Skip to content

Manufacturing

5 automated security scanners


Purpose: The CAD_PLM_Security Scanner is designed to assess the security posture of Computer-Aided Design (CAD) and Product Lifecycle Management (PLM) systems by evaluating company security documentation, public policy pages, trust center information, and compliance certifications. It aims to identify potential vulnerabilities and gaps in security measures through a comprehensive analysis of these elements.

What It Detects:

  • Security Policy Indicators: The scanner identifies the presence of a formal security policy, checks for incident response procedures, verifies data protection policies, and ensures access control mechanisms are documented.
  • Maturity Indicators: It confirms compliance with SOC 2 and ISO 27001 standards, validates penetration testing evidence, detects vulnerability scanning or assessment activities, and assesses the maturity level of security practices within the organization.
  • Public Policy Pages: The scanner scans public policy pages for any security-related content, including mentions of data protection and access control measures, as well as incident response plans on public-facing documents.
  • Trust Center Information: It analyzes trust center information to uncover security disclosures, verify compliance certifications, and review detailed descriptions of security practices and controls.
  • Compliance Certifications: The scanner identifies references to relevant compliance certifications like SOC 2 and ISO 27001, checks for documentation of penetration testing and vulnerability assessments, and ensures that security policies and procedures are publicly accessible and up-to-date.

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com)
  • company_name (string): Company name for statement searching (e.g., “Acme Corporation”)

Business Impact: This scanner is crucial as it helps in identifying and addressing potential security vulnerabilities within CAD and PLM systems, which are critical to the integrity and confidentiality of design data and product information. By ensuring that all aspects of security policy, compliance certifications, and public disclosures are up-to-date and robust, organizations can mitigate risks associated with data breaches and system vulnerabilities.

Risk Levels:

  • Critical: Conditions where there is a direct threat to critical assets or operations without mitigation, requiring immediate attention.
  • High: Conditions posing significant risk but potentially mitigated through available controls, requiring high priority remediation efforts.
  • Medium: Conditions with moderate risk that can be managed over time with planned activities and may not immediately impact core business functions.
  • Low: Conditions with minimal risk that can be addressed during routine updates or maintenance cycles without immediate concern for operational integrity.
  • Info: Informational findings that do not directly affect security posture but provide insights into specific areas of compliance or policy adherence.

If the README doesn’t specify exact risk levels, infer them based on the scanner’s purpose and impact.

Example Findings: The scanner might flag instances where a company claims ISO 27001 certification without providing evidence of recent audits or updates to their security practices, indicating a potential mismatch between stated compliance and actual status. Another example could be the detection of outdated data protection policies that do not align with current legal requirements or industry standards.


Purpose: The Industrial IoT Security Scanner is designed to detect potential security vulnerabilities in industrial IoT (IIoT) devices and sensor networks. It aims to identify weak DNS configurations, inadequate HTTP security headers, outdated TLS/SSL protocols and cipher suites, open ports that may host unauthorized services, and API vulnerabilities through comprehensive analysis of domain names and IP ranges.

What It Detects:

  • Insecure DNS Configurations: The scanner checks for missing or weak TXT, MX, NS, CAA, DMARC records, which are crucial for secure communication and identity verification in the IoT ecosystem.
  • Weak HTTP Security Headers: It identifies the absence of critical security headers such as strict-transport-security, content-security-policy, x-frame-options, and x-content-type-options that protect against common web attacks.
  • Vulnerable TLS/SSL Configurations: The scanner scans for outdated protocols like TLSv1.0, TLSv1.1, and weak cipher suites including RC4, DES, and using MD5 encryption, which are susceptible to various cryptographic attacks.
  • Open Ports and Services: It detects open ports commonly used by IoT devices (e.g., 23 for Telnet, 80 for HTTP, 443 for HTTPS) and performs service fingerprinting to ensure that only authorized services are running on these ports.
  • API Security Vulnerabilities: The scanner analyzes APIs for potential security issues such as lack of authentication mechanisms and weak input validation, which can lead to unauthorized access and data manipulation.

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com). This is the main entry point for DNS, HTTP, TLS/SSL, and API checks.
  • ip_range (string): IP range to scan for open ports and services (e.g., 192.168.1.0/24). This helps in identifying unauthorized devices or misconfigured services within the network.

Business Impact: Ensuring the security of industrial IoT deployments is crucial as compromised devices can lead to significant operational disruptions, data breaches, and physical harm. The scanner’s ability to identify vulnerabilities early on can significantly enhance the overall security posture of IIoT environments, mitigating potential risks associated with insecure configurations.

Risk Levels:

  • Critical: Findings include missing or weak DNS records that could lead to unauthorized access or impersonation.
  • High: Inadequate HTTP security headers that fail to protect against common web attacks.
  • Medium: Outdated TLS/SSL protocols and weak cipher suites, which are vulnerable to cryptographic attacks.
  • Low: Open ports not commonly used by IoT devices but could be misconfigured or host unauthorized services.
  • Info: Informational findings about APIs without authentication mechanisms or improperly configured input validation.

Risk levels are inferred based on the severity of potential impacts identified by the scanner, such as critical DNS configurations affecting identity verification and high HTTP headers issues leading to immediate web vulnerabilities.

Example Findings:

  • A device with a missing DMARC record might be susceptible to email phishing attacks, allowing unauthorized entities to spoof emails.
  • An API without WWW-Authenticate header is highly vulnerable to brute force attacks and unauthenticated access, potentially leading to data leakage or system manipulation.

Purpose: The Factory Floor Security Scanner is designed to identify and report on potential security vulnerabilities and compliance issues within Programmable Logic Controllers (PLCs), Human-Machine Interfaces (HMIs), and Manufacturing Execution Systems (MES) by examining company security documentation, public policy pages, trust center information, and compliance certifications.

What It Detects:

  • Security Policy Indicators: The scanner identifies the presence of comprehensive security policies that outline incident response procedures, data protection measures, and access control mechanisms.
  • Maturity Indicators: It confirms compliance with standards such as SOC 2 and ISO 27001, including verification of penetration testing records and vulnerability scanning activities.
  • PLC Security: The scanner searches for mentions of PLC security measures and checks for the identification of vulnerabilities specific to these systems, along with regular updates in patch management practices.
  • HMI Security: It analyzes HMI security protocols and ensures secure communication channels between HMIs and other connected systems through proper authentication and authorization mechanisms.
  • MES Security: The scanner evaluates data integrity measures within MES systems and checks for compliance with industry standards related to MES security.

Inputs Required:

  • domain (string): Primary domain of the company website to be analyzed, providing a specific web address for scanning purposes.
  • company_name (string): The official name of the company, used for searching and referencing within the scan results.

Business Impact: This scanner is crucial as it helps organizations proactively identify and mitigate security risks associated with their industrial control systems, ensuring compliance with industry standards and enhancing overall cybersecurity posture.

Risk Levels:

  • Critical: Findings that directly impact critical infrastructure or are non-compliant with mandatory regulations.
    • Conditions: Presence of significant vulnerabilities in PLCs or HMIs that could lead to unauthorized access or data breaches.
  • High: Risks that significantly affect the security posture and compliance status but do not meet the criteria for critical severity.
    • Conditions: Inadequate security policies, missing incident response procedures, or unpatched vulnerabilities in systems.
  • Medium: Issues that are moderately severe and require attention to maintain acceptable levels of security and compliance.
    • Conditions: Partial compliance with standards, incomplete authentication mechanisms, or lack of vulnerability scanning reports.
  • Low: Minor issues that may not significantly impact the overall risk profile but should be addressed for continuous improvement.
    • Conditions: Minor deviations from best practices in documentation or minor vulnerabilities identified during assessments.
  • Info: Informational findings that provide insights into current security status without immediate action being required, useful for strategic planning and future improvements.
    • Conditions: Presence of basic security policies and minimal compliance with standard protocols.

Example Findings:

  1. The company lacks a comprehensive security policy document, which could lead to inadequate protection against cyber threats.
  2. HMIs are not configured to enforce two-factor authentication for all users, posing risks associated with unauthorized access.

Purpose: The Supply Chain System Security Scanner is designed to identify vulnerabilities and security gaps within inventory systems and logistics operations by analyzing company security documentation, public policy pages, trust center information, and compliance certifications. This tool aims to help companies identify potential weaknesses that could be exploited in the supply chain, ensuring a robust security posture.

What It Detects:

  • Security Policy Indicators: The scanner identifies the presence of formal security policies, checks for incident response procedures, verifies data protection measures, and ensures access control mechanisms are documented.
  • Maturity Indicators: This includes confirming SOC 2 compliance certification, validating ISO 27001 standards adherence, looking for penetration testing records, and detecting vulnerability scanning and assessment activities.
  • Public Policy Pages: The scanner scans for publicly available security policies, identifies incident response plans on policy pages, verifies data protection measures outlined in public documents, and checks for access control guidelines published externally.
  • Trust Center Information: It examines trust center sections for security disclosures, searches for incident response details within trust centers, validates data protection practices mentioned in trust center content, and ensures access control policies are transparently communicated.
  • Compliance Certifications: This detects SOC 2 compliance certifications, confirms ISO 27001 standards adherence, looks for penetration testing and vulnerability assessment reports, and verifies the presence of security maturity indicators in compliance documents.

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com)
  • company_name (string): Company name for statement searching (e.g., “Acme Corporation”)

Business Impact: This scanner is crucial as it helps in the early detection of potential security weaknesses within supply chain systems, which could lead to significant disruptions and breaches if left unaddressed. It plays a vital role in maintaining the integrity and security of critical infrastructure and sensitive data handling processes.

Risk Levels:

  • Critical: The scanner identifies severe vulnerabilities that directly impact core functionalities or expose highly confidential information.
  • High: The scanner detects significant risks that could lead to substantial disruptions or breaches, affecting important business operations.
  • Medium: The scanner flags potential issues that might require attention but do not pose an immediate threat to critical systems.
  • Low: The scanner identifies minor vulnerabilities or non-critical findings that are less likely to cause harm but still need monitoring and improvement.
  • Info: The scanner provides informational findings that provide insights into the security posture without posing a direct risk.

If specific conditions for these risks are not detailed in the README, they should be inferred based on the purpose of the scanner and its potential impact.

Example Findings: The scanner might flag missing or outdated security policies that do not comply with industry standards or poorly documented access control mechanisms that could lead to unauthorized data access.


Purpose: The Digital Twin Security Scanner is designed to identify integrity issues and simulation attacks in digital twins by analyzing company security documentation, public policy pages, trust center information, and compliance certifications. It ensures that the digital twin implementations are secure and resilient against potential threats.

What It Detects:

  • Identifies the presence of a formal security policy.
  • Checks for incident response procedures.
  • Verifies data protection measures.
  • Evaluates access control mechanisms.
  • Confirms SOC 2 compliance certification.
  • Validates ISO 27001 adherence.
  • Assesses penetration testing activities.
  • Reviews vulnerability scanning and assessment practices.
  • Analyzes trust center pages for transparency in security measures.
  • Identifies any reported breaches or incidents.
  • Evaluates the presence of security certifications and standards.
  • Scraps public policy pages for security-related content.
  • Checks for detailed incident response plans.
  • Verifies data protection policies and compliance with regulations.
  • Identifies mentioned compliance certifications in various documents.
  • Validates the presence of SOC 2, ISO 27001, and other relevant standards.
  • Ensures that penetration testing and vulnerability assessments are regularly conducted.

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com)
  • company_name (string): Company name for statement searching (e.g., “Acme Corporation”)

Business Impact: This scanner is crucial as it ensures the security and integrity of digital twins, which are increasingly used in critical infrastructure and decision-making processes. A breach or vulnerability could lead to significant financial losses, operational disruptions, and damage to reputation.

Risk Levels:

  • Critical: Conditions that directly impact the core functionality or security architecture of the digital twin, such as a lack of formal security policy or absence of critical compliance certifications.
  • High: Conditions that significantly increase the risk of breach or vulnerability, such as unverified data protection measures or incomplete incident response procedures.
  • Medium: Conditions that may lead to moderate risks if not addressed promptly, such as partial adherence to standards like ISO 27001.
  • Low: Informative findings that do not directly impact security but can be useful for continuous improvement and transparency, such as minor discrepancies in trust center information.

Example Findings:

  • The digital twin’s public policy page does not mention any data protection policies or compliance with regulations.
  • The company has not conducted recent penetration testing or vulnerability assessments despite being certified for ISO 27001.