Lives on the Line: Hidden Risks in Critical National Infrastructure

Attack Surface Management, Censys Solutions, Critical Infrastructure, External Attack Surface Management

In the age of escalating cyber threats, Critical National Infrastructure (CNI) operators face a daunting challenge: defending systems not originally designed for the public Internet from attackers who have unprecedented visibility into the external attack surface. Despite layered defenses and well-structured networks, inadvertent exposures—especially of Human Machine Interfaces (HMIs) and misconfigured services—have become one of the most persistent and dangerous threat vectors.

This is where External Attack Surface Management (EASM) plays a critical role.

Understanding EASM in the CNI Context

EASM refers to the continuous discovery, inventory, classification, and monitoring of Internet-facing assets that belong to an organization—whether officially deployed or accidentally exposed. While EASM is vital across industries, its application in CNI is particularly urgent due to the high-value, high-risk nature of the systems involved.

Critical sectors such as energy, water, transportation, and telecommunications are increasingly reliant on complex digital ecosystems. With digital transformation comes exposure. A forgotten dev box, an HMI with a hardcoded password, or a misconfigured VPN portal could become the digital equivalent of a backdoor left ajar.

Accidental Exposures: The Unseen Risks

While most CNI environments are built with security in mind, the reality of decentralized operations, third-party vendors, and shadow IT means that not all assets are properly tracked. Some common accidental exposures include:

  • Staging or test environments spun up for a project and left connected to the Internet.
  • Industrial protocols (e.g., Modbus, DNP3, BACnet) exposed over TCP/IP without encryption or authentication. 
  • Web-based dashboards or HMIs intended for internal-only use but reachable externally due to misconfigured access controls.
  • Asset discovery agents or scanning tools inadvertently left active in production environments.

Even if these assets don’t appear immediately dangerous, they provide critical reconnaissance value to attackers—laying the groundwork for targeted intrusions.

The Purdue Model: Why EASM Still Matters Behind Firewalls

The Purdue Model for ICS Security organizes industrial control systems into hierarchical levels, with Level 0 and Level 1 representing sensors and controllers, Level 2 comprising control systems like HMIs, and Levels 3-5 covering IT and enterprise networks.

Traditionally, operators believed that lower levels (especially Level 1/0) were sufficiently protected by firewalls or air gaps. But modern interconnectivity, cloud integrations, and remote access requirements have blurred these boundaries. For example:

  • An exposed Level 3 jump host could allow lateral movement into industrial DMZs.
  • A remote-access VPN into Level 2 may not restrict user access adequately, granting unnecessary visibility into HMIs.
  • Cloud-connected services at Level 3/4 may inadvertently bridge the Purdue model’s security layers.

This means that even assets “protected” behind firewalls can be indirectly reachable if adjacent systems—discovered and catalogued through EASM—are exploited.

Building a Modern EASM Strategy for CNI

To mitigate these risks, CNI operators need a proactive EASM program that can:

  1. Continuously Discover and Attribute Assets
    Map all known and unknown Internet-facing assets across subsidiaries, acquisitions, contractors, and legacy systems.
  2. Correlate Findings with Network Architecture
    Contextualize exposures in terms of their position in the Purdue model and evaluate the blast radius of compromise.
  3. Monitor for Protocol and Service Exposure
    Detect ICS-specific protocols and monitor for exposed RDP, VNC, or insecure HMIs.
  4. Evaluate Firewall Assumptions
    Conduct attack path analysis to identify how perimeter exposures might reach protected networks—even through complex layered firewalls.
  5. Close the Loop with OT and IT
    Integrate EASM data with SOC workflows, vulnerability management, and ICS risk frameworks for rapid response.

Censys Attack Surface Management (ASM) offers continuous comprehensive monitoring of external attack surfaces so you can discover, prioritize, and eliminate exposures with confidence. Request a demo to see Censys ASM in action.

Final Thoughts

Cyber threats to Critical National Infrastructure are no longer hypothetical. Nation-state groups, ransomware gangs, and hacktivists all have a vested interest in exploring weaknesses in these environments.

EASM shines a light on the unseen: the forgotten assets, accidental exposures, and shadow services that make CNI environments vulnerable. But it doesn’t just expose risk—it gives defenders the visibility they need to take control of their digital footprint before attackers do.

As we continue to bridge the worlds of OT and IT, EASM will be the early warning system at the edge of that convergence—reminding us that what we can’t see can hurt us.

AUTHOR
Nick Palmer

Subscribe to our blog