE are common in OT environments. These systems cannot run modern security agents, cannot support modern MFA solutions, and may not receive patches for known vulnerabilities. Vendors may void support warranties if security software is installed.

PAM Impact: Delinea Privileged Behavior Analytics and session proxies must operate at the network layer, not the endpoint, for these systems. Jump server architecture through Secret Server Web Launcher can enforce MFA without touching the legacy endpoint.

Gap 3 — Uncontrolled Third-Party Vendor Access
HIGH

OT systems require regular maintenance by original equipment manufacturers (OEMs) and specialized vendors — Siemens, Rockwell Automation, Schneider Electric, Honeywell. These vendors typically demand always-on remote access via dedicated VPN tunnels or vendor-specific platforms that bypass corporate security controls entirely.

PAM Impact: Third-party vendor accounts must be created in Delinea as time-limited, session-specific credentials. Vendor access should be routed through Delinea's session recording capability so every action is logged and reviewable.

Gap 4 — Weak or No Change Management for Credentials
HIGH

In IT, password rotation is standard practice. In OT, rotating a SCADA server password can break a running process if any of the dozens of dependent services haven't been updated simultaneously. As a result, passwords are often never rotated — some remain unchanged for 10+ years. Engineers who left the organization five years ago may still have valid credentials to critical control systems.

PAM Impact: Delinea's dependency mapping for OT accounts must be conducted before any rotation is enabled. Rotation should occur during planned maintenance windows and include automated verification of all dependent connections.

Gap 5 — No Session Visibility or Audit Trail
HIGH

Unlike enterprise environments where Active Directory logs every logon event, OT systems often have minimal logging capabilities. PLCs may have no log storage at all. SCADA systems may overwrite logs after 72 hours. There is typically no centralized SIEM receiving OT logs, meaning forensic investigation after an incident relies on unreliable human memory.

PAM Impact: Delinea Session Recording provides the audit trail that OT systems themselves cannot. Recording engineering workstation sessions creates irrefutable evidence of what configuration changes were made, by whom, and when.

QUESTION 1 OF 3 A vendor engineer connects remotely to perform scheduled PLC firmware maintenance. Under the OT security gap model, which is the MOST significant risk?
A
The firmware update may introduce new features
B
The vendor uses a dedicated VPN tunnel that bypasses corporate security controls, with no session recording or time-limiting
C
The PLC will be temporarily offline during the update window
D
The vendor may need to reboot the HMI server
Progress is saved automatically

IT/OT Convergence Threats

The integration of enterprise IT with OT networks creates a new threat landscape where enterprise-targeted attacks now have a clear path to physical infrastructure.

Why Convergence is Happening

Business drivers pushing IT/OT convergence are powerful: real-time production data for ERP systems, remote monitoring for predictive maintenance, cloud-connected analytics, Industry 4.0 initiatives, and cost reduction through shared IT services. These are legitimate business objectives — the problem is that security architecture has not kept pace with connectivity demands.

Business Driver
Real-Time Production Data
ERP and MES systems need live process data from PLCs and SCADA for production planning, quality control, and supply chain management.
Business Driver
Remote Monitoring
Vendors and OT teams demand remote access for diagnostics, firmware updates, and emergency response without expensive site visits.
Business Driver
Cloud Analytics
Industry 4.0 requires OT telemetry to flow into cloud platforms like AWS IoT and Azure IoT Hub for ML-driven predictive maintenance.

Attack Vectors Created by IT/OT Convergence

Attack VectorHow It WorksReal-World ExampleDelinea Control
IT → OT Lateral Movement Attacker compromises IT system, pivots through historian or DMZ to reach OT network Colonial Pipeline 2021 — ransomware entered IT, forced OT shutdown out of caution Zone-specific vaulted accounts
Credential Reuse Same AD credentials used in both IT and OT zones; IT breach = OT breach Ukraine Power Grid 2015 — Sandworm used IT credentials to reach SCADA HMIs Separate OT credential vault
Vendor Remote Access Compromised vendor supply chain → persistent access to multiple customer OT networks SolarWinds 2020 — OT customers exposed via IT monitoring tool Time-limited vendor sessions
Engineering Workstation Compromise Dual-homed workstations bridging IT and OT are targeted to plant malware on PLCs Stuxnet 2010 — targeted Siemens Step 7 engineering software Session recording + app control
Ransomware Cascade Ransomware encrypts historian/SCADA servers, blinding operators who shut down OT as precaution Oldsmar Water Facility 2021 — operator noticed mouse cursor moving Session anomaly detection
💡
KEY INSIGHT: The Dual-Homed Workstation Problem

Engineering workstations (EWS) are the most dangerous convergence point. They must connect to both corporate networks (for email, documentation, vendor software updates) and OT control networks (to program PLCs). Delinea's application control policy on EWS — allowing only whitelisted programs to run and recording all privileged sessions — is the highest-value control you can implement for an OT environment.

QUESTION 1 OF 3 The Colonial Pipeline attack demonstrated which IT/OT convergence risk most directly?
A
PLCs were directly compromised by ransomware
B
Attackers used a vendor remote access tunnel
C
An IT-targeted ransomware attack forced OT shutdown due to shared network connectivity and insufficient segmentation confidence
D
An engineering workstation was used to plant Stuxnet-style malware
Progress is saved automatically

Vaulting SCADA Credentials

Extending Delinea Secret Server to OT environments requires careful planning around dependency mapping, rotation scheduling, and legacy protocol support.

SCADA Credential Inventory — First Steps

The most common mistake is deploying Secret Server before completing a thorough credential inventory. In OT environments, undocumented credentials are the norm, not the exception. A service account that controls the pressure in a refinery pipeline must be discovered before it can be managed.

01
Asset & Account Discovery
Use Delinea Discovery with custom OT scanners to inventory all Windows-based HMIs, SCADA servers, engineering workstations, and historian servers. Scan for local accounts, service accounts, and scheduled task credentials. Document every account manually for non-Windows OT systems (PLCs, RTUs).
02
Dependency Mapping
Before any account is vaulted or rotated, map every dependency: which services authenticate using this credential? Which scripts? Which scheduled tasks? Which HMI connections? Failure to map dependencies results in process outages when rotation occurs. This step takes 2–4 weeks in a typical OT environment.
03
Classify by Criticality & Rotation Risk
Group accounts into tiers: Tier 1 (safety-critical, no auto-rotation), Tier 2 (control-critical, rotation only in maintenance windows), Tier 3 (monitoring/historian, standard rotation). Tier 1 accounts must be vaulted for retrieval but never automatically rotated without manual authorization.
04
Import to Secret Server with OT-Specific Policies
Create a dedicated Secret Policy Template for OT credentials. Enforce checkout-required access, dual approval for Tier 1/2 accounts, automatic session recording proxy, and heartbeat monitoring. Disable auto-rotation initially — enable it only after successful dry-run testing in a maintenance window.
05
Configure Break-Glass Emergency Access
OT environments require guaranteed emergency access even if Secret Server is unavailable. Configure a local break-glass account with a printed, enveloped, and audited password stored in a physical safe. Delinea Secret Server must still vault this credential — the physical copy is the emergency fallback, never the primary method.

OT-Specific Secret Templates

Template Type
SCADA Operator Account
Checkout required, 4-hour maximum checkout duration, session recording mandatory, dual approval for any checkout outside business hours, auto-rotation every 90 days during approved maintenance windows only.
Template Type
PLC Engineering Account
Checkout with supervisor approval, 2-hour maximum, full keystroke session recording, all PLC programming software sessions captured, rotation ONLY with signed change request — never automated.
Template Type
Safety System (SIS) Account
Manual checkout only, requires two-person integrity (two separate approvals), session recording with real-time monitoring alert, password rotation requires VP Operations approval and planned maintenance window. NEVER auto-rotated.
Template Type
Vendor / Third-Party Account
Time-limited (created per-session, deleted after), session recording mandatory, network access restricted to specific OT zone only, all activities logged to SIEM, post-session review by OT security team within 24 hours.
Secret Server — OT Account Rotation Policy Example (REST API)
# Create OT-specific rotation schedule (maintenance window only)
POST /api/v1/secret-policy
{
  "policyName": "OT-ControlNetwork-Tier2",
  "autoChangeSchedule": {
    "changeType": "ScheduledMaintenance",
    "allowedWindows": ["SAT 02:00-06:00", "SUN 02:00-06:00"],
    "requireChangeApproval": true,
    "approvalGroups": ["OT-Change-Board"]
  },
  "checkoutEnabled": true,
  "checkoutIntervalMinutes": 120,
  "requireComment": true,
  "sessionRecordingEnabled": true,
  "heartbeatEnabled": true
}
QUESTION 1 OF 3 You are vaulting a SCADA server service account and discover it is used by 14 dependent services. What should you do BEFORE enabling automatic password rotation?
A
Enable rotation immediately since the account is now vaulted
B
Remove the account from most services to reduce dependencies
C
Complete full dependency mapping, configure all 14 dependent services in Secret Server's dependency management, and test rotation in a maintenance window with rollback plan
D
Create a new account for the most critical services only
Progress is saved automatically

Session Recording & Least Privilege

Recording engineering workstation sessions and enforcing least privilege in OT requires a fundamentally different approach than IT — one that prioritizes availability and operational continuity above all.

Engineering Workstation Session Recording

Engineering workstations (EWS) are the primary target for attackers seeking to modify PLC logic. Session recording on EWS accomplishes two critical objectives: it deters insider threats by establishing that all actions are logged, and it provides forensic evidence when incidents occur — down to every keystroke in SCADA configuration tools like Siemens TIA Portal or Rockwell FactoryTalk.

Delinea Capability
Proxy-Based Session Recording
Session recording via Delinea's connection proxy does not require an agent on the OT endpoint. Traffic is captured at the jump server level, making it compatible with legacy Windows versions and vendor-restricted systems where agent installation is prohibited.
Delinea Capability
Keystroke Logging & Screen Capture
Full screen video recording with searchable keystroke logging. Security teams can search recordings for specific commands — e.g., every session where a specific PLC address block was modified — without watching hours of footage.

What Must Be Recorded in OT

Session TypeRecording PriorityRetentionAlert Trigger
PLC programming sessions (Step 7, TIA Portal) MANDATORY 7 years (regulatory) Any logic download to PLC
SCADA configuration changes (Wonderware, iFIX) MANDATORY 7 years Tag database modifications
HMI setpoint adjustments beyond ±10% REQUIRED 3 years Safety limit boundary approach
Vendor remote access sessions MANDATORY 7 years All sessions — real-time monitoring
Historian database access REQUIRED 2 years Bulk data export events
Safety Instrumented System (SIS) access MANDATORY Lifetime of facility Any access attempt — immediate alert

Least Privilege in OT — Without Disrupting Operations

THE OT LEAST PRIVILEGE PARADOX

In IT, removing admin rights is straightforward — reinstall the software with standard user privileges. In OT, many SCADA and HMI applications were designed to run only under local Administrator accounts. Removing those privileges without testing in a parallel environment first will break running production processes. Least privilege in OT must be implemented incrementally over months, not overnight.

01
Application Whitelisting First
Before removing admin rights, implement application whitelisting using Delinea Privilege Manager. Define exactly which applications OT operators are permitted to run. This alone dramatically reduces the attack surface — even if an attacker gains operator credentials, they cannot execute unauthorized tools.
02
Identify Elevation Requirements
Use Delinea Privilege Manager's discovery mode to log every elevation event on EWS and HMIs over 30 days. This creates a precise map of exactly which operations require elevated privileges — and which ones were running as admin out of laziness or legacy configuration rather than necessity.
03
Create Targeted Elevation Policies
Configure Delinea Privilege Manager elevation policies for specific OT applications: allow TIA Portal to run with elevated privileges when launched by an authenticated OT engineer, but deny elevation for any unapproved process. This grants the minimum necessary privilege for each specific task.
04
Staged Rollout with Rollback Plans
Deploy to a single non-critical engineering workstation in audit mode first — log but do not block. After 30 days, review all elevation events. Move to enforce mode. If no production issues occur over 60 days, roll out to the next workstation group. Never deploy to safety-critical systems without explicit engineering sign-off and a tested rollback procedure.
QUESTION 1 OF 3 An OT security engineer wants to remove local administrator rights from HMI workstations but is concerned about breaking SCADA software. What is the CORRECT first step using Delinea?
A
Immediately revoke admin rights and rely on the service desk for escalation requests
B
Deploy Privilege Manager in discovery/audit mode for 30 days to map every elevation event before enforcing any policy
C
Ask the SCADA vendor to rewrite their software to run without admin rights
D
Create a separate admin workstation and require all OT engineers to use it for every task
Progress is saved automatically

OT PAM Deployment Guide

A complete framework for extending Delinea PAM controls to OT environments while maintaining continuous operations and regulatory compliance.

OT PAM Implementation Roadmap

Phase 1 — Months 1–3
Foundation & Discovery
Asset inventory. Credential discovery. Purdue zone mapping. Initial vaulting of Tier 3 (low-risk) accounts. Break-glass procedure definition. No rotation enabled yet.
Phase 2 — Months 4–8
Control Deployment
Session recording on all vendor access. Privilege Manager audit mode on EWS. Tier 2 accounts vaulted with dependency-managed rotation. MFA enforcement at DMZ jump servers.
Phase 3 — Months 9–18
Mature Operations
Privilege Manager enforcement mode on EWS. Tier 1 accounts vaulted with manual-only rotation. Full SIEM integration. Behavioral analytics on OT sessions. Continuous compliance reporting.

Regulatory Compliance Mapping

RegulationApplicable SectorKey PAM RequirementDelinea Control
NERC CIP Electric utilities CIP-004: Access management; CIP-007: System security Secret Server + Session Recording
IEC 62443 Industrial automation Zone-based access control, account management, audit logging Zone-specific vault policies
NIST SP 800-82 Federal critical infrastructure Least privilege, account management, remote access control Privilege Manager + Secret Server
TSA Pipeline Oil & gas pipelines Cybersecurity implementation plan; access control Full PAM suite
AWIA 2018 Water utilities Risk & resilience assessments including cybersecurity Secret Server + Audit Reports

Common OT PAM Anti-Patterns to Avoid

Anti-Pattern: Applying IT rotation schedules to OT accounts
DANGEROUS
Rotating a SCADA service account password without updating all dependent services causes immediate process disruption. Never apply standard IT rotation policies (e.g., 30-day rotation) to OT accounts. All OT rotation must occur in approved maintenance windows with a tested dependency chain and rollback plan.
Anti-Pattern: Single Secret Server instance servicing both IT and OT
HIGH RISK
If the Secret Server instance is in the IT network and the OT network experiences connectivity loss (planned or unplanned), OT engineers lose access to all vaulted credentials at the worst possible time. Deploy a dedicated Secret Server instance or a replicated node inside the OT zone for continuity.
Anti-Pattern: Blocking all remote vendor access
OPERATIONAL RISK
Some security teams, upon discovering uncontrolled vendor access, shut it down entirely. This causes critical support issues — a PLC firmware bug cannot be remotely patched, and an emergency callout costs $50,000+ in travel costs and response delays. The correct response is to route vendor access through Delinea with time-limiting, recording, and approval workflows — not eliminate it.
Anti-Pattern: Installing Secret Server agent on Safety Instrumented Systems
DANGEROUS
Safety Instrumented Systems (SIS) — the last line of defense preventing catastrophic industrial accidents — must never have unauthorized software installed. Any agent, including Delinea agents, requires safety system vendor certification and a full HAZOP (Hazard and Operability Study) review before installation. SIS credentials should be vaulted in Secret Server and accessed via network proxy, never via an endpoint agent.
💡
FINAL PRINCIPLE: Security Must Not Be the Cause of the Incident

In OT environments, an overly aggressive security control that triggers a process shutdown is itself a security incident — and potentially a safety incident. Every Delinea PAM control deployed in an OT environment must be reviewed by both the OT security team AND the process engineering team. The goal is a security posture that makes attacks harder without creating new failure modes for the process. When in doubt, instrument and monitor before you enforce.

QUESTION 1 OF 3 You are designing a Delinea deployment for a natural gas processing facility. A Safety Instrumented System (SIS) account needs to be included in PAM scope. Which approach is correct?
A
Install the Delinea agent directly on the SIS server for full visibility
B
Exclude SIS from PAM scope since it is too sensitive to touch
C
Vault the SIS credential in Secret Server, configure network proxy-based access with dual approval and session recording — never install an agent on the SIS endpoint
D
Use a shared admin account for the SIS but enforce physical key card access to the server room
Finalize your score and earn completion credit