Scenario B – external threat hunt
CSI has the approval to connect directly to the IT network with their devices. As previously discussed, this will include utilizing technologies such as VPN, SSH, or HTTPS to connect to endpoints. The hunt team will further protect the network by utilizing a dedicated firewall appliance between the analyst network and the client network.
The client asked if CSI would be able to not just clear the IT network, which includes the OT control network, but the OT network itself. CSI threat hunters have no experience in OT and made it clear they would be just as big a threat on that network as a malicious actor. The team did provide alternate teams that are experienced in hunting on OT networks, which the stakeholders could engage in the future.
Because the teams are connecting directly, there's less bandwidth available for network data to flow continuously to the hunt team. This was discovered in planning and will require the hunt team...