
A local authority in Savoie operating around twenty wastewater treatment plants (WWTPs) tasked our DATIVE experts with an industrial cybersecurity assessment. Objective: identify OT vulnerabilities, secure the infrastructure, and build a robust action plan to reinforce resilience against cyber threats.
Wastewater treatment plants (WWTP) are a critical link in the chain of drinking water management and wastewater treatment. Their mission goes far beyond technical operations: they safeguard public health, protect the environment and ensure the continuity of an essential service for local communities.
A compromise of these facilities can have major consequences: environmental pollution, microbiological contamination, service interruption, or even direct endangerment of the population.
These operational risks are compounded by increasing regulatory pressure:
In IT environments, data confidentiality is usually the top priority. In contrast, OT (Operational Technology) environments prioritize the availability and integrity of industrial processes. An unplanned shutdown or falsified sensor data can cause immediate disruptions with potentially irreversible consequences for both the environment and the public.
In this demanding context, a local authority in Savoie commissioned DATIVE to conduct a comprehensive cybersecurity assessment of its wastewater treatment infrastructures, with the objective of identifying vulnerabilities, measuring OT maturity and strengthening the resilience of its critical installations.
Leverage DATIVE’s field expertise to strengthen the resilience of your water treatment systems.
At DATIVE, we have developed a proven methodology tailored to the most critical industrial environments. It relies on three key pillars: the NIST Cybersecurity Framework, ANSSI’s recommendations for industrial system security and the international IEC 62443 standard.

This approach enables us to structure our assessments around the five core cybersecurity functions:
Our approach is resolutely operational. We prioritise field immersion: we go into technical rooms, SCADA areas and industrial networks to work directly with operations teams. This proximity enables us to deliver concrete findings, far from purely theoretical approaches.
Rely on DATIVE’s field expertise to assess your OT environments according to NIS2, ANSSI and IEC 62443 standards.
We structured our audit around four complementary themes providing a 360° view of the station’s cybersecurity posture:
We conduct an in-depth analysis of OT systems and equipment: operator station and HMI configuration, hardening of industrial Windows and Linux environments, remote maintenance access management, account and password usage, and patch/obsolescence levels of equipment.
This phase reveals structural vulnerabilities that directly weaken production continuity.
We produce a complete flow map between zones and conduits and verify the relevance of IT/OT segmentation. We review firewall rules, industrial protocol management, network supervision and incident detection. We also test resilience to threats: scans, exploitation attempts, or use of unsecured services. The objective is to measure the actual level of segmentation and control over OT exchanges.
We evaluate organisational maturity and the role given to cybersecurity in daily operations: operator and subcontractor awareness, onboarding/offboarding processes, separation of personal and professional use, presence of IT charters or an identified OT security officer.
We also analyse the organisation’s capability to integrate cybersecurity in project phases: specifications, contractor audits, periodic testing. This component is critical, as human behaviour remains one of the primary vectors of compromise in industrial environments.

We verify the security of access to critical systems: cabinets, IT racks, switches, SCADA servers and operator stations. We assess the presence (or absence) of access controls, anti-theft devices, clean desk policies or USB port blocking.
Often underestimated, this physical dimension remains an essential pillar of OT security, as direct access to equipment can bypass the most advanced software protections in seconds.
Our evaluation highlighted several recurring vulnerabilities in water treatment environments. These findings reflect common weaknesses we regularly observe in OT systems.
Some WWTPs lacked adequate access control mechanisms. PLCs could be reached directly, without badges or video surveillance, exposing the environment to malicious or accidental manipulations, impossible to trace.
The OT network had insufficient segmentation between IT and OT environments. The administrative IT system was directly interconnected with the industrial network and had direct Internet access. We identified misconfigured VLANs and unfiltered flows, directly exposing PLCs and SCADA servers to threats originating from the office network.
Several operator stations were still running Windows XP and Windows 7, systems no longer supported by their publishers. We observed daily use of administrator accounts and weak or shared passwords. These practices create ideal entry points for attackers.
Some PLCs and network equipment used unencrypted services (FTP, HTTP) or still held default credentials. These weaknesses significantly increase the likelihood of exploitation, whether by internal or external actors.
Personal USB drives circulated in the supervision environment, directly exposing systems to malware introduction. In addition, backups were neither centralised nor regularly tested, significantly increasing the potential impact of an intrusion, particularly by lengthening recovery timelines in case of an incident.
Leverage our field experience to anticipate and remediate vulnerabilities in your industrial environments.
Based on these findings, we built a pragmatic and progressive action plan for the local authority, structured across three timelines. The objective: quickly address critical vulnerabilities while embedding cybersecurity into a long-term resilience strategy.
We proposed immediate, low-cost, high-impact actions to rapidly reduce the attack surface:
Once the foundations were secured, we defined a consolidation plan for the OT environments:

To embed cybersecurity sustainably, we defined an ambitious trajectory:
Beyond technical measures, we insisted on the need for lasting governance. Cybersecurity must be integrated into the operational culture of this Savoie authority through:
Implementing this plan produced immediate and visible results:

Industrial cybersecurity in wastewater treatment plants is no longer optional: it is a strategic imperative supporting the continuity of essential services and regulatory compliance.
Through an in-depth assessment and a pragmatic action plan, this Savoie authority established the foundations of long-term OT resilience. This example illustrates how combining a structured methodology (NIST, IEC 62443) with a field-driven approach is essential to securing sensitive industrial environments.
Do you operate a WWTP or another critical infrastructure and want to strengthen your OT cybersecurity? Contact DATIVE’s experts for a tailored assessment.