Manufacturing is a prime target for cyberattacks. Ransomware gangs know that production downtime costs manufacturers hundreds of thousands per day—making them more likely to pay. This checklist covers both IT and OT (Operational Technology) security.
$2.2M
avg. manufacturing
breach cost
21 days
avg. production
downtime
#1
most targeted
industry 2025
IT/OT Network Segmentation
Network Architecture
- IT and OT networks physically or logically separated
- Demilitarized zone (DMZ) between IT and OT
- PLCs and SCADA systems on isolated network
- Guest WiFi completely separate from production
- No direct internet access from OT network
- VLANs properly configured and documented
Critical: A single compromised IT workstation should NEVER be able to reach production control systems. If ransomware can spread from the front office to the shop floor, your segmentation has failed.
Production System Protection
OT/ICS Security
- Asset inventory of all OT devices maintained
- Default credentials changed on all PLCs/HMIs
- PLC programming ports disabled when not in use
- Firmware updates applied during maintenance windows
- USB ports disabled on production systems
- OT-specific endpoint protection deployed (where possible)
- Industrial firewall protecting critical systems
ERP/MES Integration Security
- ERP system on separate network segment
- Database connections encrypted
- API access controlled and logged
- Integration points documented and secured
- Vendor remote access controlled (not 24/7)
Standard IT Security
Access Control & Identity
- Multi-factor authentication on all accounts
- Separate admin accounts for IT staff
- Role-based access to ERP/production systems
- Terminated employee access disabled immediately
- Contractor access time-limited and logged
Backup & Disaster Recovery
- Production system backups (PLC programs, configs)
- ERP database backed up with tested restores
- CAD/CAM files and engineering data protected
- Backup systems isolated (immutable copies)
- Recovery procedures documented and tested
- Manual production procedures documented for IT outage
Supply Chain Security
- Vendor security assessments performed
- Third-party access policies documented
- EDI/supply chain integrations secured
- Vendor remote access controlled and monitored
- Software supply chain risks assessed
Note: If you're a DoD contractor, additional CMMC 2.0 requirements apply. Contact us for a CMMC readiness assessment.
Incident Response for Manufacturing
- Production continuity plan (manual operations)
- Communication plan for supply chain partners
- OT-aware incident response procedures
- Safety systems isolated from attack surface
- Insurance covers OT/production downtime
Save this checklist: Press Ctrl+P (Cmd+P on Mac) to save as PDF