For OT and ICS security consultancies
who run assessments where downtime is not an option
Manage operational technology and industrial control system engagements where active scanning is constrained, change windows are tight, and remediation cycles cross plant maintenance schedules. Run IEC 62443 and NIST SP 800-82 assessments, log findings with CVSS, track remediation, and deliver through a branded portal.
No credit card required. Free plan available forever.
A platform built for OT and ICS engagements where scanning is constrained and downtime is the constraint
OT and ICS security consultancies run a different shape of work to IT-focused security firms. Active scanning against process control equipment is rarely permitted on production networks. Findings often come from architecture review, configuration walkthroughs, passive observation, vendor data, and manual testing on the permitted IT-side perimeter. Remediation does not happen on a sprint cadence; it happens during plant maintenance windows that may be months apart. The deliverable is rarely a single report. It is a programme of zone assessments, conduit reviews, control evaluations, and remediation tracking that runs across multiple engagements per asset owner.
SecPortal gives OT and ICS consultancies one workspace per asset owner, structured engagements per zone, findings management with CVSS 3.1 and environmental context, compliance tracking that maps to IEC 62443 and NIST SP 800-82, AI-assisted reporting tuned for layered audiences, and a branded client portal so plant operations, engineering, and corporate security all read the same finding IDs.
Capabilities for OT and ICS consulting in one workspace
Engagement records that match OT zone structure
Create one engagement per zone (corporate IT, DMZ, supervisory, control, field) so the IEC 62443 zones and conduits stay visible on the record. Each engagement has its own scope, methodology notes, and findings, so the assessor can speak to one zone at a time without losing the cross-zone picture.
Findings management without active scanners
Active scanning against PLCs, RTUs, and historians is constrained or prohibited. Log findings manually, paste tester output from offline tooling, or import scanner results from IT segments via Nessus, Burp Suite, or any CSV with custom column mapping. The platform runs on findings, not on a live scan stream.
CVSS 3.1 with environmental adjustment context
Every finding carries a CVSS 3.1 vector and severity. Add the environmental context (safety impact, isolation status, compensating controls, change window constraints) in the finding notes so the rating reflects the OT environment rather than a generic IT context.
Branded client portal for asset owners
Clients see a portal on a tenant subdomain with their findings, remediation status, and reports. The portal is the working surface across plant operations, corporate security, and engineering, so the same finding ID is the source of truth for everyone.
AI-assisted reports tuned for layered audiences
Generate executive summaries for the corporate security lead, technical writeups for the controls engineer, and remediation roadmaps for the operations team. All three are derived from the same engagement record, so there is one set of findings and three views.
Encrypted credential storage when authentication is involved
When the engagement does include authenticated checks against IT-side applications (engineering workstations, OT-IT bridges, jump servers, remote access portals), credentials live encrypted at rest with AES-256-GCM. Cookie, bearer, basic, and form-login modes are supported.
How OT and ICS consultancies run a portfolio inside SecPortal
An OT consulting practice is most efficient when every asset owner looks the same operationally: same engagement structure, same evidence model, same reporting pattern. SecPortal supports the full portfolio rather than one assessment at a time.
- Run an OT/ICS assessment as a structured engagement with scope, methodology, findings, evidence, and a deliverable on one record, instead of a folder of PDFs and a shared drive.
- Manage multiple asset owners (manufacturer, utility, oil and gas operator, water utility) from a single workspace with separate client records and isolated data.
- Bring subcontractor findings (electrical, instrumentation, SCADA vendors) into the same workspace via CSV import, deduplicate against the existing finding list, and ship a single consolidated report.
- Track remediation across plant change windows. Findings have owners, severity-driven target dates, and status updates that the asset owner sees in the branded portal between outage cycles.
- Maintain a defensible audit trail of every finding, every status change, and every report version, suitable for the regulator, the certifying body, or the corporate audit team.
- Roll engagements forward year over year on the same client record so reassessments and surveillance cycles start from a continuity record rather than a binder rebuild.
From scope walkdown to remediation closure on one engagement record
OT and ICS engagements share an underlying shape across industries (manufacturing, energy, water, oil and gas, transportation). The platform runs that shape so the consultant focuses on judgment work rather than coordination overhead.
- 1Open the client record with primary contacts, zone inventory at the level of detail the assessment requires (corporate, DMZ, supervisory, control, field), and any prior assessment history.
- 2Create the assessment engagement with the methodology spelled out (IEC 62443 zone-conduit assessment, NIST SP 800-82 risk assessment, an architecture review, a tabletop, or a constrained pentest with passive observation).
- 3Walk the scope with the asset owner, mark which segments are in or out, capture the rules of engagement (what is permitted, what is prohibited, what requires plant-side approval), and attach the signed authorisation as evidence.
- 4Log findings as they surface from passive observation, configuration review, vendor data, manual testing on permitted IT segments, and subcontractor reports. Each finding has a CVSS vector, severity, evidence, and remediation guidance from the 300+ template library.
- 5Track remediation through the branded portal. Findings have owners, severity-driven target dates, and status updates. Plant change windows are visible on the dashboard so slippage surfaces before the next outage cycle.
- 6Generate the deliverable from the live record. The executive summary, technical writeup, and remediation roadmap come from the same finding set. The asset owner receives a controlled document; the consultant edits a draft rather than writes from blank.
Why OT and ICS engagements need a different operating pattern
The Purdue Enterprise Reference Architecture, NIST SP 800-82r3 (Guide to Operational Technology Security), and the IEC 62443 series describe the same operational reality from different angles. Each one is published guidance that consultancies anchor their methodology to, and each one creates a constraint that an IT-style platform does not accommodate well.
- Active testing is restricted. Sending unexpected traffic to a programmable logic controller, a remote terminal unit, or a safety instrumented system can cause a process upset. Most engagements are scoped around observation, configuration review, and tightly constrained testing on permitted segments.
- Patching cycles are slow. A plant might apply firmware updates once per outage window, sometimes once per year. The remediation tracker has to handle months-long fix cycles without losing context, and the report has to articulate compensating controls clearly enough for the asset owner to defend the gap to a regulator in the meantime.
- Audiences are layered. The controls engineer cares about the safety case and the engineering workstation. The plant manager cares about uptime and shift discipline. The corporate CISO cares about regulatory exposure. The board cares about business continuity. The same finding has to be readable by all four, and the consultant cannot afford to write the report four times.
- Compliance is regulator-driven, not certification-driven.Energy, water, transportation, and chemical sectors face sector-specific regulators (NERC CIP for the bulk power system, TSA pipeline directives, EU NIS2 for essential entities, AWWA for water). The compliance tracker has to map findings to the regulatory framework that applies, not to a generic Annex.
Frameworks the platform supports for OT and ICS work
The platform ships structured framework reference pages that OT and ICS consultancies anchor their assessments to, alongside compliance tracking against the controls those frameworks define.
- IEC 62443 for the zone and conduit assessment, the seven foundational requirements, and the asset owner, integrator, and product supplier role split that anchors most OT and ICS assessments.
- NIST Cybersecurity Framework and the broader NIST publication family, including the SP 800-82 OT-specific guidance that asset owners use to scope an OT risk assessment.
- NIST SP 800-53 for federal and federally adjacent OT environments where the catalogue applies alongside OT-specific overlays.
- ISO 27001 for the corporate IT side of an asset owner that the consultancy is also covering, where Annex A controls map to the IT segments that interface with the OT environment.
- NIS2 for essential and important entities in the EU, where industrial operators have direct regulatory reporting obligations and risk assessment expectations.
- CIS Controls as a baseline used on the IT-side perimeter and on engineering workstations that bridge into the OT environment.
- MITRE ATT&CK (and the ICS matrix referenced from it) for tagging tactics and techniques observed during testing or modelled during a tabletop.
Where OT engagements meet IT-side technical testing
Most OT engagements include some testing on the IT-side perimeter that interfaces with the OT environment: jump servers, engineering workstations, remote access portals, historians, and the corporate domain that authenticates into the supervisory layer. This is where findings on the IT side translate into pivot risk on the OT side.
- The penetration testing use case covers the day-to-day flow of running an engagement from scope through to findings and delivery, which is the pattern the IT-side workstream of an OT engagement runs on.
- The remediation tracking use case covers the end-to-end fix cycle, including how findings stay open through long remediation windows without drifting out of the record.
- The pentest evidence management use case covers structured evidence capture, which matters more in an OT engagement than in a standard IT pentest because the regulator or the certifying body may want to see the authorisation trail and the methodology evidence months after delivery.
- The default credentials and weak password policy reference pages cover two of the most common findings on engineering workstations and jump servers that bridge into the OT environment.
- The rules of engagement template gives a structured baseline that OT engagements adapt heavily, since the prohibited list (no active scanning of safety-rated equipment, no fuzzing of historians, no scanning during shift changeover) is the operational core of the contract.
Where to start
Most OT and ICS consultancies adopt the platform in three steps: stand up a single asset owner with a structured zone-conduit assessment engagement, move recurring assessment clients onto the same model so reassessments roll forward year over year, then bring the IT-side technical testing workstream and any subcontractor findings into the same workspace so the consolidated report comes off one record.
If your practice runs a broader security consulting line alongside the OT specialism, the sister page SecPortal for security consultants covers engagement management across pentest, IR, and assessment work in the same workspace. If your practice ships compliance readiness alongside the OT engagement, the compliance consultants page covers the multi-framework portfolio pattern. If the practice extends into cloud-side review for the corporate IT and SaaS estate that surrounds the OT environment, the cloud security consultancies page covers the AWS, Azure, and GCP assessment pattern.
For the operational shape of running structured assessments inside the platform, the penetration testing use case walks through scoping, finding capture, evidence handling, and report generation in detail, and the compliance audits use case covers the control-evidence side that an OT engagement layers on top of the technical findings.
The problems you face
And how SecPortal solves each one.
IT-style scanners cannot run freely against production OT networks
Findings are entered manually or imported from passive listening tools, vendor reports, and air-gapped tester output via CSV. SecPortal does not require live scanning to manage the engagement; the workflow runs on findings, not telemetry.
Engagements span IT, OT, and shared services and the data lives in different folders
One workspace per client with separate engagements per zone (IT, DMZ, supervisory layer, control layer, field layer). Findings, evidence, and remediation status all live on the engagement record, not in a folder of PDFs.
Plant change windows mean remediation slips for months and nobody tracks the slippage
Each finding has an owner, a target date by severity, and a status. Slippage is visible on the dashboard and in the branded client portal so engineering, operations, and the asset owner all see the same picture before the next outage window opens.
Reports written for a process control engineer look nothing like reports written for a CISO
AI generates separate executive, technical, and remediation views from the same engagement record. The site engineer reads the technical writeup; the corporate security lead reads the executive summary; both reference the same finding IDs.
IEC 62443 and NIST SP 800-82 assessments produce control evidence that ages out of binders
Compliance tracking runs alongside the engagement. Findings link to the control they failed against, and the activity log exports to CSV when the auditor or the regulator wants the trail.
Subcontracted electrical, instrumentation, and SCADA vendors deliver findings as Word docs
Bring subcontractor findings into the same workspace via CSV import with custom column mapping. Deduplicate against the existing finding list before the report ships, so the asset owner never sees the same gap from three sources.
Key features for you
Run OT and ICS engagements as records, not as binders
IEC 62443 and NIST SP 800-82 assessment, findings, remediation, and reporting on one client record. Free plan available.
No credit card required. Free plan available forever.