SCADA Vulnerability Assessment & Penetration Testing

Learn how Orro helped a local council identify several security risks via vulnerability assessment and penetration testing services to increase the organisation’s security maturity.

SCADA Cyber Security Assessment

Challenge

A QLD Regional Council had upgraded their telecommunications and corporate IT environment and was embarking on a number of Digitisation strategies under their Smart City agenda. It was realised that this would also impact their SCADA infrastructure, specifically water reticulation and treatment.

What was unknown within this environment was any Cyber security vulnerabilities and the risks posed by such security weaknesses if successfully exploited by persons with malicious intent.

Additionally, the Council was interested in carrying out a phishing campaign to identify user awareness and then trend increased awareness over a 12 month period.

Solution

Orro was engaged to perform a vulnerability assessment and penetration test against the nominated water reticulation and treatment infrastructure. Using our defined methodology for assessing Critical Infrastructure, we identified technical vulnerabilities within the SCADA environment and completed a penetration test from there, back into the Corporate network. Potential risks were confirmed and documented, showing sample attack and exploitation steps, along with a prioritised list of recommendations for risk mitigation.

The phishing campaign identified and confirmed the current awareness levels for phishing type attacks against Council staff and provided training material should a user be phished, in order to increase staff awareness around these attack methods.

Furthermore, a Orro Principal Consultant provided advisory services directly to the CIO post the engagement to assist with delivering key information to internal stakeholders and communicate with the Council’s service providers and partners.

Outcome

The vulnerability assessment and penetration testing identified a number of security risks which did not previously have the appropriate controls in place, and provided the Council with recommended steps to mitigate risks to the business. This information also assisted with identifying any effective security controls currently deployed to protect the SCADA infrastructure.

The phishing campaign helped Council staff to recognise potential phishing email attacks and in turn provide the knowledge necessary to protect Council infrastructure from well-orchestrated phishing campaigns.

Overall, it provided the Council with a level of comfort as to what steps needed to take place to increase the level of security maturity within their OT and IT environments to support future Digitisation projects.

Customer name has been withheld due to confidentiality. More information can be provided by contacting Orro directly.

Related Insights

16 September 2024

Consolidating Cyber Security Vendors: Simplify, Secure, and Strengthen Your Operations

By consolidating security services with a Managed Security Service Provider (MSSP), organisations can streamline operations, reduce costs, and enhance their overall cyber defence posture.
23 November 2023

Why Zero Trust Networking Is the Future of Cyber Security

As the threat of a cyber attack continues to grow, it has become clear that traditional perimeter-based defences are no longer sufficient. Data breaches and cyber attacks continue to make headlines, and the risk to business operations, customer data and reputation means a robust security approach is now critical.
7 April 2024

Securely Connected Everything S1-7: Securing Tomorrow: Cisco’s Cyber Vision

Join Michael van Rooyen (MVR) as he delves into the realm of cybersecurity with Corien Vermaak, the Director of Cybersecurity for Australia and New Zealand at Cisco.

Explore our Resources​

Critical Infrastructure
post
Beyond Detection: Why OT Recovery Readiness Determines Real Resilience
Cyber
post
Orro Awarded 2026 APJ Partner of the Year by Rapid7
Network
post
Managed Network Service
Cyber
post
Threat Hunt: Validating EDR Effectiveness Against Low Noise Remote Access Threats
Cyber
post
Vulnerability Backlogs: Why Exposure, Not Volume, Should Drive Security Priorities
Cyber
post
AI-Assisted SOC Operations: Why Automation Without Governance Increases Risk