OT Security Management

We support you with the implementation of security processes to protect your operations

Holistic OT Security Management with Limes Security

OT systems are increasingly being targeted by cyber criminals. Industrial plants, supply chains and networked systems are increasingly becoming targets for attackers. At the same time, regulations such as the NIS Directive, IEC 62443 or ISO 27001 are increasing the requirements, which is why companies today need clear OT security strategies and well thought-out security concepts.

Limes Security supports you at every step of your Cyber Security Roadmap, including the definition of security processes, policies and requirements, security awareness, gap assessments, maturity assessments and security testing.

Practical Experience

We work with companies from the oil and gas industry, the electricity industry, the water and wastewater industry, the automotive industry and many other sectors. In order to offer you the best possible support, we take a practical and solution-oriented approach to safety projects.

Customized Solutions

Industrial systems are as diverse as the areas of application for which they were developed. We offer you tailor-made solutions for your requirements – from individual integration projects to the development of comprehensive security architectures.

Knowledge Transfer

Our aim is not only to solve our customers’ current problems, but also to share our knowledge with them and equip them for future challenges – as an integral part of consulting projects or through targeted professional training based on our tried and tested training courses.

Asset Inventory

A list of the systems in operation with their most important properties provides a clear overview. Thanks to (partially) automated updates, this overview is always kept up to date.

Supply Chain Management

Suppliers know the security requirements and support their implementation. In the event of uncertainties or particular risks, additional mitigation measures are jointly defined.

Risk Management

Risk management must be coordinated between the industrial and corporate divisions. Risk treatment and prioritization must be ensured in view of the criticality of assets.

Patch Management

Systems are updated in organized maintenance cycles as soon as patches are available. Where timely or complete patching is not possible, compensatory countermeasures are used.

Logging/Monitoring

Security-relevant events in OT systems are logged and collected centrally. It is clearly defined which events trigger alarms and how they are handled.

Remote Access

The use of remote access software is restricted to authorized solutions. Clear specifications for secure configuration and use must be defined for these.

Hardening

Device configurations are checked regularly using predefined, secure baseline configurations. If necessary, additional compensatory measures are implemented.

Backup and Recovery

A backup procedure is defined for all systems, which is checked regularly and takes all operationally relevant data into account. In addition, there is a recovery plan that takes all essential resources into account.
Step by Step

What we recommend for your security journey

Before we implement concrete steps, we work with you to create the foundation for this: we clarify roles and responsibilities, help in securing management support and budget and gain an overview of the status quo through an initial assessment. On this base, we develop a project plan with clear priorities and measurable goals.

1

Initial Assessment

  • Identify OT boundaries & interfaces

  • Assess & assign critical assets

  • Establish a secure IT/OT perimeter with a firewall

2

Segmentation & DMZ

  • Set up IT/OT-DMZ as a buffer zone

  • Segment critical assets

  • Jump Hosts for secure access

3

Backup & Recovery

  • Backup processes for critical assets

  • Make the entire stack recoverable

  • Test recovery regularly

4

Asset Security

  • Hardening & role-based access

  • Patch- & Vulnerability-Management

5

Cleanup

  • Secure decommissioning of legacy assets

  • Complete asset database

  • Basic protection also for non-critical assets

6

Reactive Security

  • Establish incident handling & BCM processes

  • Test & improve regularly

  • Ensure security in procurement

Walter Hölblinger, Rosenberger Hochfrequenztechnik über die erfolgreiche Zusammenarbeit mit Limes Security

I value the collaboration with Limes Security because it takes place at eye level.
Efficient services, no "selling as many hours as possible", valuable output and consistently professional communication make them a valued partner.

Walter HölblingerVice President Global IT
Logo Rosenberger Hochfrequenztechnik GmbH & Co. KG

How secure is your OT environment really?

Our OT Cyber Health Check provides a structured first assessment of your current security posture and highlights potential risks.

Limes Academy

OT Security Trainings

  • Preview image Limes Academy Awareness Training ICS201
    Select options This product has multiple variants. The options may be chosen on the product page Quick View

    ICS.201 OT Security Fundamentals

     346,00
  • vorschaubild zum Limes Academy COSP
    Select options This product has multiple variants. The options may be chosen on the product page Quick View

    ICS.205 Certified OT Security Practitioner (COSP)

     3.070,00
  • Preview Image Limes Academy COSTE
    Select options This product has multiple variants. The options may be chosen on the product page Quick View

    ICS.211 Certified OT Security Technical Expert (COSTE)

     3.350,00
  • Preview Limes Academy COSM
    Select options This product has multiple variants. The options may be chosen on the product page Quick View

    ICS.212 Certified OT Security Manager (COSM)

     3.350,00

Frequently asked questions

What options do I have to define the risk appetite of my organization?

How can I minimize the risk in my supply chain?

How great is the risk of data loss in the event of an incident at my company?

Which cyber threats affect my company?

How expensive is cyber security?

What will be my biggest challenge in the field of industrial cyber security?

Defending what matters

The next cyberattack is coming! Are you prepared for this?