Securing Legacy PLCs with Non-Intrusive Approaches
A 20-year-old Allen-Bradley PLC running a packaging line has no encryption, no authentication, and no firmware updates available. Replacing it would cost $200K and three weeks of downtime. So how do you secure it? This post covers non-intrusive security methods that protect legacy PLCs without touching the devices themselves -- keeping your OT protection effective while production keeps running.
Understanding the Challenges of Legacy PLC Security
Security Gaps in Legacy PLCs
Legacy PLCs, especially those that have been in operation for over two decades, often lack even basic cybersecurity features. Key security gaps include:
- Lack of encryption: Many legacy PLCs communicate using unencrypted protocols, making them susceptible to interception and tampering.
- Insufficient authentication: These systems often lack any authentication mechanism, making unauthorized access easier.
- Outdated firmware: Manufacturers may no longer provide updates, leaving systems vulnerable to known exploits.
Operational Constraints
Securing legacy PLCs is further complicated by operational constraints. These devices are typically integral to production processes, and any downtime can have significant financial implications. Therefore, security measures must be non-intrusive to avoid disrupting normal operations.
Non-Intrusive Security Strategies
Network Segmentation
One of the most effective non-intrusive security strategies is network segmentation. By isolating legacy PLCs from other network components, you can reduce the risk of lateral movement by attackers.
- Create separate VLANs: Segregate PLCs into their own VLANs to limit access to only essential network traffic.
- Use firewalls: Implement firewalls to control and monitor traffic between segmented networks.
Intrusion Detection Systems (IDS)
Deploying an IDS can help detect unauthorized attempts to access or manipulate PLCs without altering the PLCs themselves.
- Passive monitoring: Ensure the IDS operates in a passive mode, analyzing traffic patterns without impacting network performance.
- Anomaly detection: Use anomaly detection to identify unusual patterns that could indicate an attack.
Protocol Whitelisting
Implement protocol whitelisting to allow only known, safe protocols to communicate with your PLCs. This minimizes the risk of attacks exploiting unsupported or unsafe protocols.
- Identify essential protocols: Determine which protocols are necessary for operations and block all others.
- Regular updates: Continuously update the whitelist to adapt to operational changes.
Encryption Gateways
For legacy PLCs lacking inherent encryption capabilities, encryption gateways can be implemented to secure data in transit.
- Data encryption: Use gateways to encrypt data between PLCs and other network devices.
- Protocol translation: Gateways can also translate older protocols to more secure, modern equivalents.
Compliance Considerations
Aligning with NIST 800-171 and CMMC
When securing legacy PLCs, align with relevant compliance standards such as NIST 800-171 and CMMC.
- Access controls: Implement robust access controls as specified by NIST 800-171 to protect Controlled Unclassified Information (CUI).
- Audit and accountability: Ensure all access and changes to PLCs are logged and reviewed regularly.
Meeting NIS2 Requirements
The NIS2 directive requires specific security measures in critical infrastructure sectors.
- Asset inventory: Maintain an up-to-date inventory of all legacy PLCs as part of your compliance strategy.
- Incident response: Develop incident response plans that include protocols for handling security breaches involving legacy PLCs.
Practical Implementation Tips
Conduct a Risk Assessment
Before implementing security measures, conduct a thorough risk assessment to understand the vulnerabilities specific to your legacy PLCs.
- Identify critical assets: Determine which PLCs are most critical to operations and prioritize their protection.
- Evaluate threats: Assess potential threats and their likelihood of impacting your PLCs.
Engage with Experts
Consider engaging with cybersecurity experts who specialize in industrial control systems to tailor a security strategy that fits your specific needs.
- Consultants: Use consultants to gain insights into the latest security technologies and best practices.
- Training: Provide ongoing training for staff to ensure they are aware of potential threats and how to respond.
Conclusion
Start with network segmentation to isolate your oldest PLCs, then layer IDS and encryption gateways on top. Map each measure to your compliance requirements -- NIST 800-171 AC and SC families, NIS2 Article 21 -- so you can demonstrate coverage during audits. The goal is straightforward: build a security perimeter around devices that cannot secure themselves.

