Baton Rouge Specialty Chemical Manufacturing — C2M2 Assessment Exercise Scenario
Meridian Specialty Chemicals Inc. (MSCI) is a privately held specialty chemical manufacturer operating a 42-acre production campus in Baton Rouge, Louisiana, and a satellite blending and warehousing facility in Prairieville, LA. Founded in 1974 to serve petrochemical feedstock demand along the Mississippi Chemical Corridor, MSCI has expanded into four primary product lines: specialty solvents for electronics cleaning and semiconductor fabrication, polymer additives for plastics compounders, crop protection intermediates for agricultural chemical formulators, and high-purity cleaning agents for pharmaceutical manufacturing. MSCI supplies approximately 180 customers across North America under long-term supply agreements.
MSCI's manufacturing operations are classified under DHS CFATS Tier 3 due to the presence of several chemicals of interest (COI) above screening threshold quantities, including chlorine, anhydrous ammonia, and certain flammable liquids. The facility is subject to EPA Risk Management Program (RMP) Program 3 requirements for two covered processes, OSHA Process Safety Management (PSM) regulations, and Louisiana DEQ Title V air permitting. MSCI operates an eight-person IT department and two OT/Controls engineers — cybersecurity is treated as a collateral duty of IT Director Carlos Mendes, who estimates less than 8% of his time is spent on security activities. There is no dedicated cybersecurity staff, no CISO, and no formal cybersecurity program.
| Area | Location | Function | Physical Security | IT / OT Presence |
|---|---|---|---|---|
| Main Plant — Admin & IT Building | 4801 River Road, Baton Rouge | Corporate offices, IT server room, main control room, EHS department | Card Access CCTV Mantrap (server room) | Domain controllers, DCS application servers, historian, corporate LAN, control room HMIs |
| Reactor Building A/B (Trains A & B) | Main Plant Campus, North Wing | Batch chemical synthesis — 2 × 3,000-gal glass-lined reactors per train | Badge Access CCTV (partial) No Visitor Log | Honeywell Experion DCS nodes, AB ControlLogix (utilities tie-in), local HMI panels |
| Reactor Building C/D (Trains C & D) | Main Plant Campus, South Wing | Batch chemical synthesis — 2 × 3,000-gal Hastelloy reactors; higher-hazard chemistry | Card Access CCTV Legacy XP Workstation Present | Honeywell Experion DCS nodes, Safety Manager SIS, local operator panels, WS-006 (Windows XP) |
| Distillation & Solvent Recovery Unit | Main Plant Campus, East Process Area | Two continuous distillation columns; solvent recovery/recycle; EPA RMP covered process | Perimeter Fence Badge Access No CCTV | Experion DCS, Honeywell Safety Manager SIS (ESD), Emerson Daniel flow computers |
| Utilities Area (Boiler, Cooling Tower, Compressed Air) | Main Plant Campus, West Side | Steam generation (2 × 50,000 lb/hr firetube boilers), cooling tower, instrument air | Perimeter Fence Padlock Only Unmanaged Switches | Allen-Bradley ControlLogix L85 PLCs — FLAT NETWORK (shares corporate VLAN) |
| Quality Control Laboratory | Main Plant Campus, Building C | In-process and finished goods testing; GC/MS analysis; stability studies | Card Access Badge Log Only | LabVantage LIMS 8.7 workstations; network-connected GC/MS instruments |
| Warehouse & Shipping (Main Plant) | 4801 River Road — South Gate | Bulk solvent storage (ASTs), drum warehouse, truck loading/unloading, COI storage area | Badge Access CCTV No IDS / Alarm | Barcode scanning workstations; SAP S/4HANA WMS module; no OT systems |
| Prairieville Satellite Facility | 2240 Airline Hwy, Prairieville, LA 70769 | Blending, repackaging, and distribution; no chemical synthesis; CFATS Tier 4 sub-threshold | Perimeter Fence Badge Access No Dedicated IT Support | Standalone Windows 10 workstation (WS-008); shared VPN to main plant; no OT systems |
| Role | Name | Department | Cybersecurity Responsibility | System Access Level |
|---|---|---|---|---|
| VP Manufacturing & EHS | Dr. Patricia Nguyen | Executive | SSP approval authority; cyber incident escalation; CFATS executive point of contact | Executive — Read-Only DCS |
| IT Director (CFATS FSO) | Carlos Mendes | Information Technology | Primary CFATS FSO; all IT/OT cybersecurity decisions; vendor access oversight; SSP implementation | Domain Admin + DCS Admin |
| Senior Sysadmin | Derek Walsh | Information Technology | Windows server administration; patch management; backup execution | Server Local Admin |
| Network Engineer | Lena Park | Information Technology | Cisco network infrastructure; Palo Alto NGFW; GlobalProtect VPN management | Network Admin |
| IT Sysadmin | Omar Rashid | Information Technology | Helpdesk; workstation support; Active Directory user account management | Helpdesk Admin |
| Database Admin | Mia Torres | Information Technology | SAP HANA DB; LabVantage LIMS DB; SQL Server instances | DB Admin |
| Controls Engineer | Frank Albright | Engineering | DCS configuration changes; SIS engineering; informal OT change management | DCS Full Admin + SIS Read |
| Instrumentation Technician | Bobby Tran | Engineering | Field instrument calibration; PLC panel access; loop checks | OT Panel Local Access |
| Production Supervisor | Angela Carter | Manufacturing | Batch execution oversight; approves operator system access requests | DCS Operator (Read/Control) |
| Lead DCS Operator | Marcus Hill | Manufacturing | DCS monitoring; batch operations; alarm management; shift reporting | DCS Operator (Read/Control) |
| EHS Manager | Tina Kowalski | EHS | CFATS compliance coordination; EPA RMP; OSHA PSM program; regulatory incident reporting | LIMS + SAP Read-Only |
| Batch Server Admin (Contractor) | Siemens SITEC LLC | Contractor | Batch execution server (SIMATIC IT) maintenance, recipe management; remote VPN access | Remote VPN — Batch Server Admin |
| Asset ID | Description | Hardware | Operating System | Location | Key Gaps / Notes |
|---|---|---|---|---|---|
| SRV-001 | Primary Domain Controller | Dell PowerEdge R750 | Windows Server 2019 Standard | IT Server Room, Baton Rouge | Patched Current No Tier-0 isolation for domain admin accounts |
| SRV-002 | DCS Application Server (Honeywell Experion PKS) | HP ProLiant DL380 G10 | Windows Server 2016 Standard | IT Server Room, Baton Rouge | CRITICAL — Domain-joined DCS server No MFA on DCS HMI login |
| SRV-003 | Process Historian (AspenTech IP.21) | Dell PowerEdge R540 | Windows Server 2016 Standard | IT Server Room, Baton Rouge | IP.21 v14.0 — Patch 14.1 available IT/OT bridge — accessible from both networks |
| SRV-004 | Batch Execution Server (Siemens SIMATIC IT / ISA S88) | Dell PowerEdge R440 | Windows Server 2012 R2 — EOL | IT Server Room, Baton Rouge | EOL OS — No Security Patches Since 2023 Port 8443 internet-facing (legacy recipe upload — ACTIVE) |
| SRV-005 | SAP S/4HANA App Server (ERP — Finance, Procurement, Sales) | Virtual (VMware ESXi 7.0) | Windows Server 2019 Standard | IT Server Room, Baton Rouge (VM) | Patched Current SAP basis admin shared with external SAP partner — standing access |
| SRV-006 | LIMS Server (LabVantage 8.7 — QC Lab) | Dell PowerEdge R340 | Windows Server 2019 Standard | IT Server Room, Baton Rouge | LIMS accessible from plant network — no segmentation from QC lab VLAN |
| SRV-007 | File Server (CFATS CVI Documents, Engineering Drawings) | Dell PowerEdge R340 | Windows Server 2019 Standard | IT Server Room, Baton Rouge | CVI documents — no access controls beyond standard AD login No DLP or audit logging on CVI folder |
| Asset ID | Description | Hardware | Operating System | Location | Key Gaps / Notes |
|---|---|---|---|---|---|
| WS-001 through WS-004 | DCS Operator HMI Workstations (4 units) | Dell OptiPlex 7090 | Windows 10 LTSC 2019 | Main Control Room | No MFA on DCS login Shared "operator" account active on WS-002 and WS-003 |
| WS-005 | DCS Engineering Workstation | Dell Precision 5760 | Windows 10 Pro | Controls Engineering Office | Dual-homed: IT LAN (VLAN 10) + DCS network (VLAN 20) USB ports unrestricted; no removable media policy |
| WS-006 | LEGACY Process Graphics Workstation | Dell OptiPlex GX280 (2005 vintage) | Windows XP SP3 — EOL since April 2014 | Reactor Building C/D, Local Panel Room | EOL OS — unpatched since 2014 No EDR agent possible on Windows XP Network-connected to DCS VLAN |
| WS-007 | IT Admin Workstation | Dell Precision 3650 | Windows 10 Pro | IT Director Office | No PAM tool — IT Director uses direct RDP to all servers from this workstation |
| WS-008 | Prairieville Facility Workstation | Dell OptiPlex 5090 | Windows 10 Pro | Prairieville, LA Satellite Facility | No EDR agent installed Connected to main plant via split-tunnel VPN; no dedicated IT support on-site |
| Asset ID | Description | Vendor / Model | Firmware / Version | Location | Security Notes |
|---|---|---|---|---|---|
| OT-001 | DCS Master Controller — Primary | Honeywell Experion PKS | R430.1 (2020) | IT Server Room, Baton Rouge | R430.3 patch available — not yet applied No application whitelisting on Experion nodes |
| OT-002 through OT-005 | DCS Process Controllers — Reactors A–D (4 units) | Honeywell C300 Process Controllers | R430.1 firmware | Reactor Buildings A/B and C/D | Firmware update requires planned process shutdown No keyswitch lock policy enforced on 2 units |
| OT-006 | DCS Process Controller — Distillation & Solvent Recovery | Honeywell C300 | R430.1 firmware | East Process Area | Same firmware patch gap as reactor controllers Network-isolated on dedicated VLAN |
| OT-007 | Safety Instrumented System (SIS) | Honeywell Safety Manager SC | v160 (current) | Reactor C/D and Distillation Unit | Current firmware IT staff have SIS read access via corporate AD credentials — not SIS-dedicated accounts |
| OT-008 | Utility PLC — Boilers, Cooling Tower, Compressed Air | Allen-Bradley ControlLogix L85 | v33.013 (current) | Utilities Area, West Plant | CRITICAL — On corporate VLAN (flat network, no IT/OT boundary) No industrial firewall at utilities network boundary |
| OT-009 through OT-010 | Batch Execution System — ISA S88 Recipe Management (2 nodes) | Siemens SIMATIC IT R&D Suite | v8.1.0 (2019) | IT Server Room (logical — SRV-004) | Port 8443 internet-facing (legacy — still active) v8.2 update available — requires Siemens on-site Contractor remote access: no MFA, no session recording |
| OT-011 through OT-012 | Flow Computers — Custody Transfer & Mass Balance (2 units) | Emerson Daniel 3-Phase Flow Computer | v2.31 | East Process Area (Distillation) | Audit logs enabled — not reviewed on any regular schedule |
| OT-013 through OT-016 | Industrial Ethernet Switches — Managed (4 units) | Cisco Catalyst IE-3400 | IOS-XE 17.6.1 | DCS network and server room | SNMP v2c enabled — community string "msciint" VLANs configured for DCS isolation at main plant |
| OT-017 through OT-021 | Industrial Ethernet Switches — Unmanaged (5 units) | Phoenix Contact FL SWITCH 1005 | N/A (unmanaged) | Utilities area and Prairieville facility | Unmanaged — no logging, no port security, no VLAN capability Cannot enforce segmentation at utilities or remote site |
| OT-022 | Gas Detection System (Fixed LEL / H2S / Cl2 — 38 sensor points) | MSA PrimaX Pro | v3.4 (current) | Main plant process areas (all buildings) | Controller connected to safety network — no formal cybersecurity review or risk assessment performed for this system |
| Domain | Current Control / Status | Implementation | Key Gap / Finding |
|---|---|---|---|
| Access Management | Active Directory with RBAC groups; Palo Alto GlobalProtect VPN; local accounts on DCS Experion server | Partial | No MFA on VPN, DCS HMIs, or batch server; shared operator accounts on WS-002 and WS-003; no PAM tool; no privileged access review process |
| Threat & Vulnerability Management | Rapid7 InsightVM deployed on IT network; no OT scanning; informal patch process for Windows servers only | Partial | All OT assets (DCS, SIS, PLCs) excluded from vulnerability management program; WS-006 (Windows XP) unpatched since 2014; Experion R430.3 available but not applied; no risk-based patching schedule for OT systems |
| Situation Awareness | Palo Alto firewall logs reviewed manually and ad-hoc; no SIEM; Windows event logs retained locally only; no OT network monitoring | Missing | No SIEM or centralized log aggregation; DCS/OT network has zero intrusion detection or anomaly monitoring capability; log retention less than 14 days on most systems; internet-facing port 8443 on SRV-004 was never detected by existing controls |
| Incident Response | Draft IT-focused IRP exists; OSHA PSM emergency response plan covers chemical process releases (not cyber); no cyber tabletop exercises conducted | Partial | IRP has no OT/DCS-specific runbooks; no cyber-physical scenario planning; PSM emergency plan and cyber IRP are completely separate and not integrated; no tabletop or functional exercise history; DHS expects incident response capability even though CFATS does not prescribe specific IR procedures |
| Service Continuity | Tape backups performed for IT servers; no tested restoration procedure; BCP covers physical hazards (hurricane, fire, chemical release) only; DCS has no backup or recovery procedure | Missing | No cyber BCP or DR plan; no defined RTO/RPO for DCS, batch server, or historian; SRV-003 (IP.21 Historian) backup has never been tested for successful restoration; no backup DCS controller or hot standby for Experion PKS; batch recipe library (SRV-004) has no verified backup |
| Risk Management | CFATS CSAT completed 2022 (DHS hazard-based assessment); OSHA PHA addresses process safety risks only; no formal cybersecurity risk assessment exists | Missing | No cyber risk register; CFATS CSAT findings from 2022 only partially implemented; no cyber-physical risk analysis for batch reactor DCS compromise scenarios; CFATS Tier 3 SSP contains a cybersecurity section but the required technical controls have not been fully operationalized |
| Asset Management | IT CMDB in ServiceNow maintained for IT assets; OT assets tracked in spreadsheet by Controls Engineer Frank Albright; no automated asset discovery | Partial | OT asset inventory incomplete and not integrated with CMDB; WS-006 (XP workstation) not listed in ServiceNow; SRV-004 internet-facing port 8443 not in any asset or configuration record; no configuration baseline documented for DCS controllers; software inventory for OT systems not maintained |
| Identity Management | Active Directory manages IT user identities; DCS accounts locally managed on Experion application server; no formal identity lifecycle management for OT accounts | Partial | Two former contractor AD accounts remain active (departed within last 12 months); DCS accounts for at least one departed controls contractor not removed; no periodic user access certification; SAP partner retains standing VPN access between quarterly visits — access not deprovisioned between engagements |
| Supply Chain & Third-Party Risk | Vendor contracts reference general liability; Honeywell and Siemens hold active remote VPN access; no third-party vendor risk management program | Missing | No third-party cyber risk assessment program; Honeywell remote DCS access uses shared credential with no MFA and no session recording; Siemens batch server access has same gaps plus undiscovered internet-facing port; no annual vendor security review; no cybersecurity requirements in any vendor SOW or MSA |
| Workforce Management | OSHA and EHS safety training mandatory and well-documented; cybersecurity awareness training completely absent; background checks for new hires and all CFATS-designated personnel | Partial | No cybersecurity awareness training program; no phishing simulations ever conducted; DCS operators have not received any ICS security training; IT Director / CFATS FSO (Carlos Mendes) holds no formal cybersecurity certification; CFATS personnel surety (background check) requirements are met but no cyber-specific training requirements are enforced |
| Physical Security | HQ and control room: card access + full CCTV; reactor buildings: badge access; utilities area: padlock only; CFATS SSP physical security measures partially implemented | Partial | Utilities area — containing PLCs on the flat corporate network — has only padlock-level physical security with no CCTV and no intrusion alarm; no visitor escort policy for contractor access to OT panel rooms in reactor buildings; Prairieville satellite facility has no dedicated IT or security support and a single badge-access entry point |
| Configuration Management | IT change tickets managed in ServiceNow; OT changes performed verbally by Controls Engineer without documentation; no formal OT change management process; no DCS configuration backup | Missing | No formal OT change management process; DCS controller configurations not backed up or version-controlled; PLC ladder logic not stored in a version control system; WS-006 (XP workstation) configuration is completely unknown; the batch server's internet-facing port 8443 exists because of an undocumented 2009 configuration change that was never reviewed or recorded |
| Vendor | Service Provided | Access Level | Risk Rating | Notes / Gaps |
|---|---|---|---|---|
| Honeywell Process Solutions (PSS) | Experion PKS DCS application support, patch deployment, configuration changes | Remote VPN — DCS Full Admin | HIGH | Shared credential used by multiple Honeywell engineers; no MFA; no session recording; access not time-limited; no annual review; last remote session date not logged |
| Siemens SITEC LLC | SIMATIC IT batch execution server maintenance, ISA S88 recipe management updates | Remote VPN — Batch Server Admin | HIGH | No MFA; no session recording; SRV-004 has internet-facing TCP port 8443 that Siemens itself is unaware of; last confirmed remote access: approximately 4 months ago; v8.2 software update pending |
| SAP SE / Authorized Partner | SAP S/4HANA BASIS administration, quarterly software patches and system health checks | Remote VPN — SAP Basis Admin (quarterly) | MEDIUM | No MFA; standing VPN access not deprovisioned between quarterly visits; same credential in use since 2021; SAP partner personnel turnover not communicated to MSCI; no time-of-day access restrictions |
| LabVantage Solutions | LIMS application support and annual version upgrade | Remote VPN — LIMS Admin (annual) | MEDIUM | Remote access only during annual upgrade engagement; however, VPN account remains active year-round and is never deprovisioned between annual visits; no MFA |
| PSC Environmental Services (EHS Consultant) | EPA RMP plan updates, CFATS CSAT submission support, OSHA PSM third-party auditing | Onsite Only + LIMS/SAP Read-Only | LOW | Physical access only during PSM audit and RMP update engagements; limited read-only data access on-site; CFATS personnel surety (background check) completed for all PSC personnel; CVI handling training confirmed |
| Air Products and Chemicals (Gas Supply) | Specialty gas cylinder delivery — nitrogen, hydrogen, argon, instrument air | Physical Delivery Only | LOW | No IT or OT system access; delivery personnel issued temporary badge at dock; drivers do not enter process areas; CFATS personnel surety completed for drivers accessing COI storage areas |
| Cisco SmartNet / CDW Government | Network equipment maintenance contracts, replacement hardware procurement, Cisco TAC support | Onsite — Network Access (as needed) | MEDIUM | On-site access only when replacing failed equipment; CDW has no standing remote access; Cisco TAC support accessed via case portal only; no formal security requirements in SmartNet or CDW statements of work |
| DHS / CISA — CFATS Inspector | CFATS compliance inspections — SSP verification, physical security walk, chemical inventory audit | Onsite — SSP Review + Physical Walk | REGULATORY | Access per DHS CFATS inspection schedule; no IT or OT system access during inspections; all CFATS documentation shared under CVI handling requirements; follow-up inspection scheduled for 2026 based on 2022 CSAT findings |
MSCI maintains an IT CMDB in ServiceNow and tracks OT assets in a spreadsheet, yielding a partial MIL 1. Critical gaps include WS-006 (XP workstation) absent from the CMDB, the internet-facing port 8443 not recorded anywhere, and no DCS configuration baselines.
Rapid7 InsightVM provides IT vulnerability scanning, but all OT assets are excluded. WS-006 has been unpatched for over 10 years. The Experion R430.3 patch is available but not applied. No OT-specific threat intelligence sources are monitored.
CFATS CSAT is a DHS-driven hazard inventory, not a cybersecurity risk assessment. No cyber risk register exists. CSAT findings from 2022 are partially implemented. No cyber-physical risk analysis has been performed for DCS compromise scenarios in the batch reactor environment.
AD RBAC and Palo Alto VPN provide basic IT access controls. However, no MFA is deployed anywhere — not on VPN, DCS HMIs, or the batch server. Shared operator accounts and stale contractor accounts are active. OT identities are outside AD governance.
The most significant MIL 0 domain. No SIEM, no centralized logging, no OT network monitoring of any kind. The internet-facing port 8443 on SRV-004 is the clearest evidence of this gap — it existed for 15 years without being detected by any security control.
A draft IT IRP exists. The OSHA PSM emergency response plan is mature for process safety events but completely separate from the cyber IRP. No tabletop exercises have ever been conducted. No OT-specific runbooks or cyber-safety decision trees exist for operators.
No third-party risk management program of any kind. Three vendors hold admin-level remote access to critical systems with shared credentials, no MFA, and no session recording. Vendor contracts contain no cybersecurity requirements. No reviews have been performed.
OSHA and EHS safety training is mandatory and well-documented — a strength. However, no cybersecurity awareness training exists, no phishing simulations have been run, and DCS operators have received no ICS security training. The CFATS FSO holds no security certification.
The Palo Alto NGFW is a genuine strength at the perimeter. DCS VLAN segmentation exists at the main plant. However, WS-005 dual-home bypasses the VLAN boundary, utilities PLCs are on the flat corporate VLAN, and unmanaged switches eliminate visibility and control at utilities and Prairieville.
No formal cybersecurity program exists at MSCI. The CFATS SSP was filed to meet a regulatory obligation, not as part of a strategic security program. There is no CISO, no security budget line item, no governance structure, and no program roadmap. Cybersecurity is entirely reactive and collateral.
Cybersecurity Capability Maturity Model (C2M2) Program
Developed by the U.S. Department of Energy (DOE) Office of Cybersecurity, Energy Security, and Emergency Response (CESER)
C2M2 Version 2.1 | Training Case Study — Meridian Specialty Chemicals Inc. (MSCI)
All case study organizations, personnel, and data are entirely fictional and for educational use only.