
A local authority located in Bretagne, operating a wastewater treatment plant made up of six treatment basins, called on DATIVE’s expertise in order to strengthen the cybersecurity of its industrial environment.
This site, largely automated and integrating heterogeneous OT equipment, is part of a modernization dynamic of public infrastructure and a transition toward Industry 4.0, with a gradual increase in connected systems and IIoT architectures.
Aware of regulatory developments and new requirements related to the NIS2 directive, the local authority needed to take a first structuring step: to obtain a reliable, comprehensive, and up-to-date view of all its industrial equipment and the associated flows.
This approach was an essential prerequisite to assess cyber risks and initiate a security program in line with ANSSI best practices and NIS2.

Before our intervention, this Breton wastewater treatment plant was facing several issues commonly found in legacy industrial environments:
Our client had little consolidated information on:
Documents existed, but were partial, incomplete, or outdated.
The transfer of information relied heavily on the internal memory of the technical teams. The local authority therefore expressed a clear need: to make knowledge more reliable, document the infrastructures, and reduce areas of uncertainty.
Although OT maturity was still limited, the stakeholders we met—operations managers and staff responsible for supervising the basins—were particularly engaged and eager to move toward a structured industrial cybersecurity approach.
Anticipating its future inclusion within the scope of the NIS2 directive, the site needed to:
To address these needs, DATIVE leveraged its expertise in industrial cybersecurity, relying on a proven methodology tailored to sensitive environments such as wastewater treatment plants.
We began with a complete visit of the facility together with the technical teams in order to:
This immersion is essential to correlate the future mapping with the operational reality on the ground.
Our team then carried out a detailed survey in each network cabinet and each OT rack. For every connected device, we collected:
This step makes it possible to reconstruct a comprehensive and reliable inventory, a fundamental prerequisite for any OT security approach.

In order to avoid any impact on PLCs or on the industrial process, we exclusively used passive network scanners designed for sensitive environments.
This method ensures:
Back at the office, our experts consolidated all the data in order to produce two complementary views:
Physical view:
Logical view:
These two views provide a comprehensive understanding of how the industrial network operates, which is essential to prepare segmentation in line with IEC 62443 or a future deployment of industrial firewalls, bastion hosts, or OT IDS solutions.
Contact us now to discuss your environment.
Thanks to DATIVE’s intervention, our client now benefits from a clear, accurate, and reliable view of its OT architecture.
The consolidated inventory makes it possible to know exactly:
The dual mapping (physical and logical) provides the client with:
This inventory constitutes the essential first building block to go further:
Thanks to this documentation:

The intervention carried out by DATIVE at this wastewater treatment plant in Bretagne perfectly illustrates the importance of OT inventory and mapping within an industrial cybersecurity strategy.
By laying the essential foundations, our client is now ready to engage in a more advanced cybersecurity approach, thereby strengthening the resilience, service continuity, and regulatory compliance of its wastewater infrastructure.
Are you a local authority or a water operator?
If, like this client, you would like to carry out an OT inventory, obtain reliable mapping, or prepare for NIS2, DATIVE is here to support you.
Contact our experts for an initial discussion about your environment.