ConduitShield

Passive-first cybersecurity for OT, ICS, and IIoT
ConduitShield v1.0
Discover
Defend
Respond
PASSIVE MODE
2,461
Assets Monitored
PLCs, RTUs, HMIs, DCS, SIS
12
Zones / 34 Conduits
ISA/IEC 62443 enforced
23
Critical Vulns
Firmware correlation active
71.5%
Compliance Score
6 frameworks tracked
8
Remote Sessions
JIT + MFA + recorded
47
ATT&CK Techniques
ICS matrix coverage
Purdue Model — Zone Health
L5 Enterprise 142 assets · 2 findings · 3 conduits
L4 Site Business 89 assets · 5 findings · 4 conduits
L3.5 Industrial DMZ 24 assets · 1 finding · 6 conduits
L3 Site Operations 156 assets · 8 findings · 8 conduits
L2 Supervisory 312 assets · 4 findings · 7 conduits
L1 Basic Control 487 assets · 12 findings · 4 conduits
L0 Physical Process 1,251 assets · 3 findings · 2 conduits
Real-time Alerts
14:23 UTC
Unauthorized Modbus Write — PLC-047
FC 0x06 from 10.10.8.99 — not in engineering whitelist. Blocked by IDS.
09:15 UTC
S7comm Auth Bypass Attempt — PLC-001
5 failed auth from EWS-001. Account locked. ATT&CK T0812.
07:41 UTC
Config Drift — HMI-003 Golden Image Mismatch
12 registry changes vs golden image. Unauthorized software.
04:02 UTC
Rogue Device on L2 — Baseline Violation
Unknown MAC 00:1A:2B:3C:4D:5E on VLAN 120. Not in inventory.
02:30 UTC
JIT Vendor Session — Siemens Support
PLC-001 firmware check. Approved by OT-Admin. Session recorded.
Communication Baselines
Normal L2→L1 protocolsModbus, S7comm, EtherNet/IP ✓
Unauthorized protocol detectedSMBv1 on L2 VLAN ✗
New connections (24h)3 new pairs
Polling frequency anomalyNone detected ✓
Asset Intelligence — Passive Discovery (SPAN/TAP)
2,461
Total Assets
2,318
Online
67
Vulnerable
18
End-of-Life
12
OT Protocols
Full Asset Inventory
IDNameTypeVendorFW / OSProtocolZoneIPCriticalityStatus
PLC-001Main Process ControllerPLCSiemens S7-1500V2.9.7S7comm+L110.10.1.10CRITICALONLINE
PLC-002Water Treatment PLCPLCAllen-Bradley CLXV33.011EtherNet/IPL110.10.1.11CRITICALVULN
SIS-001Safety SystemSISTriconex 3008V10.6TriStationL110.10.1.100CRITICALONLINE
DCS-001CENTUM VPDCSYokogawaR6.09OPC UAL110.10.1.200CRITICALONLINE
RTU-001Substation RTURTUGE D400V8.1DNP3L110.10.2.20HIGHONLINE
HMI-001Operator Station 1HMIAVEVA2023 R1OPC UAL210.10.3.30HIGHPATCH
SRV-001SCADA ServerServerAVEVA2023.1ModbusL310.10.4.41CRITICALVULN
FW-001OT FirewallFirewallPalo Alto PA-3260PAN-OS 11.1.2DMZ10.10.5.1CRITICALONLINE
IOT-001MQTT BrokerBrokerEclipse MosquittoV2.0.18MQTTL310.10.9.10MEDIUMMONITOR
Identity, Access & Remote Operations
8
Active Sessions
JIT enforced
100%
MFA Enforced
All remote access
3
Default Creds Found
Remediation required
156
Session Recordings
Last 30 days
JIT Remote Access — Active Sessions
UserRoleTargetApproved ByMFARec
siemens-supportVendorPLC-001OT-Admin-1YESREC
ot-engineer-2EngineerEWS-001OT-ManagerYESREC
vendor-abbVendorRTU-002Power-EngYESREC
Default Credential Alerts
DeviceProtocolCredentialRisk
SW-003 (Moxa)SNMPCommunity: publicCRITICAL
IOT-012MQTTadmin:adminCRITICAL
CAM-005HTTPadmin:123456HIGH
Vulnerability, Patch & Exposure Management
23
Critical (9.0+)
67
High (7.0-8.9)
142
Medium (4.0-6.9)
18
EOL Systems
89%
Patch Current
ICS-CERT Advisory Correlation
CVEProductCVSSAssetsPatchStatus
CVE-2023-28489Siemens S7-15009.83V3.0.1Scheduled
CVE-2022-1159Rockwell CompactLogix8.67V34.011Testing
CVE-2023-34360AVEVA SCADA8.122023.2Open
CVE-2023-0955JCI BMS6.54V4.4Compensating
CVE-2022-38152Moxa EDS-516A7.58V3.11Deploying
CVE-2023-28366Eclipse Mosquitto5.31V2.0.19Patched
IoT Security Controls & Device Lifecycle
847
IoT Devices
92%
Secure Config
14
Certs Expiring
100%
Encrypted Transit
Secure Onboarding Queue
DeviceTypeCredsCertConfigStatus
TEMP-094Temp Sensor✗ Default✗ None✗ FactoryBLOCKED
FLOW-027Flow Meter✓ Changed✓ Issued✗ PendingIN PROGRESS
VIB-011Vibration✓ Changed✓ Issued✓ AppliedAPPROVED
Detection Engineering & MITRE ATT&CK for ICS
47
ATT&CK Techniques
156
Alerts (24h)
98.2%
Log Coverage
14
Event Sources
ATT&CK for ICS — Detection Rules
TechniqueIDTacticRulesLast Triggered
Unauthorized Command MessageT0855Impair Process314:23 today
Program UploadT0845Lateral Movement2Yesterday
Modify Controller TaskingT0821Execution43 days ago
Default CredentialsT0812Initial Access309:15 today
Exploitation of Remote ServicesT0866Initial Access55 days ago
Denial of ServiceT0814Inhibit Response27 days ago
Incident Response & Recovery
2
Open P1
5
Open P2
14
Resolved (30d)
4.2h
Avg Response
Active Incidents
IDTitleSevZoneStatus
INC-089Unauthorized Modbus WriteP1L1Containment
INC-088S7comm Brute ForceP1L1Investigation
INC-087Rogue Device on L2P2L2Triage
Evidence Locker — INC-089
TypeDescriptionChain of Custody
PCAPModbus capture — 10.10.8.99SOC-Analyst → Evidence-Srv
LogsFirewall deny logs L1SIEM → Locked storage
PLC StatePLC-047 register dumpOT-Eng → Evidence-Srv
OT Playbook — Unauthorized PLC Write
1
Isolate: Block source IP at zone firewall. Do NOT power cycle PLC. ⚠ SAFETY GATE
2
Verify: Compare current PLC program against golden backup. Check logic mods.
3
Preserve: Capture PCAP, PLC state, logs. Maintain chain of custody.
4
Assess: Verify physical process safe with operations team. ⚠ SAFETY GATE
5
Restore: If compromised, restore from verified backup. Re-enable monitoring.
6
Report: Notify CISO, plant manager, regulators. Document lessons learned.
Segmentation & Zone/Conduit Policy
12
Zones
34
Conduits
7
Violations
93%
Policy Match
Conduit Policy Enforcement
ConduitSource → DestAllowedViolationsStatus
C-01L3 → L2OPC UA :4840, Modbus :5020OK
C-02L4 → DMZHTTPS :443 only0OK
C-03DMZ → L3OPC UA :4840 (read-only)2ALERT
C-05L2 → L1S7comm :102, EtherNet/IP :448185BREACH
C-06VPN → DMZIPSec (JIT, recorded)0OK
Governance, Compliance & Audit
71.5%
Overall Score
892
Implemented
23
Critical Gaps
1,247
Total Controls
Framework Compliance
StandardVersionScoreImplementedGaps
ISA/IEC 62443201868%204 / 30096
NIST SP 800-82Rev 375%188 / 25062
NERC CIPv782%164 / 20036
MITRE ATT&CK ICSv1484%47 / 569
CIS Controlsv8.174%133 / 18047
CISA ICS Baseline202465%156 / 24084