Walk into any modern manufacturing facility, power plant, or industrial operation, and you’ll find networks running protocols that were never designed with security in mind. EtherNet/IP, CIP (Common Industrial Protocol), and GE SRTP (Service Request Transport Protocol) form the backbone of industrial automation, moving critical control data between PLCs, HMIs, and SCADA systems.

These protocols were created when operational technology networks were truly air-gapped and security meant keeping unauthorized people out of the building. Today, as OT networks become increasingly connected to corporate IT and cloud systems, understanding the security implications of these industrial protocols isn’t just important – it’s critical for protecting both operations and safety.

After working with organizations to secure industrial networks running these protocols, we’ve learned what security professionals need to know about how they work, where they’re vulnerable, and how to protect them without breaking operations.

EtherNet/IP: Ethernet for Industrial Automation

Protocol Architecture

EtherNet/IP (Ethernet Industrial Protocol) isn’t actually Ethernet – it’s an industrial communication protocol that runs over standard Ethernet networks. It’s the most widely deployed industrial Ethernet protocol globally, used by Allen-Bradley, Rockwell Automation, and hundreds of other industrial equipment manufacturers.

EtherNet/IP stack:

  • Physical Layer: Standard Ethernet (IEEE 802.3)
  • Network Layer: Standard TCP/IP
  • Transport Layer: TCP for explicit messaging, UDP for implicit messaging
  • Session Layer: Common Industrial Protocol (CIP)
  • Application Layer: Device profiles and object modeling

Key characteristics:

  • Uses standard TCP ports 44818 (TCP) and 2222 (UDP)
  • Supports both real-time I/O data and configuration messaging
  • Backward compatible with older industrial protocols through encapsulation
  • Can coexist with standard IT network traffic

Security Implications

EtherNet/IP has no built-in security features:

  • No authentication: Any device can participate in communications
  • No encryption: All data transmitted in clear text
  • No integrity checking: No protection against message modification
  • No access control: No mechanism to restrict which devices can communicate

Common attack vectors:

  • Man-in-the-middle attacks: Intercepting and modifying control commands
  • Replay attacks: Capturing and replaying legitimate control messages
  • Denial of service: Flooding networks with malformed or excessive messages
  • Device impersonation: Malicious devices joining networks and issuing commands

Real-world example: An attacker with network access could monitor EtherNet/IP traffic to learn normal operational patterns, then inject commands to modify setpoints, disable safety systems, or cause equipment malfunctions – all without authentication or detection.

CIP: The Common Industrial Protocol

Protocol Foundation

CIP (Common Industrial Protocol) provides the upper-layer communication services for several industrial networks, including EtherNet/IP, DeviceNet, and ControlNet. It’s an object-oriented protocol that standardizes how industrial devices communicate about their capabilities, configuration, and status.

CIP object model:

  • Device objects representing physical or logical entities
  • Class objects defining common attributes and services
  • Instance objects representing specific implementations
  • Assembly objects grouping related data for efficient transfer

CIP services:

  • Explicit messaging for configuration and diagnostics (typically TCP)
  • Implicit messaging for real-time I/O data (typically UDP)
  • Object modeling for device capabilities and configuration
  • Electronic data sheets for device integration and configuration

CIP Security Concerns

CIP inherits and amplifies EtherNet/IP security weaknesses:

  • Object manipulation: Attackers can modify device objects to change behavior
  • Service exploitation: Unprotected services can be called to disrupt operations
  • Configuration tampering: Device configurations can be modified without authentication
  • Information disclosure: Device capabilities and status exposed without access control

Specific CIP vulnerabilities:

  • Assembly object manipulation: Critical I/O data can be intercepted and modified
  • Identity object exploitation: Device information can be gathered for reconnaissance
  • Connection hijacking: Existing communication sessions can be taken over
  • Firmware manipulation: Some CIP implementations allow firmware updates without proper authentication

Attack scenario: An attacker could use CIP services to enumerate all devices on an industrial network, identify their configurations and capabilities, then modify critical assembly objects to alter I/O data flowing between controllers and field devices.

GE SRTP: Service Request Transport Protocol

Protocol Overview

GE SRTP (Service Request Transport Protocol) is General Electric’s proprietary protocol used in their industrial automation systems, including the RX3i, RX7i, and 90-30 series PLCs. While less common than EtherNet/IP, SRTP is widely deployed in GE-based industrial systems.

SRTP characteristics:

  • Proprietary protocol with limited public documentation
  • TCP-based communication typically on port 18245
  • Request-response model for client-server communications
  • Support for multiple data types including discrete, analog, and string data

SRTP functions:

  • Reading and writing PLC memory locations
  • Program upload and download
  • Online monitoring and diagnostics
  • Historical data collection and trending

SRTP Security Challenges

SRTP shares common industrial protocol security weaknesses:

  • No built-in authentication: Any client can connect and issue commands
  • Clear-text communication: All data transmitted without encryption
  • Limited access control: No mechanism to restrict operations based on user or device identity
  • Proprietary format: Security analysis complicated by limited documentation

SRTP-specific concerns:

  • Direct memory access: Protocol allows reading and writing arbitrary PLC memory locations
  • Program manipulation: Unauthorized program changes can be made without authentication
  • Diagnostic exploitation: Diagnostic functions can be used to gather intelligence about operations
  • Session hijacking: Existing connections can be intercepted and controlled

Security implications: SRTP’s direct memory access capabilities mean that successful attacks can have immediate and severe operational consequences, including equipment damage and safety system bypasses.

Practical Security Approaches

Network Segmentation and Access Control

The foundation of industrial protocol security is proper network architecture:

Network segmentation strategies:

  • DMZ networks between IT and OT environments with controlled access points
  • VLAN isolation separating different operational zones and functions
  • Firewall rules specifically configured for industrial protocol traffic patterns
  • Jump boxes for controlled administrative access to OT networks

Access control implementation:

  • Protocol-aware firewalls that understand EtherNet/IP, CIP, and SRTP message structures
  • Deep packet inspection for industrial protocols to detect anomalous communications
  • Connection whitelisting allowing only authorized device-to-device communications
  • Time-based access controls limiting communications to operational windows

Monitoring and Detection

Since industrial protocols lack built-in security, external monitoring becomes critical:

Protocol monitoring capabilities:

  • Baseline establishment of normal communication patterns and data flows
  • Anomaly detection for unusual commands, data values, or communication patterns
  • Asset discovery identifying all devices communicating on industrial protocols
  • Configuration monitoring detecting unauthorized changes to device configurations

Detection strategies:

  • Command analysis: Monitoring for unauthorized write commands or configuration changes
  • Data validation: Checking control data against expected operational parameters
  • Timing analysis: Detecting unusual communication timing or frequency patterns
  • Device behavior monitoring: Identifying devices exhibiting unexpected protocol behavior

Compensating Controls

When protocol-level security isn’t available, implement compensating controls:

Authentication alternatives:

  • Certificate-based device authentication at the network layer
  • VPN tunneling for industrial protocol communications over untrusted networks
  • Application-layer authentication where supported by industrial devices
  • Physical security controls for network infrastructure and device access

Data protection measures:

  • Network encryption using VPNs or other tunneling technologies
  • Message authentication codes where supported by industrial equipment
  • Data diodes for one-way data flows from OT to IT environments
  • Integrity monitoring to detect unauthorized data modifications

Implementation Considerations

Operational Impact Assessment

Security controls must be compatible with operational requirements:

Performance considerations:

  • Latency requirements for real-time control communications
  • Bandwidth limitations in industrial network infrastructure
  • Deterministic behavior requirements for safety-critical systems
  • Availability requirements that may preclude certain security measures

Change management integration:

  • Maintenance window coordination for security control implementation
  • Testing procedures to verify operational compatibility
  • Rollback planning for security measures that impact operations
  • Documentation updates reflecting security control implementations

Vendor Coordination

Industrial protocol security often requires vendor involvement:

Vendor engagement strategies:

  • Security capability assessment of current and planned industrial equipment
  • Roadmap discussions for security enhancements in future product releases
  • Support requirements for security monitoring and incident response
  • Configuration guidance for optimal security within operational constraints

Procurement considerations:

  • Security requirements in new equipment specifications
  • Lifecycle planning for equipment with limited security capabilities
  • Support contracts that include security-related assistance
  • Training requirements for secure operation and maintenance

Common Implementation Mistakes

Assuming Air-Gap Protection

The mistake: Believing that industrial networks are isolated and therefore secure. Reality: Most OT networks have direct or indirect connections to corporate networks and internet-connected systems.

Ignoring Legacy Equipment

The mistake: Focusing security efforts only on new equipment while ignoring legacy systems. Reality: Attackers often target the weakest links, which are frequently older industrial systems with no security capabilities.

Over-Engineering Solutions

The mistake: Implementing complex security solutions that interfere with operations. Reality: Industrial environments require security solutions that work reliably within operational constraints.

Treating All Protocols the Same

The mistake: Using generic network security approaches without understanding industrial protocol specifics. Reality: Effective industrial protocol security requires understanding of protocol behaviors and operational patterns.

Regulatory and Compliance Considerations

Industry Standards

Several standards address industrial protocol security:

  • ISA/IEC 62443: Industrial communication networks cybersecurity
  • NIST Cybersecurity Framework: Risk-based cybersecurity approach
  • NERC CIP: North American electric reliability standards
  • ISO 27001/27002: Information security management systems

Compliance Requirements

Different industries have specific requirements:

  • Electric utilities: NERC CIP requirements for critical cyber assets
  • Chemical facilities: CFATS requirements for high-risk chemical facilities
  • Water systems: America’s Water Infrastructure Act cybersecurity requirements
  • Manufacturing: Various industry-specific security standards and regulations

Future Protocol Security Evolution

Security Enhancements

Industrial protocol security is evolving:

  • Built-in authentication and encryption in newer protocol versions
  • Certificate-based security for device and user authentication
  • Secure key management systems for industrial environments
  • Protocol-aware security appliances designed for industrial applications

Industrial protocols are integrating with modern security architectures:

  • Cloud connectivity with secure communication channels
  • Identity and access management integration for industrial systems
  • SIEM integration for industrial protocol monitoring and analysis
  • Zero-trust architectures adapted for industrial environments

The Bottom Line

EtherNet/IP, CIP, and GE SRTP represent the reality of industrial communication: protocols designed for operational efficiency and reliability, not security. Understanding their capabilities and limitations is essential for building effective OT security programs.

The key to success is implementing layered security controls that protect these protocols without interfering with critical operations. This requires deep understanding of both the protocols and the operational environments where they’re deployed.

What’s Next?

Start by inventorying industrial protocols in your environment and assessing their security implications. Focus on understanding normal protocol behaviors before implementing detection and protection measures.

If you need help securing industrial protocols in your OT environment, let’s talk. We specialize in practical industrial cybersecurity that protects operations while maintaining the reliability and performance your business depends on.

The industrial protocols running your operations weren’t built for today’s threat landscape – but with the right approach, you can secure them effectively.

Updated: