Splunk for OT Security V2: SOAR and More

In the last 90 days, the news of cyberattacks on critical infrastructure has been stunning. From the unprecedented breach represented by Sunburst to the more recent bone-chilling attack at the Oldsmar water facility, the urgency to secure critical infrastructure in transportation, utilities, energy, water, critical manufacturing, telecommunications, healthcare, government facilities and the defense sector has never been higher.

Over the last 12 months, the Splunk IoT, Manufacturing and Energy team has worked with hundreds of customers exploring how best to secure their OT environments. From these many interactions, we have observed three common patterns:

  1. Just getting started: A high percentage of teams responsible for securing OT environments are just getting started in their journey. Some may have taken initial steps beyond firewall configurations, network segmentation and personnel training. The most common next step is to procure and deploy an OT-specific network intrusion detection and inventory discovery tool. Few have invested in the application of a considered, framework-driven vulnerability monitoring program such as that outlined by MITRE in the MITRE ATT&CK for ICS.
  2. Under-invested: The teams responsible for protecting OT are notably under-funded; the capacity of staff, budget and tools is low relative to the threats and potential impacts they seek to mitigate. This challenge has been a driving force behind the convergence of IT and OT into a unified SOC.
  3. Can’t keep up: Even the most sophisticated and well-funded organizations we engage with actively seek new ways to accelerate the pace and quality of their detect to response decision cycles; they do not believe they are currently keeping up.

Perhaps unsurprisingly, most of the organizations we interact with are actively seeking to better understand how, where, when and how much they should rely upon Splunk technology to aid them on this journey. The fact that Splunk’s role in OT and the benefits it might deliver were not self-evident was a key motivation for our decision to invest in the Splunk for OT Security solution.

Splunk OT Security Add-On 2.0.1 Updates

In August 2020, we announced the availability of the OT Security Add-on for Splunk for users seeking to monitor OT environments better. Today, we are excited to announce version 2.0.1 of the solution, which includes several significant enhancements:

The impact of applying Splunk for OT Security can be immediate. For example, circling back to threats revealed in the last 90 days, organizations concerned about the Oldsmar attack who are using Splunk for OT Security would benefit in several ways:

The Splunk for OT Security content steers directly into the pain points we hear from organizations looking to do more to increase their OT security posture and visibility. With tight alignment to the MITRE ATT&CK for ICS framework, a bevy of new integrations to first-class OT inventory discovery / anomaly detection platforms and the potential for even under-staffed SOCs to increase the pace and quality of investigations using Phantom, we look forward to working with our customers to advance the security of their OT environments.

To learn more about applying the Splunk Security Operations Suite within OT contexts, watch this overview presentation, review the latest documentation here or download the OT Security Add-on for Splunk. For any questions, comments or ideas, don’t hesitate to reach out to us directly.

----------------------------------------------------
Thanks!
Ed Albanese

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.