Architecture, protocols, platforms, and methodology behind CyberFabric's OT Security Operations Center. This page is for security architects, OT engineers, and technical evaluators.
CyberFabric operates a three-tier SOC model purpose-built for OT/ICS environments:
| Tier | Function | SLA | Staffing |
|---|---|---|---|
| Tier 1 | AI-driven automated triage and containment. Multi-source correlation (SIEM, NDR, UEBA, TIP). False positive elimination. | <200ms | Automated + ML |
| Tier 2 | Human investigation of escalated incidents. OT-context analysis. Playbook execution. | 5 min | OT analysts (ex-plant engineers) |
| Tier 3 | Critical incident command. Cross-functional coordination. Forensic investigation. | 15 min | Senior incident commanders |
Proactive operations include weekly threat hunting (behavioral analytics, ICS YARA rules, APT TTPs), monthly deep sweeps, and continuous threat intel correlation against customer-specific asset inventories.
CyberFabric's default SecOps engine when customers don't have an existing stack:
Modbus TCP/RTU DNP3 OPC-UA OPC-DA BACnet PROFINET EtherNet/IP S7comm IEC 60870-5-104 IEC 61850 HART-IP CIP GOOSE MMS GE-SRTP Emerson ROC
| Metric | Value | Methodology |
|---|---|---|
| Mean Time to Detect (MTTD) | 8× faster than manual SOC | Automated correlation + ML triage |
| False Positive Reduction | 90%+ | Multi-Layer AI with OT context |
| Analyst Productivity | 80%+ improvement | Automated triage, enrichment, and case management |
| Auto-Containment | <200ms | SOAR-driven with OT-safe guardrails |
CyberFabric's infrastructure layer for data transport, device identity, and audit integrity:
Cloud-based OT security creates three risks that decentralized architecture eliminates:
Open-source and auditable: github.com/ixian-platform
The FDE model is CyberFabric's primary deployment and customer success methodology. Each FDE is a senior OT security specialist with direct ICS/SCADA experience.
| Phase | Duration | Activities |
|---|---|---|
| Immersion | Week 1–2 | On-site environment mapping, asset inventory, protocol identification, safety system assessment, existing tool evaluation, stakeholder interviews |
| Deployment | Week 3–6 | Sensor placement, platform configuration, behavioral baseline collection, custom detection rule development, integration with existing tools |
| SOC Integration | Week 7–12 | Live SOC onboarding, playbook development with operators, threshold tuning, first tabletop exercise, initial threat hunt |
| Optimization | Ongoing | Monthly detection reviews, baseline recalibration, new asset onboarding, staff training, quarterly posture assessments |
CyberFabric integrates with existing customer security and OT tools. The SOC normalizes, correlates, and operates across heterogeneous stacks.
| Category | Platforms |
|---|---|
| SIEM | Splunk, IBM QRadar, Microsoft Sentinel, Elastic SIEM, LogRhythm |
| EDR / XDR | CrowdStrike, SentinelOne, Microsoft Defender, Carbon Black |
| Network Security | Palo Alto Networks, Fortinet, Cisco, Check Point |
| OT Security | Nozomi Networks, Claroty, Dragos, OTORIO, Armis |
| Cloud / Identity | AWS, Azure, GCP, Okta, Active Directory |
| Threat Intel | MITRE ATT&CK for ICS, Mandiant, Recorded Future, ICS-CERT |
SOC operations map directly to regulatory framework controls:
| Framework | Scope | SOC Mapping |
|---|---|---|
| IEC 62443 | Industrial automation security | Zones, conduits, monitoring, incident response |
| NIST SP 800-82 | ICS security guide | Continuous monitoring, access control, audit |
| NIS2 Directive | EU critical infrastructure | Incident reporting, risk management, supply chain |
| NERC CIP | North American bulk electric | Electronic security perimeter, monitoring, IR |
| MITRE ATT&CK ICS | ICS threat framework | Detection coverage mapped to all 12 tactics |
| ISA-95 / Purdue | OT network segmentation | Level-aware detection and response policies |