Back to Resources
Field Note April 2026 7 min read

The First 90 Minutes: OT Incident Response

Critical decisions in the first hours of an OT incident determine business continuity. Learn our triage framework for industrial environments.

C

Cascadia OT Security

OT & ICS Security

T+0Initial AccessT+12hDiscoveryT+3dLateral MoveT+14dOT PivotT+84dDetonationDWELL TIME · 84 DAYSATTACK TIMELINET+84d DETONATE

The first 90 minutes of an operational technology incident are not like IT security incidents. Your response during this window determines whether you're managing a contained problem or fighting a facility-wide shutdown. At Cascadia OT Security, we've worked through dozens of breaches and unplanned events—and timing is everything.

Most industrial organizations have no formal incident response plan specific to OT assets. They treat an industrial control system breach like a ransomware incident on their corporate network, which is a critical mistake. OT systems operate on different timescales, have different constraints, and require different containment strategies. The stakes—human safety, environmental impact, production loss—are higher and more immediate.

The First Call: What Needs to Happen

When your SOAR platform or analyst detects unusual activity on your PLC network or SCADA historian, the first action is not damage assessment—it's isolation verification. Your goal is confirmation: Is this real, or is it a false positive? Simultaneously, you need to notify your on-site OT leadership and, if critical infrastructure regulations apply, your compliance officer. In the first 15 minutes, you should have a dedicated incident commander, a documented timeline, and a go/no-go decision on whether to initiate a full playbook.

Do not assume you can "observe and contain" an OT breach like you would in IT. Many critical systems don't pause gracefully. If your incident response plan hasn't accounted for how to safely isolate a Purdue Level 1 or 2 control system without triggering a cascade failure, you will make the situation worse by moving too fast.

Core Actions in Minutes 1–30

Minutes 30–90: Stabilization

By minute 30, you should know whether you're in a containment scenario or a recovery scenario. If the threat is contained to a single VLAN or device, you can begin surgical isolation. If the threat has spread to process networks, you may need to execute a controlled shutdown or transition to manual operations. Your runbook must have pre-authorized decision points and clear escalation to plant management and executive leadership.

In this window, forensics takes a back seat to stabilization. You can collect artifacts later. Right now, your job is to prevent further damage and maintain safe state. Communication is critical—every 15 minutes, your incident commander should issue a status update to stakeholders: what we know, what we're doing, and what we expect in the next hour.

The teams that handle industrial incidents well don't improvise. They've run tabletop exercises, they've practiced isolation procedures on test networks, and they have a documented chain of command. If you're starting from zero, now is the time to reach out to our team. We help utilities, water systems, and manufacturers build playbooks that work in the chaos of a real incident. Contact us to schedule a response readiness assessment.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call