Skip to content
OT Cybersecurity | | | 9 min read

Asset inventory in ICS environments - the foundation of OT cybersecurity

ICS/OT asset inventory - methods (manual, passive discovery, active scanning), tools, IEC 62443 and NIST requirements. How to build an OT asset register step by step.

Józef Sulwiński Józef Sulwiński
M
Michał Stępień
asset inventoryasset managementICSIEC 62443NIST 800-82Tenable OT
Asset inventory in ICS environments - the foundation of OT cybersecurity
)}

In OT environments, industrial control systems (ICS) have lifecycles measured in decades. Over that time, installations undergo upgrades, component replacements, and integrations with new systems - while documentation fails to keep up. From our experience, current knowledge of OT environment architecture and configuration often exists only in the heads of key personnel.

Asset inventory of hardware and software is the first step in any OT cybersecurity program. Without an up-to-date asset register, you cannot assess whether a published vulnerability affects devices in your installation. You cannot design network segmentation based on actual topology, nor implement remote access policies tailored to your environment. The lack of asset inventory also blocks compliance with IEC 62443 and NIS2 (the EU directive on network and information security, transposed into national law in each member state).

Why OT asset inventory is harder than in IT

In corporate networks, asset inventory is automated - Active Directory, SCCM, endpoint agents. In OT, standard IT tools do not work, and attempting to use them can disrupt the production process. Key challenges:

ChallengeDescriptionConsequence
No agentsPLCs, RTUs, and measurement devices do not support software agentsAsset inventory software cannot be installed on OT devices
Proprietary protocolsMany devices communicate via serial protocols (Modbus RTU, PROFIBUS) invisible on Ethernet networksPassive network traffic monitoring will not detect devices below the Ethernet layer
Sensitivity to scanningActive scanning (e.g., Nmap) can cause older PLCs to crashActive scanning methods require careful planning and a maintenance window
Long lifecycleDevices operate for 15-25 years; documentation from installation time is outdatedFirmware versions, network configuration, and IP addresses may have changed multiple times
Isolated segmentsSome OT subnets have no connectivity to the corporate network (air gap)Automated tools cannot reach all segments

Three methods of asset inventory

The choice of method depends on the inventory goal, the acceptable level of intrusiveness, and available resources. In practice, combining all three methods is the most effective approach.

Manual inventory (physical walkdown)

A physical walkdown is the only method that covers all devices - not just those connected to Ethernet, but also devices on fieldbus networks (Modbus RTU, PROFIBUS, HART), standalone devices, and components without network communication. It requires physical presence on site and familiarity with P&ID (Piping and Instrumentation Diagram) drawings.

TIP

For a physical walkdown, prepare a form with fields: device name, manufacturer, model, serial number, firmware version, network address (IP or fieldbus address), physical location (building/cabinet/slot), function in the process. Tailor the form to your installation. Supplement with photos of nameplates - the firmware version from a nameplate is more reliable than from documentation.

Advantages: completeness, no impact on the process, ability to verify physical condition. Limitations: time-consuming, requires physical access, data becomes outdated quickly.

Automatic passive discovery

Passive discovery aggregates and analyzes network traffic without initiating communication with devices. The monitoring tool connects to a mirror port (SPAN) on the switch and listens to packets. Based on header analysis, metadata, and protocols, it builds a list of devices communicating on the network.

This method can detect: IP and MAC addresses, protocols in use (including industrial ones - Modbus TCP, OPC, S7comm, EtherNet/IP), headers containing manufacturer and model information, and communication patterns between devices.

NOTE

Passive discovery only detects devices that communicated during the analysis period. Dormant devices, those communicating infrequently, or those connected to separate segments will not be detected. The listening period should cover the full operational cycle of the installation (typically 1-4 weeks).

Advantages: non-intrusive, does not require a maintenance window, simultaneously builds a communication baseline (useful for IDS). Limitations: detects only active devices, does not establish firmware versions, requires switch reconfiguration (SPAN port).

Automatic active scanning (selective)

Active scanning sends queries to individual OT devices - using interfaces and protocols intended for parameterization (the same ones used by engineering software). This yields significantly more complete information: model, serial number, firmware version, configured services, diagnostic data, logs.

WARNING

Active scanning is more intrusive than passive discovery. Before running an active scan: obtain operator approval, test on an identical device in a lab environment, schedule a maintenance window, prepare a rollback procedure, and have contact information for the controller vendor’s support team.

Advantages: complete version information (essential for vulnerability management), detects devices that do not generate traffic. Limitations: requires a maintenance window, potential impact on older devices, does not cover serial/fieldbus devices.

Method comparison

CriterionManualPassiveActive
CompletenessFull (including fieldbus)Only active network devicesNetwork devices (including dormant)
Detail levelDepends on the formBasic (IP, MAC, protocols)Full (firmware, config, logs)
IntrusivenessNoneMinimal (SPAN port)Moderate (queries to devices)
AutomationNoneContinuousPeriodic
Requires maintenance windowNoNo (but switch reconfiguration needed)Yes
Use caseBaseline, physical walkdownIDS, continuous monitoring, traffic baselineVulnerability management, audit

Tools for automatic OT asset inventory

The market for OT asset inventory tools has grown significantly since 2020. Below is a comparison of leading solutions - provided as an overview of available options:

ToolMethodsOT protocolsAdditional capabilities
Tenable OT (formerly Indegy)Passive + selective active scanningModbus, S7, OPC, EtherNet/IP, PROFINET, BACnetVulnerability management, IEC 62443 compliance, SBOM
Nozomi Networks GuardianPassive + active (Smart Polling)100+ OT/IoT protocolsAnomaly detection, threat intelligence, OT/IoT asset visibility
Claroty xDomePassive + active (AppDB)Modbus, S7, OPC UA, DNP3, EtherNet/IPRisk scoring, secure remote access, SRA integration
Dragos PlatformPassiveModbus, S7, OPC, DNP3, IEC 104Threat detection, playbooks, ICS threat intelligence
OTORIO RAM2Passive + activeModbus, S7, OPC UA, BACnetRisk assessment, attack graph, mitigation prioritization

TIP

When selecting a tool, the key questions are: does it support the protocols used in your installation (e.g., PROFIBUS, BACnet for building systems), has the active scanning method been tested with devices from specific manufacturers (Siemens, Rockwell, Schneider), and does the tool integrate with your existing SIEM/SOC. Before purchasing, request a proof-of-concept in a test environment or on a small production segment.

Standards and regulatory requirements

IEC 62443

IEC 62443-2-1 requires establishing and maintaining an IACS (Industrial Automation and Control System) asset inventory as part of the cybersecurity management system. The standard requires identification of all hardware and software assets, classification of assets by criticality, and assignment of assets to security zones defined in IEC 62443-3-2.

NIST SP 800-82 Rev. 3 and CISA Asset Inventory Guidance

NIST SP 800-82 Rev. 3 identifies asset inventory as the foundation of an OT security program. In August 2025, CISA published joint guidance “Foundations for OT Cybersecurity: Asset Inventory Guidance” (co-signed by NSA, FBI, EPA, and five international agencies), defining 14 required attributes for each OT asset - including: criticality, communication protocols, firmware versions, physical location, manufacturer/model, and connections to IT networks.

NIS2

The NIS2 Directive (EU 2022/2555) requires essential and important entities to implement risk analysis policies - which is impossible without an up-to-date asset inventory. Without a current asset register, the risk analysis required by NIS2 cannot be performed. An entity that cannot demonstrate the basis for this assessment is exposed to a finding of non-compliance during an audit.

CIS Controls v8

CIS Control 1 (Inventory and Control of Enterprise Assets) is the first and highest priority control. For OT, this means: maintaining a register of all devices connected to the network, identifying unauthorized devices, and being able to block access from unknown devices (NAC).

How to build an OT asset inventory program - step by step

PhaseActionOutcomeTools
1. Physical walkdownOn-site visit, P&ID documentation review, inventory formBaseline - list of all devicesSpreadsheet, photos, forms
2. Passive discoveryConnect sensor to SPAN port, listen for 2-4 weeksNetwork communication map, detected Ethernet devicesNozomi Guardian, Tenable OT, Claroty
3. Active scanningSelective scanning during maintenance windowComplete firmware version, configuration, and vulnerability dataTenable OT, Claroty, Nozomi Smart Polling
4. ConsolidationMerge data from all 3 methods, fill gapsComplete OT asset registerCMDB / dedicated tool
5. ClassificationAssign assets to IEC 62443 zones, determine criticalityAssets classified by riskCriticality matrix
6. MaintenanceContinuous passive monitoring + periodic active scans + change registration procedureUp-to-date asset registerAutomation + MOC process

TIP

The OT asset register should contain at minimum: identifier, physical location, manufacturer/model/serial number, firmware/OS version, network address, IEC 62443 zone, criticality, date of last verification, asset owner. For fieldbus devices, add: bus address, protocol type, master/slave role. Update the register with every change (Management of Change procedure).

NIST SP 800-53 control mapping

ActionNIST SP 800-53 controlDescription
Hardware asset registerCM-8System Component Inventory
Software registerCM-8(3)Automated Unauthorized Component Detection
Unauthorized device detectionCM-8(3), IA-3Device Identification and Authentication
Criticality classificationRA-2Security Categorization
Change managementCM-3Configuration Change Control
Vulnerability managementRA-5, SI-2Vulnerability Monitoring, Flaw Remediation
Network access control (NAC)AC-3, IA-3Access Enforcement, Device I&A

Source: NIST SP 800-53 Rev. 5.

Sources

Omówimy zakres, metodykę i harmonogram.