INDUSTRIAL AND OPERATIONAL VISIBILITY
Lack of visibility can create security blind spots in any environment—be it a factory floor or an enterprise IT network. Corelight offers a visibility solution for identifying and monitoring the most common Industrial Control System (ICS) and Operational Technology (OT) protocols, equipping security teams to defend against threats across diverse environments.
Use the ICS/OT Collection to identify devices and capture evidence related to ICS/OT protocols, yielding greater visibility and faster incident response times. Monitor uncommon network behavior, such as an HVAC system interacting with a server. React more quickly to risks by identifying anomalies in enterprise and operational network traffic in real-time.
Corelight Collections are data extension and detection sets included with your Corelight subscription and can be activated depending on your needs.
- Identify and log ICS/OT protocols like BACnet, DNP3, Ethercat, Modbus, and more.
- Discover activity related to HVAC, security cameras, smart lighting, and access control systems
- Based on contributions from the Cybersecurity and Infrastructure Security Agency (CISA)
- See also: Entity Collection
How it works
The ICS/OT Collection leverages Zeek®, a powerful network security monitoring framework and foundational component of Corelight’s Open NDR Platform. Using Zeek protocol analyzer plugins, the ICS/OT Collection provides detailed logs for each enabled protocol and identifies new services in the connection log in real-time, providing a detailed view of the network’s communication and behavior.
Examples of supported ICS/OT protocols include BACnet, DNP3, Ethercat, Ethernet/IP and CIP, Modbus, PROFINET, S7Comm, TDS, and more.
Collections are targeted categories of detections, inferences, and data transformation focused on providing deeper visibility into adversary activity. You can expose behaviors in encrypted traffic, identify command and control activity, summarize entity activity, ICS/OT visibility, and more. Detections are viewable through Corelight Investigator, or via a SIEM, XDR, or other analytics platform.