INSUREX_SYSTEMS
Platform & Cybersecurity

Capability Use Case

Cybersecurity Hardening for OT Security Networks

Defense-in-depth cybersecurity architectures that protect physical security infrastructure from network-borne threats without disrupting operations.

IEC 62443NIST 800-82VLAN802.1XTLS 1.3SIEMZero TrustNmapWiresharkFirewall
Cybersecurity Hardening for OT Security Networks

Executive Summary

Our OT cybersecurity practice secures the physical security network infrastructure—IP cameras, access control panels, building automation controllers, and intercom systems—that is routinely deployed on flat, unmanaged networks with default credentials and unencrypted protocols. We apply IEC 62443 zone-and-conduit segmentation, enforce 802.1X certificate-based device authentication, and integrate OT network monitoring into the enterprise SIEM. Clients close the single largest attack surface in most commercial facilities: the thousands of IoT devices on their physical security network that IT security teams have no visibility into.

The Challenge

Physical security systems represent one of the largest and least-secured attack surfaces in enterprise networks. A typical corporate campus deploys 500-3,000 IP cameras, 100-500 access control readers and panels, dozens of building automation controllers, and hundreds of IoT sensors—all network-connected devices that run embedded operating systems with known vulnerabilities, communicate over unencrypted protocols, and are rarely patched. The 2021 Verkada breach demonstrated the consequences: attackers gained access to 150,000 cameras across hospitals, prisons, and Tesla factories through a single exposed support server.

The root cause is an institutional gap between the teams responsible for these devices. Physical security integrators install cameras and access control on flat Layer 2 networks using DHCP-assigned addresses, default administrative credentials, and RTSP video streaming without TLS encryption. IT security teams manage the enterprise network but treat the security system VLAN as the integrator's responsibility. Neither team owns the cybersecurity posture of the physical security infrastructure, and neither has the cross-domain expertise to address it—integrators lack network security skills, and IT teams lack knowledge of ONVIF, OSDP, BACnet, and the operational requirements of real-time video and access control systems.

Compliance frameworks are catching up to this reality. NIST SP 800-82 Rev. 3 explicitly addresses security for building automation and physical security systems. IEC 62443 provides a comprehensive framework for industrial automation and control system security that applies directly to building OT networks. PCI DSS 4.0 requires segmentation of any network carrying cardholder data from IP camera and access control networks. Yet most facilities have no formal cybersecurity architecture for their OT security systems, no asset inventory of connected devices, and no monitoring for anomalous behavior on these networks.

Our Approach

We begin with a comprehensive OT asset discovery and vulnerability assessment. Using passive network monitoring (Nozomi Guardian, Claroty, or Armis) and active scanning (Nmap with OT-safe scan profiles), we produce a complete inventory of every device on the physical security network: manufacturer, model, firmware version, MAC address, IP assignment method, open ports, running services, and known CVEs. This asset inventory—typically the first one the client has ever seen for their OT network—forms the baseline for all subsequent hardening activities.

Network segmentation follows IEC 62443 zone-and-conduit principles. We define security zones by function and trust level: cameras in one zone, access control panels in another, building automation controllers in a third, management workstations in a fourth. Inter-zone communication is restricted to defined conduits with explicit firewall rules permitting only the protocols and ports required for operational functionality. For example, cameras communicate with the VMS on TCP 554 (RTSP) and TCP 80/443 (ONVIF) only; the VMS communicates with the management zone on TCP 443 only; and no device in the camera zone can initiate outbound connections to the internet. Micro-segmentation at the switch port level uses 802.1X with EAP-TLS certificate-based authentication, ensuring that only enrolled devices with valid certificates can access the network.

Ongoing monitoring integrates OT network telemetry into the enterprise SIEM (Splunk, Microsoft Sentinel, or equivalent). OT-specific detection rules identify anomalous behaviors unique to physical security systems: a camera firmware downgrade, an access control panel communicating with an unexpected IP address, a BACnet controller receiving write commands from a non-authorized source, or ONVIF discovery broadcasts from a device not in the asset inventory. We establish a monthly vulnerability management cadence with the integrator and device manufacturers to track firmware updates, assess CVE applicability, and schedule maintenance windows for patching that do not disrupt 24/7 security operations.

Key Capabilities

OT Asset Discovery & Vulnerability Assessment

Passive and active scanning produces a complete inventory of every networked physical security and building automation device with firmware versions, open ports, running services, and mapped CVEs—typically the first comprehensive OT inventory the facility has ever had.

IEC 62443 Zone-and-Conduit Segmentation

Network architecture segmented by device function and trust level with explicit firewall conduits permitting only operationally required protocols, eliminating the flat Layer 2 networks that enable lateral movement from a compromised camera to the access control system.

Certificate-Based Device Authentication

802.1X EAP-TLS enrollment for every camera, controller, and IoT device using a dedicated PKI, preventing rogue device connection and providing cryptographic identity verification at the network port level.

OT-Specific SIEM Integration

Custom detection rules for physical security system behaviors—firmware changes, unauthorized protocol use, anomalous communication patterns—integrated into the enterprise SIEM for unified security operations center monitoring.

Technical Architecture

802.1X deployment for IP cameras uses EAP-TLS with device certificates issued by an internal PKI (Microsoft AD CS or EJBCA). Each camera is enrolled using SCEP (Simple Certificate Enrollment Protocol) or EST (Enrollment over Secure Transport, RFC 7030) with a bootstrap credential provided during initial provisioning. The RADIUS server (Cisco ISE, Aruba ClearPass, or FreeRADIUS) validates the device certificate against the CA chain and assigns the camera to the appropriate VLAN based on the certificate's organizational unit (OU) field. MAB (MAC Authentication Bypass) is configured as a fallback for legacy devices that do not support 802.1X, with the MAC address whitelisted in the RADIUS server and the port placed in a restricted VLAN with additional firewall filtering. Monitor mode is deployed first to identify authentication failures without disrupting operations, followed by a phased enforcement rollout by zone.

Protocol hardening addresses the specific vulnerabilities of physical security protocols. RTSP streams from cameras are encrypted using SRTP (Secure RTP, RFC 3711) where the camera firmware supports it, or tunneled through TLS 1.3 on cameras that support ONVIF Profile T Streaming over HTTPS. ONVIF device management shifts from HTTP to HTTPS with mutual TLS authentication. Default credentials on every device are replaced with unique, randomly generated passwords stored in a privileged access management (PAM) system (CyberArk, BeyondTrust, or HashiCorp Vault). SNMP is reconfigured from v1/v2c (community string, plaintext) to SNMPv3 with AES-256 encryption and SHA-256 authentication, or disabled entirely on devices where it is not operationally required.

Network monitoring uses a combination of SPAN/mirror ports on distribution switches feeding a passive OT monitoring appliance (Nozomi Guardian or Claroty CTD) that performs deep packet inspection of BACnet, ONVIF, RTSP, OSDP, and Modbus traffic. The appliance builds a behavioral baseline for every device—normal communication partners, protocols, data volumes, time-of-day patterns—and generates alerts when deviations occur. These alerts are forwarded to the enterprise SIEM via syslog (CEF format) or API integration, where they are correlated with IT security events. A quarterly vulnerability scan using Tenable.io with OT-specific plugins identifies new CVEs applicable to the discovered firmware versions, and results are prioritized using CVSS v3.1 scoring adjusted for the device's network exposure (a camera on a segmented VLAN with no internet access receives a lower environmental score than a BACnet controller on a flat network).

Specifications & Standards

Framework
IEC 62443-3-3, NIST SP 800-82 Rev. 3, NIST CSF 2.0
Network Auth
802.1X EAP-TLS, SCEP/EST enrollment, RADIUS (ISE/ClearPass)
Encryption
TLS 1.3, SRTP (RFC 3711), SNMPv3 AES-256, HTTPS ONVIF
OT Monitoring
Nozomi Guardian / Claroty CTD, passive DPI, behavioral baseline
Vulnerability Mgmt
Tenable.io OT plugins, CVSS v3.1 scoring, quarterly cadence

Integration Ecosystem

Cisco ISE / Aruba ClearPass (802.1X)Nozomi Networks GuardianClaroty CTD / xDomeSplunk Enterprise Security / Microsoft SentinelCyberArk / HashiCorp Vault (PAM)Tenable.io (OT vulnerability scanning)Palo Alto Networks (next-gen firewall)

Measurable Outcomes

100% device inventory and credential rotation
Discovered and inventoried 2,847 previously undocumented OT devices across a multi-campus healthcare system, replaced all default credentials with unique PAM-managed passwords, and enrolled 94% of devices in 802.1X certificate-based authentication within 6 months.
Zero lateral movement capability
IEC 62443 segmentation reduced the blast radius of a compromised camera from the entire flat security network (2,800+ devices) to a single microsegmented zone of 24 cameras, with no capability to reach access control, building automation, or enterprise networks.
85% reduction in OT vulnerability exposure
Quarterly vulnerability management and coordinated firmware patching reduced critical and high CVEs across the OT security network from 1,240 to 186 within 12 months, with remaining vulnerabilities mitigated through compensating network controls.

Let's Build

READY TO START?