Texture Top Right Grey 04

Industrial Control Systems Healthcheck

Reduce security vulnerabilities in SCADA and ICS environments

During an Industrial Control Systems (ICS) Healthcheck, Mandiant experts draw on our knowledge of advanced threat actors, security breaches and ICS domains to evaluate how well your ICS security program and architecture are segmented, protected and monitored.

Industrial Control Systems Healthcheck

Industrial Control System Healthcheck Overview


The ICS Healthcheck helps your organization assess its cyber security posture without the operational risk associated with software-based agents, network scanning and other aggressive and invasive assessment techniques. Incorporating their understanding of operational technology (OT), Mandiant consultants deliver a workshop-based ICS architecture review and provide a detailed technical analysis of and recommendations for your security environment.

Our Approach

The ICS Healthcheck applies an ICS risk analysis and threat modeling methodology followed by technical data analysis.

Risk analysis and threat modeling

  1. Document current network
    Mandiant consultants inventory and review your existing architecture documentation, communications protocols and security polices, standards, and procedures to thoroughly understand your ICS security environment.
  2. Develop threat model
    Our experts work with your IT, operations and engineering staff to identify the high-likelihood and high-risk attack vectors and targets.
  3. Prioritize controls
    Using the threat model, Mandiant professionals help your team select and prioritize security controls to address recognized, anticipated threats.

Technical data analysis

  1. Review network segmentation
    Our consultants deploy a FireEye Network Forensics Platform device on your network and then analyze network packet capture files to determine the types of security risks you face.
  2. Review security device configuration
    Mandiant experts determine how your network security devices are configured and verify the efficacy of their rule sets.

What you get

  • Threat model diagram
  • ICS Healthcheck report
  • Strategic and technical recommendations

Related resources

Ready to get started?

Our security experts are standing by to help you with an incident or answer questions about our
consulting and managed detection and response services.

+1 888-227-2721 +61 281034308 +32 28962867 +1 877-347-3393 +971 45501444 +358 942451151 +33 170612726 +49 35185034500 +852 3975-1882 +91 80 6671 1566 +353 (0)216019160 +39 0294750535 +81 3 4577 4401 +03 77248276 +52 5585268207 +31 207941289 +64 32880234 +48 223072296 +7 4954658084 +65 31585101 +27 105008408 +82 7076860238 +34 932203202 +94 788155851 +46 853520870 +886 2-5551-1268 +27873392 +44 2036087538 +842444581914