When it is okay to do a penetration test in OT

We get this request often: 
𝗖𝗮𝗻 𝘆𝗼𝘂 𝗱𝗼 𝗮 𝗽𝗲𝗻 𝘁𝗲𝘀𝘁 𝗼𝗻 𝗼𝘂𝗿 𝗢𝗧 𝗻𝗲𝘁𝘄𝗼𝗿𝗸?” 
Usually from teams who’ve been doing it routinely in IT and assume the same applies to OT. 
Let’s clear the air.

𝗣𝗲𝗻𝗲𝘁𝗿𝗮𝘁𝗶𝗼𝗻 𝘁𝗲𝘀𝘁𝗶𝗻𝗴 𝗶𝘀 𝗻𝗼𝘁 𝗿𝗼𝘂𝘁𝗶𝗻𝗲 𝗶𝗻 𝗜𝗧 𝗽𝗿𝗼𝗱𝘂𝗰𝘁𝗶𝗼𝗻 𝗲𝗶𝘁𝗵𝗲𝗿 — 𝗮𝗻𝗱 𝗶𝘁 𝘀𝗵𝗼𝘂𝗹𝗱𝗻’𝘁 𝗯𝗲.

It’s intrusive by design. It simulates an actual attack. 
In OT, that can mean downtime, safety risks, or even physical damage. 
So why do people still ask for it? 
Because decision-makers often apply the IT security template to OT — without understanding the consequences. 



𝗜𝘀 𝗢𝗧 𝗽𝗲𝗻 𝘁𝗲𝘀𝘁𝗶𝗻𝗴 𝘂𝘀𝗲𝗳𝘂𝗹?

Yes — when done right. 
It gives deeper insights than passive vulnerability assessments. 
But it’s not plug-and-play. It demands timing, context, and maturity. 
Here’s when it’s actually okay to do a penetration test in OT: 

𝗗𝘂𝗿𝗶𝗻𝗴 𝗙𝗔𝗧 𝗼𝗿 𝗦𝗔𝗧 𝗳𝗼𝗿 𝗴𝗿𝗲𝗲𝗻𝗳𝗶𝗲𝗹𝗱 𝗽𝗿𝗼𝗷𝗲𝗰𝘁𝘀

This is the best time to test your defenses. 
You’re not live yet. If something breaks, it’s a lesson — not a crisis. 
Use this window to understand what your environment can tolerate

𝗜𝗻 𝗮 𝘁𝗲𝘀𝘁 𝗲𝗻𝘃𝗶𝗿𝗼𝗻𝗺𝗲𝗻𝘁

If you’ve got a lab setup that mirrors production — same devices, similar architecture — run your pen test there. 
Learn safely. Apply those lessons to your live environment. 

𝗗𝘂𝗿𝗶𝗻𝗴 𝗽𝗹𝗮𝗻𝗻𝗲𝗱 𝗱𝗼𝘄𝗻𝘁𝗶𝗺𝗲

Only if you’ve already done passive VA, implemented compensating controls, and understand your system’s behavior. 
This is high-risk territory. Proceed only if you’re confident in your processes and device responses. 

𝗪𝗵𝗲𝗻 𝘀𝗵𝗼𝘂𝗹𝗱 𝘆𝗼𝘂 𝗮𝘃𝗼𝗶𝗱 𝗶𝘁?

– If you’re unsure how your systems will react. 
– If you don’t have a test environment. 
– If you’re doing it just because “IT does it.” 
Pen testing in OT isn’t forbidden. 
It’s not mandatory either

𝗨𝘀𝗲 𝗶𝘁 𝘄𝗵𝗲𝗻 𝗶𝘁 𝗵𝗲𝗹𝗽𝘀. 𝗔𝘃𝗼𝗶𝗱 𝗶𝘁 𝘄𝗵𝗲𝗻 𝗶𝘁 𝗵𝘂𝗿𝘁𝘀

And always lead with context, not compliance. 
Let’s stop copy-pasting IT practices into OT. 
Start with understanding. 
Test like lives depend on it — because sometimes, they do.