Asset Inventory for OT
Comprehensive asset inventory is the foundation of ISO 27019 implementation. You cannot protect what you don't know exists.
Why Asset Inventory is Critical
Without a complete inventory you cannot:
- Identify which assets need protection
- Determine which systems have which versions and vulnerabilities
- Understand data flows and dependencies
- Assess criticality for risk prioritization
- Meet regulatory compliance requirements
- Respond effectively to incidents
Unique OT Inventory Challenges
Passive-Only Discovery
Active network scanning can crash legacy OT devices:
- Use passive network monitoring
- Collect data over weeks to see all devices
- Cannot force immediate discovery
- Span ports or network taps for visibility
Undocumented Systems
Many OT installations lack current documentation:
- Systems installed decades ago
- Original installers may have left organization
- Vendor documentation lost or outdated
- Undocumented field modifications
Distributed Infrastructure
Energy assets spread across large geographic areas:
- Hundreds of substations
- Remote generation facilities
- Distributed field devices
- Difficult to physically survey all locations
Legacy and Proprietary Systems
Unique identification challenges:
- Custom or proprietary devices
- No standard identification methods
- Firmware versions difficult to determine
- Vendor-specific tools required
ISO 27019 Inventory Requirements
Asset Identification
For each asset collect:
- Unique identifier: Asset tag, serial number
- Asset name: Functional description
- Type: SCADA server, PLC, RTU, IED, HMI, etc.
- Location: Physical and network location
- Owner: Responsible department/person
Technical Details
- Manufacturer and model
- Hardware version
- Operating system and version
- Firmware version
- Software applications and versions
- Communication protocols used
- IP address and network details
Operational Context
- Function: What process does it control/monitor?
- Criticality: Impact if unavailable or compromised
- Dependencies: What it connects to and relies on
- Operational constraints: Patching windows, availability requirements
- Maintenance schedule: Planned outages
Security Information
- Known vulnerabilities: CVEs affecting the asset
- Patch status: Current patch level
- Security controls in place: AV, whitelisting, etc.
- Network zone: Which security zone it's in
- Access controls: Who can access
Discovery Methods
Passive Network Monitoring
Most important for OT:
- Deploy network monitoring tools on span ports
- Collect traffic for 2-4 weeks minimum
- Identify devices by protocol analysis
- Map communication patterns
- Minimal risk to operational systems
Tools:
- Industrial protocol analyzers
- OT-specific asset discovery platforms
- SIEM with OT protocol support
- Network behavior analysis tools
Physical Site Surveys
Walk down facilities to document assets:
- Visit control rooms, equipment rooms, substations
- Photograph equipment and read nameplates
- Document physical connections
- Interview operations staff
- Find assets passive monitoring missed
Configuration File Analysis
Review system configurations:
- Export PLC/RTU configurations
- Analyze SCADA server settings
- Review firewall rules for device references
- Check backup files for asset details
Vendor Documentation Review
Leverage existing documentation:
- Original system architecture diagrams
- Vendor installation records
- Maintenance documentation
- As-built drawings
- Training materials
Active Scanning (Carefully)
Only when safe:
- Test in isolated lab environment first
- Coordinate with operations
- During planned maintenance windows
- Limited to specific device types known to be safe
- Have rollback procedures ready
Asset Categorization
By Purdue Level
Organize assets by network architecture:
- Level 0-1: Field devices (PLCs, RTUs, IEDs, sensors)
- Level 2: Control systems (SCADA servers, DCS, HMIs)
- Level 3: Site operations (historians, engineering workstations)
- Level 3.5: DMZ (data exchange systems)
- Level 4: Enterprise IT
By Criticality
Risk-based prioritization:
- Critical: Loss causes immediate safety risk or grid instability
- Important: Significant operational impact, can operate manually short-term
- Non-critical: Minimal impact if unavailable
By Ownership
Responsibility assignment:
- Generation: Power plant assets
- Transmission: Grid control and transmission systems
- Distribution: Local delivery systems
- Corporate: Shared infrastructure
Inventory Maintenance
Integration with Change Control
Keep inventory current:
- New assets added before deployment
- Changes updated in inventory
- Decommissioned assets removed
- Firmware/software updates recorded
Periodic Verification
Regular reconciliation:
- Quarterly passive network scans
- Annual physical surveys
- Continuous monitoring updates
- Deviation investigation and resolution
Automated Discovery
Where possible, automate:
- Continuous passive monitoring
- Integration with SCADA systems
- Configuration management database (CMDB)
- Automatic alerts for new/changed devices
Implementation Roadmap
Phase 1: Critical Systems (Months 1-2)
- Inventory SCADA servers and critical PLCs
- Document control center equipment
- Map generation control systems
- Identify safety systems
Phase 2: Control Network (Months 3-4)
- Complete field device inventory
- Document all PLCs and RTUs
- Catalog engineering workstations
- Map network infrastructure
Phase 3: Supporting Systems (Months 5-6)
- Inventory historians and HMIs
- Document remote access infrastructure
- Catalog vendor support systems
- Complete network security devices
Phase 4: Validation and Maintenance (Ongoing)
- Cross-reference multiple sources
- Resolve discrepancies
- Establish ongoing processes
- Integrate with asset management
Documentation and Tools
Inventory Database
Key fields to maintain:
- All identification and technical details above
- Last updated date and by whom
- Change history
- Related assets (dependencies)
- Supporting documentation links
Visualization
Create visual representations:
- Network topology diagrams
- Geographic asset maps
- Purdue model layer diagrams
- Criticality heat maps
- Zone and conduit diagrams
Reporting
Regular reports for:
- Management (high-level summary, trends)
- Security team (vulnerabilities, risks)
- Operations (asset status, maintenance due)
- Compliance (audit evidence)
Best Practices
- Start with what you know - Build on existing documentation
- Use multiple methods - Cross-validate findings
- Prioritize by criticality - Critical systems first
- Engage operations - They know the systems best
- Be patient - OT discovery takes time
- Keep it current - Stale inventory is useless
- Make it accessible - Easy to search and update
- Link to other processes - Change control, vulnerability management
Next Lesson: Conducting risk assessments specific to process control systems.