Validate your network segmentation assumptions with runZero

|
Updated

Most organizations have gone through a network segmentation project. If you polled security architects, the CISO, and network infrastructure people — particularly in OT — the vast majority would tell you that a combination of firewalls and network segmentation protects against the spread of an attack. In my experience, it is usually more assumption than fact that sensitive areas of the network like OT environments have adequate segmentation, and protection.

Threat actors thrive on these assumptions.

But runZero makes zero assumptions. We discover, validate, and map the potential attack paths for you.

With the release of runZero 4.9, two powerhouse capabilities combine to eliminate this critical visibility gap and reveal exactly how attackers will exploit your network, so you can prevent it.

Understand the entire iceberg, not just the tip #

Using safe, protocol-native queries, runZero recursively walks the backplane to identify the many hidden sub-devices sitting behind Modbus and BACnet gateways. Where traditional tools see only a single gateway IP address, runZero unveils the entire field-level topology of vulnerable PLCs and nested devices downstream of the gateway. Not only do we discover these critical, hidden devices, we fingerprint their attributes and any exposures. Like a ship's sonar that shows the entire iceberg lurking under the waterline, runZero dives deep behind the gateway to see the entire attack surface.

runZero shows you the Modbus Gateway (10.66.0.30), and discovers all of the 33 serial-attached devices hidden downstream that traditional scanners miss.

Since OT environments behind the gateway are usually flat, an attack on one of these hidden assets represents a massive lateral movement risk. Compromising a single downstream PLC can grant an adversary control over the physical outputs — the switches that manage everything from safety valves to high-voltage equipment.

So, seeing these devices and reducing their vulnerability is only the first step. The next critical step is validating how accessible (or not) they really are to a threat actor.

See the path of least resistance for attackers #

After deep discovery, runZero leaves assumptions behind by showing you how an attacker could reach those devices, externally or internally. Interactive attack path mapping illuminates avenues of attack that most security professionals may never discover. It models the complex trajectories an adversary would use, exposing the "accidental routes" and multi-homed devices (like jump boxes) that bypass your carefully planned segmentation.

Here we see an engineering laptop (a Dell running Windows 10) on the left connected to a side panel switch port that grants direct access to the 33 devices discovered in the example above. runZero reveals that this isn’t just a risky laptop, it's a bridge to OT assets that were previously hidden. This is a classic “laptop as bridge” segmentation bypass that remains invisible to traditional tools.

Other vulnerability scanners miss these risks since they are focused only on known vulnerabilities. runZero shows you these paths of least resistance, allowing defenders to focus on the critical exposures and assets that pose the most devastating risk.

The Payoff #

Together, these capabilities completely transform your defensive strategy. Without runZero, you have incomplete visibility plus untested assumptions of your network segmentation. But with runZero, you’ve got complete and automatic discovery, plus attack path mapping that trades assumptions for validation. With runZero, you can map the unmappable, secure every path, and safeguard your OT environments.

Start your free 21 day trial and begin your own discovery now.

Written by Adam Foit

Adam Foit is a CISSP who began his career in IT Operations in the 1990s. Since then, he as continued to work in the technology industry with a focus on network detection and response, security operations, and network performance management. Adam lives in Knoxville, Tenn. and enjoys hiking and kayaking around the Smoky Mountains with his wife.

More about Adam Foit
Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.