SCADA Vulnerability Assessment & Penetration Testing

Learn how Orro helped a local council identify several security risks via vulnerability assessment and penetration testing services to increase the organisation’s security maturity.

SCADA Cyber Security Assessment

Challenge

A QLD Regional Council had upgraded their telecommunications and corporate IT environment and was embarking on a number of Digitisation strategies under their Smart City agenda. It was realised that this would also impact their SCADA infrastructure, specifically water reticulation and treatment.

What was unknown within this environment was any Cyber security vulnerabilities and the risks posed by such security weaknesses if successfully exploited by persons with malicious intent.

Additionally, the Council was interested in carrying out a phishing campaign to identify user awareness and then trend increased awareness over a 12 month period.

Solution

Orro was engaged to perform a vulnerability assessment and penetration test against the nominated water reticulation and treatment infrastructure. Using our defined methodology for assessing Critical Infrastructure, we identified technical vulnerabilities within the SCADA environment and completed a penetration test from there, back into the Corporate network. Potential risks were confirmed and documented, showing sample attack and exploitation steps, along with a prioritised list of recommendations for risk mitigation.

The phishing campaign identified and confirmed the current awareness levels for phishing type attacks against Council staff and provided training material should a user be phished, in order to increase staff awareness around these attack methods.

Furthermore, a Orro Principal Consultant provided advisory services directly to the CIO post the engagement to assist with delivering key information to internal stakeholders and communicate with the Council’s service providers and partners.

Outcome

The vulnerability assessment and penetration testing identified a number of security risks which did not previously have the appropriate controls in place, and provided the Council with recommended steps to mitigate risks to the business. This information also assisted with identifying any effective security controls currently deployed to protect the SCADA infrastructure.

The phishing campaign helped Council staff to recognise potential phishing email attacks and in turn provide the knowledge necessary to protect Council infrastructure from well-orchestrated phishing campaigns.

Overall, it provided the Council with a level of comfort as to what steps needed to take place to increase the level of security maturity within their OT and IT environments to support future Digitisation projects.

Customer name has been withheld due to confidentiality. More information can be provided by contacting Orro directly.

Related Insights

15 August 2023

How to Conduct a Cyber Risk Assessment

The increasing reliance on digital infrastructure in our deeply interconnected world has rendered organisations susceptible to cyber threats. Data breaches, ransomware attacks, and other cyber incidents continue to occur, causing severe financial losses, reputational damage and legal consequences for the organisations impacted.
15 October 2024

Orro Launches Critical Infrastructure Services, OT Solutions

Investment in critical infrastructure expands customer offering into the OT space.
13 February 2026

Beyond Detection: Why OT Recovery Readiness Determines Real Resilience

Explore our Resources​

Cyber
Australian Governance and Privacy Risk
post
The 2026 Australian Governance & Privacy Risk Checklist
Critical Infrastructure
OT governance in 2026
post
Air-Gapping Is Dead — What Pragmatic OT Governance Looks Like in 2026
Cyber
post-quantum cryptography planning Australia
post
Store Now, Decrypt Later — Why 2026 Is the Year to Start Your Post-Quantum Plan
Cyber
cyber governance continuous monitoring Australia
post
The Board Wants Proof, Not a Policy - How Continuous Exposure Management Closes the Governance Gap
Cyber
agentic AI governance gap
post
When AI Can Act, Not Just Answer — Closing the Agentic Governance Gap
Cyber
Australian Privacy Act compliance
post
Your Privacy Policy Isn't Enough Anymore — Now You Have to Prove It