Adversaries may gather information about the physical process state. This information may be used to gain more information about the process itself or used as a trigger for malicious actions. The sources of process state information may vary such as, OPC tags, historian data, specific PLC block information, or network traffic.
|A0002||Human-Machine Interface (HMI)|
|A0005||Intelligent Electronic Device (IED)|
|A0003||Programmable Logic Controller (PLC)|
|A0004||Remote Terminal Unit (RTU)|
|M0816||Mitigation Limited or Not Effective||
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
|ID||Data Source||Data Component||Detects|
|DS0015||Application Log||Application Log Content||
Monitor applications logs for any access attempts to operational databases (e.g., historians) or other sources of operational data within the ICS environment. These devices should be monitored for adversary collection using techniques relevant to the underlying technologies (e.g., Windows, Linux).
|DS0029||Network Traffic||Network Traffic Content||
Monitor ICS automation network protocols for functions related to reading an operational process state (e.g., "Read" function codes in protocols like DNP3 or Modbus). In some cases, there may be multiple ways to monitor an operational process’ state, one of which is typically used in the operational environment. Monitor for the operating mode being checked in unexpected ways.