The Client
Our client is one of the leading cold storage warehouse providers in the north of Spain, having the biggest capacity in all of its region. With a commitment to maintaining the highest standards, they play a crucial role in the supply chain for various industries.
The client's infrastructure comprised a centralized IT based work center, featuring multiple servers, virtual machines, VoIP telephones and corporate WiFi access, alongside the OT infrastructure, providing connectivity to the different technology used by warehouse operators and automated tasks and robots. Additionally, several locations were interconnected, creating a complex network environment.
Additionally, several locations were interconnected, creating a complex network environment.
Managing such a large-scale infrastructure that integrates both IT and OT posed significant challenges. In OT scenarios, the use of out-of-the-box tools is often discouraged, as legacy machines are sensitive to reconnaissance activities.
The critical nature of this infrastructure needed a methodical and deliberate approach to security, requiring slow-paced analysis and a step-by-step process that ensured a comprehensive understanding of potential vulnerabilities.
Ethon Shield leveraged its extensive experience in securing complex IT and OT infrastructures to provide an extensive and in-depth security assessment. Key services included:
Comprehensive Security Assessment: Conducted a thorough security analysis that encompassed both IT and OT environments, identifying vulnerabilities and potential risks.
Segmentation and Zoning: Evaluated the segmentation strategy employed to separate IT and OT networks, and different locations, ensuring the isolation of critical systems.
WiFi and Workstation Vulnerability Assessment: Conducted a detailed assessment of the corporate WiFi network and workstations to identify vulnerabilities. This included evaluating access controls, and potential entry points for unauthorized access, ensuring that all endpoints were secure and compliant with best practices.
VoIP services: Assessed the VoIP infrastructure for confidentiality vulnerabilities that could expose critical company information, potentially leading to business disruptions.