Back to Resources
Field Note February 2026 9 min read

Using MITRE ATT&CK for ICS to Structure Your OT Threat Model

The ICS matrix gives plant teams a common vocabulary for attacker behavior. We walk through how to map it to real facilities without turning it into a paperwork exercise.

C

Cascadia OT Security

Founder · Managing Principal · CISSP · GICSP

T+0Initial AccessT+12hDiscoveryT+3dLateral MoveT+14dOT PivotT+84dDetonationDWELL TIME · 84 DAYSATTACK TIMELINET+84d DETONATE

MITRE ATT&CK for ICS is one of the best free resources in OT security. It's also one of the most underused, because too many facilities treat it as a checklist rather than a threat modeling tool.

Used well, the ICS matrix is a shared vocabulary — a way for plant engineers, security teams, and executives to talk about attacker behavior without a translation layer. Used poorly, it becomes a spreadsheet that nobody reads.

What the ICS matrix is

ATT&CK for ICS is a knowledge base of attacker tactics and techniques specifically observed in industrial environments. It complements the main ATT&CK matrix (which is IT-focused) with OT-specific tactics like Impair Process Control, Inhibit Response Function, and Impact.

Each technique is documented with observed adversary groups, example procedures, and mitigations. For OT, this is the closest thing we have to a living, public threat library.

How to use it without turning it into a checklist

Step 1: Identify the techniques that matter for your environment

You will not defend against every technique equally. For a hydropower operator, the techniques around firmware manipulation of specific turbine controllers matter more than they do for a cold storage logistics facility. For a data center, techniques involving engineering workstation compromise and historian manipulation are particularly relevant.

Start by identifying your 20–30 most-relevant techniques. Not 150. Twenty to thirty.

Step 2: Map your existing defenses

For each relevant technique, ask three questions:

Write the answers. "Nothing" is a valid answer and often the most important one.

Step 3: Prioritize the gaps

Rank unaddressed techniques by a combination of likelihood (in your environment, against your adversaries) and impact (to production, safety, or data integrity). Address the top 5 first. The bottom 15 can wait or accept residual risk.

Step 4: Run detection engineering against the prioritized list

Once prevention is in place, build detection. For each prioritized technique, what log, packet, or sensor would show you the technique was in progress? This is where OT detection differs from IT detection — you are often looking at protocol anomalies in Modbus or DNP3 traffic, not at endpoint logs.

Step 5: Exercise

Tabletop or live-drill against specific techniques. "An attacker has used T0849 (Masquerading) to replace our HMI executable. Walk me through how you would notice." Concrete scenarios produce better defenses than abstract ones.

Common mistakes

Where to start, this week

If you have never used the ICS matrix, do this:

That 90-minute exercise produces more usable threat-modeling output than most expensive consulting engagements — and it's something plant security teams can do themselves.

If you would like facilitation or a structured workshop around ATT&CK for ICS at your facility, we run them.

About the author

This article was written by the Cascadia OT Security practice, which advises Pacific Northwest data centers and manufacturers on industrial cybersecurity. For engagement inquiries, reach our practice team.

Working on something similar?

We'd rather have a direct conversation than send you a sales pitch.

Book a 30-minute call