This work was funded by the Office of the Under Secretary of War for Acquisition & Sustainment OUSW (A&S)

Background

D3FEND was designed to model computers, devices, computer networks, and their associated information flows. After our initial release, we received frequent requests for the ability to apply the ontology to specific domains, including cyber-physical systems. These systems are programmed to sense and effect physical changes in their environments through sensors and actuators respectively. Systems whose control processes sense and produce physical effects are known as Operational Technology (OT) and have their own distinct cybersecurity properties; thus: we introduce D3FEND for OT. We take a broad view of OT and intend to extend this work to additional domains—for example, space.

Purpose and Scope

Our primary goal in D3FEND for OT is to enable application of the D3FEND Ontology to OT environments. Because information technology (IT) and OT share a common foundation, D3FEND’s unified technology ontology accommodates additions for OT-specific concepts; these additions extend the core ontology rather than forming a separate body of work.

D3FEND for OT enables OT engineers, security engineers, and cyber threat intelligence analysts to model their security scenarios using the D3FEND ontology. New OT specific artifacts such as controllers, sensors, actuators, OT events, countermeasures, and OT network components are mapped to linked to other OT resources where possible.

What it is:
  • An extension of the D3FEND ontology tailored to operational technology domains, adding OT-specific artifacts, events, and countermeasures.
  • A high-fidelity modeling framework for OT engineers, defenders, and cyber threat intelligence analysts to represent systems, threats, and detections in CAD or SysML (please contact us to use D3FEND in SysML).
  • A bridge to existing OT resources, including mappings to ATT&CK for ICS and relationships among artifacts and techniques.
What it is not:
  • A separate or standalone ontology or framework that replaces core D3FEND—it builds on and extends the core.
  • A comprehensive or complete model of the OT domain.
  • A compliance checklist, product catalog, or prescriptive configuration guide.
  • A replacement for existing OT cybersecurity standards or guidance.

Quick Start

Applying D3FEND for OT to your scenario requires foundational knowledge that is outside the scope of this page, which focuses on the added OT content. Please see our quick start blog post, "Getting Started with D3FEND for OT", which walks through the basics.

Intended Audience & Use Cases

D3FEND for OT was developed for the following roles and use cases.

RoleUse Case
OT Defensive Cyber Engineer
  • Modeling artifacts of a system to understand weaknesses, vulnerabilities, and attack paths for better defenses.
  • Mapping logs and events produced by sensors and systems to understand system attack detection.
OT Cyber Threat Intel Analyst
  • Modeling observed threats and incidents at a technical level to convey high- and low-level technical understandings of past or possible attacks.
OT Systems Architect
  • Modeling systems to understand weaknesses and vulnerabilities to design more secure systems.
OT Systems Acquisition Specialist
  • Comparing cybersecurity aspects of different products at a fine-grained level.

Example OT-focused D3FEND Graphs

Ontology Additions

ATT&CK ® for ICS

MITRE ATT&CK for ICS has also been added to the D3FEND Ontology for use in CAD as a part of D3FEND for OT.

OT Countermeasures

The following are the new defensive techniques added to the D3FEND ontology. Not included below are the additional new relationships between existing countermeasures to the new OT Artifacts which have also been added.

NameDefensive PropertyRangeDescription
Change Default Passwordstrengthens, hardensPassword, User Account,OT ControllerChanging the default password means replacing the factory-set credentials with a strong, unique password before the device is deployed, preventing unauthorized access.
Domain Logic ValidationvalidatesSubroutineValidation of variable state in the context of the domain application.
Operational Logic ValidationvalidatesOT Control FunctionValidation of variable state in the context of the control logic of the operational application.
Remote Firmware Update Monitoringmonitors, detectsOT Network Traffic, OT Device Firmware CommandMonitoring of remote firmware update commands to identify unauthorized software installations.
Platform Uptime MonitoringmonitorsPlatform UptimeMonitor the amount of time since the last power cycle or restart.
Operational Process MonitoringusesOT Process Data HistorianMonitoring physical parameters and operator actions related to an operational environment.
Operating Mode MonitoringmonitorsOperating ModeDetects operating modes such as Program, Run, Remote, or Stop.
Operating Mode RestrictionrestrictsOperating ModeRestricting unauthorized changes to the operating mode prevents devices from switching into inappropriate or vulnerable states during normal use.
Physical Access MediationisolatesPhysical ArtifactPhysical access mediation is the process of granting or denying specific requests to enter specific physical facilities (e.g., Federal buildings, military establishments, border crossing entrances.)
Physical Lockingmediates-access-toComputer EnclosureEmploy a mechanical locking device for securing moveable portions of physical barriers (e.g., doors, gates, drawers) in a secured position.
OT Variable Access Restrictionlimits, restrictsOT Logic Variable, OT Write CommandAssign read/write access controls on designated registers or data tags to prevent unauthorized writes.
User Group PermissionsrestrictsUser GroupAccess control where access is determined based on attributes associated with users and the objects being accessed.
Directional Network LinkrestrictsPhysical LinkEnforce one-way network communication by preventing two-way communication.
Hardware-based Write ProtectionhardensStoragePhysical methods of preventing data from being written to computer storage.
Physical Enclosure HardeninghardensComputer EnclosurePhysical changes to a computer enclosure which reduce the ability for agents or the environment to affect the contained computer system.
Application Performance MonitoringmonitorsLog, System Application Cycle Count, Application Failure Count Variable, Application Scan TimeMonitoring the count and duration of the application or program cycle.
Application Exception MonitoringmonitorsLog, Application Failure Count VariableMonitoring the failures of system counters and timers.

Key Digital Artifacts and Events

The following are the artifacts and events added to the D3FEND ontology as a part of the D3FEND for OT effort.

NameDescription
Computer CabinetA computer cabinet houses one or more computers and can range in size and material.
Computer CaseA computer case is a computer enclosure which encloses a single primary computer.
Computer EnclosureA part providing protection of computer equipment against certain external influences and protects against direct contact.
Data Acquisition AgentA software component which connects to data sources to gather raw, time-stamped data. It often connects to databases or historian gateways for storage and analysis.
Data Acquisition UnitThe hardware component which connects to data sources to gather raw, time-stamped data. It often connects to databases or historian gateways for storage and analysis.
Digital Access BadgeA credential used to gain entry to an area having automated access control entry points. Example media being magnetic stripe, proximity, barcode, or smart cards are examples.
Digital CameraAn optical instrument that can capture an image. A digital camera that captures photographs in digital memory.
Electronic Combination LockA system comprised of an automatic door closer on the door, an input device, a controlling device, and a lock, usually mechanical, which is released or activated when the correct combination is entered or correct token is presented.
HMI ApplicationApplication software which runs the main program in an HMI.
HMI Application ProcessThe instructions within an HMI defined by user programming to interpret visual (and potentially audio) inputs and define visual (and potentially) audio outputs.
Motion DetectorAn electrical device that utilizes a sensor to detect nearby motion.
Operating ModeThe Operating Mode designates the specific, selectable state of an OT controller that delineates its operational behavior and governs access to engineering functions, commonly including Program, Run, Remote, Test, or Stop.
OT ActuatorAn OT actuator is an industrial-grade actuator optimized for operational technology (OT) environments, such as SCADA or process-control systems. It tolerates harsher conditions, meets stricter safety and reliability standards, and integrates seamlessly with ICS protocols to enable real-time mechanical motion or adjustments in production lines and critical infrastructure.
OT ControllerAn OT Controller is an industrial control device that automatically regulates one or more controlled variables in response to command inputs and real-time feedback signals.
OT Control Logic ProcessThe instructions and algorithms within an OT Controller defined by user programming to interpret inputs, process information, and determine outputs.
OT Control ProgramThe file stored in controller memory that is used to operate the controller.
OT Embedded ComputerA ruggedized computational device, embedded in industrial control systems, designed to handle real-time tasks and environmental stressors common in OT.
OT Engineering SoftwareSoftware used in an industrial process to help engineers design, test, and maintain OT. This software enables the programming of OT controllers.
OT Engineering WorkstationAn Engineering Workstation (EWS) is used to perform various maintenance, configuration, or diagnostics functions for a control system. The EWS will likely require dedicated application software to interface with various devices (e.g., RTUs, PLCs), and may be used to transfer data or files between the control system devices and other networks.
OT Event (45 subclasses)A discrete occurrence within an operational technology environment that denotes a significant change in state, execution of a command, or transmission of information.
OT Human Machine InterfaceHuman-Machine Interfaces (HMIs) are systems used by an operator to monitor the real-time status of an operational process and to perform necessary control functions, including the adjustment of device parameters.
OT I/O ModuleAn I/O Module is a hardware device that translates signals between external sensors or actuators and control systems. It typically handles analog-to-digital (and vice versa) conversion, serving as the data interface that allows physical processes to be monitored and controlled by digital controllers.
OT Mode SwitchAn OT Mode Switch is a dedicated mechanism, implemented as either a physical keyswitch or a software control, that permits authorized users to transition an OT controller between its operating modes.
OT NetworkA computer network which connects OT devices.
OT Network TrafficNetwork traffic generated by operational technology devices, e.g. programmable logic controllers
OT Power SupplyAn OT power supply is a power supply whose control amplifier is optimized for signal-processing tasks rather than supplying mere steady-state power to a load. It is a self-contained combination of operational amplifiers, power amplifiers, and integral power circuits designed for higher-level operations in industrial or OT contexts.
OT Process Data HistorianA system used to collect and store data, including telemetry, events, alerts, and alarms about the operational process and supporting devices.
OT Protocol Message (45 subclasses)Packets generated by an operational technology protocol contain an OT protocol message.
OT SensorAn OT Sensor is an industrial-grade sensing device engineered for operational technology (OT) environments (e.g. SCADA, ICS). It measures physical variables—such as pressure, temperature, or flow—under demanding conditions, converting them into reliable signals for real-time monitoring and process control loops.
Physical Access Alarm Event (3 subclasses)An event occurring when combination lock's bolt changes position.
Physical Data DiodeA device that physically enforces one-way (unidirectional) network communication.
Physical KeyA physical key is used to operate a lock, typically metal, designed with specific markers that match the internal mechanism of a lock, allowing it to rotate the lock when inserted.
Physical Key LockA mechanical locking device for securing moveable portions of physical barriers (e.g., doors, gates, drawers) in a secured position.
Proximity SensorA sensor able to detect the presence of nearby objects without any physical contact.
Runtime Variable (11 subclasses)A runtime variable is an abstract storage location paired with an associated symbolic name, which contains some known or unknown quantity of data or object referred to as a value, which can change during the execution of a computer program.
Time Series DatabaseA specialized database optimized for storing and retrieving time-stamped data.
Write Protect SwitchA physical device used to restrict configuration of a device.

OT Weaknesses and Vulnerabilities - CWE & CVE

Based on public reporting, we have identified CVEs and CWEs relevant to OT device manufacturers. We have modeled them against the new D3FEND for OT ontology additions in order to illustrate which parts of the devices were affected, and how they related to the D3FEND Ontology.

Open in D3FEND CAD