Permian Basin Natural Gas Gathering & Transmission — C2M2 Assessment Exercise Scenario
Lone Star Midstream LLC (LSML) is a privately held midstream energy company operating approximately 847 miles of natural gas gathering and transmission pipeline across the Permian Basin in West Texas and southeastern New Mexico. Founded in 1987 to serve the growing upstream production base in the Midland and Delaware sub-basins, LSML provides gathering, compression, dehydration, and limited processing services to independent oil and gas producers, transporting natural gas to downstream interstate pipeline interconnects operated by third-party transmission companies. LSML also operates two natural gas liquids (NGL) processing facilities that extract ethane, propane, and natural gas liquids from the raw gas stream before redelivery.
LSML's customer base consists primarily of small to mid-size upstream operators, and the company holds long-term firm capacity agreements with six producers accounting for approximately 80% of throughput. The company is subject to DOT Pipeline and Hazardous Materials Safety Administration (PHMSA) integrity management requirements under 49 CFR Part 192, EPA Risk Management Program (RMP) obligations at its NGL processing facilities, and TSA Pipeline Security Directive SD-02C cybersecurity requirements. LSML has a three-person IT department and zero dedicated cybersecurity staff — cybersecurity responsibilities are informally assigned as a collateral duty to the IT Manager, Marcus Webb.
| Facility | Location | Function | Physical Security | IT / OT Presence |
|---|---|---|---|---|
| Midland Control Room (HQ) | Midland, TX 79701 | SCADA control room, corporate IT, administrative offices, 24/7 operations staff | Card Access CCTV No Mantrap | Domain controller, SCADA master, historian, corporate LAN, HMI workstations |
| Odessa Compressor Station | Ector County, TX | Natural gas compression (4 × Caterpillar G3616 engines), custody transfer metering | Perimeter Fence Padlock Gate No CCTV | Allen-Bradley ControlLogix PLC, Fisher ROC RTU, local HMI panel, Cisco IW3702 wireless |
| Pecos River Compressor Station | Reeves County, TX | Mid-line compression, pig launcher/receiver, emergency shutdown system | Perimeter Fence No Lock Alarm No CCTV | Allen-Bradley ControlLogix PLC, Fisher ROC RTU, dial-up modem backup, Hirschmann unmanaged switch |
| Hobbs Compressor Station | Lea County, NM | Natural gas compression, interconnect with interstate pipeline, gas quality monitoring | Perimeter Fence Card Access (single door) | Allen-Bradley ControlLogix PLC, Fisher ROC RTU, Cisco IW3702 wireless, local historian node |
| Permian North M&R Station | Andrews County, TX | Gas measurement, pressure regulation, odorization injection, custody transfer | Padlock Only No CCTV Unmanned 24/7 | Fisher ROC809 RTU (default credentials), Emerson Daniel flow computer, Hirschmann unmanaged switch |
| Permian South M&R Station | Midland County, TX | Gas measurement, pressure regulation, custody transfer metering for two producers | Padlock Only No CCTV Unmanned 24/7 | Fisher ROC809 RTU (default credentials), Emerson Daniel flow computer, dial-up modem backup |
| Winkler NGL Processing Facility | Winkler County, TX | NGL extraction, ethane/propane separation, NGL storage, EPA RMP covered process | Card Access CCTV (partial) No Visitor Log Policy | Honeywell Experion PKS DCS, Safety Instrumented System (SIS), corporate network extension via T1 line |
| Loving County NGL Processing Facility | Loving County, TX | NGL extraction and condensate stabilization, gas sweetening (amine unit) | Perimeter Fence Card Access (main gate only) | Honeywell Experion PKS DCS, Safety Instrumented System (SIS), Cisco IE-4000 industrial switches |
| Role | Name | Department | Cybersecurity Responsibility | System Access Level |
|---|---|---|---|---|
| VP of Operations | Sandra Reyes | Executive | TSA Cybersecurity Coordinator (backup); incident escalation approval | Executive — Read-Only SCADA |
| IT Manager (Cybersecurity Coordinator) | Marcus Webb | Information Technology | Primary TSA Cybersecurity Coordinator; all IT/OT security decisions; patch management; vendor access | Domain Admin + SCADA Admin |
| IT Technician I | Javier Morales | Information Technology | Workstation support; basic network troubleshooting; backup monitoring | Helpdesk Admin |
| IT Technician II | Amber Liu | Information Technology | Server patching support; Office 365 administration; user account provisioning | Server Local Admin |
| Field Operations Supervisor | Dale Hutchins | Operations | Approves field technician access to OT panels; reports equipment anomalies | OT Local Panel Access |
| Control Room Operator (Lead) | Rosa Trevino | Operations | Monitors SCADA; reports abnormal readings; executes shutdown procedures | SCADA Operator (Read/Control) |
| Control Room Operator | Kevin Park | Operations | SCADA monitoring; shift reports; alarm response | SCADA Operator (Read/Control) |
| Control Room Operator | Tanya Osei | Operations | SCADA monitoring; shift reports; alarm response | SCADA Operator (Read/Control) |
| Control Room Operator | Bill Ferris | Operations | SCADA monitoring; shift reports; alarm response | SCADA Operator (Read/Control) |
| SCADA Engineer (Contractor) | Emerson Field Services | Contractor — Emerson Automation Solutions | SCADA application maintenance; configuration changes; software updates; remote troubleshooting | Remote VPN — SCADA Full Admin |
| Asset ID | Description | Hardware | Operating System | Location | Key Gaps / Notes |
|---|---|---|---|---|---|
| SRV-001 | Primary Domain Controller | Dell PowerEdge R640 | Windows Server 2019 Standard | Midland HQ Server Room | Patched Current No Privileged Access Workstation |
| SRV-002 | SCADA Application Server (Emerson Ovation) | HP ProLiant DL380 G10 | Windows Server 2016 Standard | Midland HQ Server Room | CRITICAL: No MFA on SCADA HMI Domain-joined OT server |
| SRV-003 | Process Data Historian (OSIsoft PI) | Dell PowerEdge R430 | Windows Server 2012 R2 — EOL | Midland HQ Server Room | EOL OS — No Security Patches Since 2023 IT/OT Bridge Risk |
| SRV-004 | Corporate File & Print Server | Dell PowerEdge R340 | Windows Server 2019 Standard | Midland HQ Server Room | Patched Current No DLP Controls |
| SRV-005 | Azure AD Connect / Office 365 Proxy | Virtual (VMware ESXi 7.0) | Windows Server 2019 Standard | Midland HQ Server Room (VM) | MFA enabled for O365 only — not internal AD |
| SRV-006 | ERP Server (SAP Business One — Accounting & HR) | Dell PowerEdge R540 | Windows Server 2019 Standard | Midland HQ Server Room | SAP B1 v10.0 — Vendor remote access quarterly |
| SRV-007 | Engineering Workstation Server (AutoCAD, GIS) | Virtual (VMware ESXi 7.0) | Windows Server 2016 Standard | Midland HQ Server Room (VM) | GIS pipeline mapping data — no data classification |
| Asset ID | Description | Hardware | OS | Location | Key Gaps / Notes |
|---|---|---|---|---|---|
| WS-001 through WS-004 | Control Room HMI Workstations (4 units) | Dell OptiPlex 7090 (hardened) | Windows 10 LTSC 2021 | Midland Control Room | No MFA Shared Operator Credentials on 2 units |
| WS-005 | SCADA / OT Engineering Workstation | Dell Precision 3650 | Windows 10 Pro | Midland HQ — IT Office | Dual-homed: IT LAN + SCADA network USB ports unrestricted |
| WS-006 | IT Admin Workstation | Dell Precision 3450 | Windows 10 Pro | Midland HQ — IT Office | Local admin only No PAM tool — direct RDP to servers |
| Asset ID | Description | Vendor / Model | Firmware / Version | Location | Security Notes |
|---|---|---|---|---|---|
| OT-001 | SCADA Master Station | Emerson Ovation v3.4 | Ovation 3.4.1 (2021) | Midland Control Room | Patch 3.4.2 available — not yet applied No application whitelisting |
| OT-002 through OT-007 | Compressor Station PLCs (6 units — one per station) | Allen-Bradley ControlLogix L71 | Firmware 32.011 (2020) | Odessa, Pecos River, Hobbs, three gathering stations | Firmware 33.013 available — update requires outage window No keyswitch locks on two units |
| OT-008 through OT-021 | Remote Terminal Units — M&R Stations & Valve Sites (14 units) | Fisher ROC809 | Firmware 1.86 (varies) | Remote M&R and valve sites across pipeline | 5 units: Factory-default credentials 3 units: Active dial-up modem backup No firmware change log |
| OT-022 through OT-025 | Custody Transfer Flow Computers (4 units) | Emerson Daniel Senior Sonic | Daniel MeterLink v3.9 | Odessa, Hobbs, Winkler, Loving County | Audit log enabled — logs not reviewed regularly |
| OT-026 through OT-027 | Distributed Control System — NGL Facilities (2 units) | Honeywell Experion PKS R511 | R511.2 (2022) | Winkler NGL Facility, Loving County NGL Facility | SIS on separate network — no formal change control IT staff have DCS read access with corporate credentials |
| OT-028 through OT-035 | Industrial Ethernet Switches — Managed (8 units) | Cisco IE-4000-8GT8GP4G | IOS 15.2(7)E4 | Compressor stations and NGL facilities | SNMP v2c enabled — community string "public" No port security or 802.1X |
| OT-036 through OT-046 | Industrial Ethernet Switches — Unmanaged (11 units) | Hirschmann RS20-0400M2M2-0A | N/A (unmanaged) | Remote gathering sites and M&R stations | Unmanaged — no visibility, no logging Cannot enforce VLANs or port security |
| Domain | Current Control / Status | Implementation | Key Gap / Finding |
|---|---|---|---|
| Access Management | Active Directory with role-based groups; VPN for remote access; no PAM tool | Partial | No MFA on SCADA HMIs or VPN; shared operator credentials on two HMIs; no privileged access review process |
| Threat & Vulnerability Management | Qualys vulnerability scanner deployed on IT network; no OT scanning; informal patch process | Partial | OT assets (PLCs, RTUs, DCS) not included in vulnerability management program; EOL historian (SRV-003) not patched since Jan 2023 |
| Situation Awareness | Windows Event Logs collected; no SIEM; Cisco ASA logs to local storage only; no OT monitoring | Missing | No centralized log management or SIEM; OT network has no intrusion detection or anomaly detection capability; log retention is less than 30 days on most systems |
| Incident Response | Draft Incident Response Plan (IRP) exists; never tested; no OT-specific runbooks; TSA reporting process identified | Partial | IRP is IT-focused only; no OT incident scenarios; TSA SD-02C requires 24-hour reporting of cybersecurity incidents — LSML has not exercised this capability; no tabletop exercises conducted |
| Service Continuity | Tape backups for servers; no tested recovery; BCP does not cover cyber scenarios; manual pipeline operations documented for safety shutdown only | Missing | No cyber-specific BCP/DR plan; SCADA historian backups not tested for restoration; no defined RTO/RPO for critical OT systems; SCADA backup server not maintained |
| Risk Management | PHMSA integrity risk assessment performed for pipeline physical integrity; no formal cyber risk assessment exists | Missing | No documented cybersecurity risk register; no cyber-physical risk analysis; TSA SD-02C requires a Cybersecurity Implementation Plan (CIP) — LSML's CIP filed in 2023 is partially implemented |
| Asset Management | IT asset inventory maintained in spreadsheet; OT asset inventory partially documented; no automated discovery | Partial | OT asset inventory is incomplete — RTU firmware versions inconsistently tracked; no configuration baseline for PLCs or flow computers; no software license management for OT |
| Identity Management | Active Directory for IT users; OT identities managed locally on SCADA server; no identity lifecycle management process | Partial | Three former employee accounts still active in AD (departed within last 12 months); no formal user access review; SCADA accounts not synchronized with HR termination process |
| Supply Chain & Third-Party Risk | Vendor contracts reference general security requirements; MSP has domain admin access; no vendor risk program | Missing | No third-party cybersecurity risk assessment program; Emerson remote access not monitored with session recording; no annual vendor review; MSP contract does not specify security requirements |
| Workforce Management | Annual safety training required; cybersecurity training not formalized; background checks for new hires; no security awareness program | Partial | No cybersecurity awareness training program; social engineering/phishing simulations never conducted; control room operators have not received ICS-specific security training; TSA Cybersecurity Coordinator (Webb) has no formal security certification |
| Physical Security | HQ has card access and partial CCTV; remote compressor stations have perimeter fencing; M&R stations are padlock-only | Partial | Fourteen M&R and valve sites have only padlock security with no CCTV, no intrusion alarm, and no visitor log; no formal policy for escorting vendor personnel to OT equipment rooms |
| Configuration Management | IT change management policy exists (informal); no OT change management; PLC/RTU configurations not baselined | Missing | No formal OT change management process; firmware updates on PLCs and RTUs performed on an ad-hoc basis; no configuration backup or version control for OT devices; no integrity monitoring for OT configurations |
| Vendor | Service Provided | Access Level | Risk Rating | Notes / Gaps |
|---|---|---|---|---|
| Emerson Automation Solutions | Ovation SCADA application support, configuration changes, software updates | Remote VPN — SCADA Full Admin | HIGH | No MFA; sessions not recorded; access not time-limited; shared credential used by multiple Emerson engineers |
| Permian Basin Managed IT (PBMIT) | IT managed services — helpdesk, server monitoring, patch management support | Remote VPN — Domain Admin (AD) | HIGH | MSP holds full domain admin; contract does not specify security requirements; last security review of MSP: never; MSP accesses SCADA application server (SRV-002) indirectly via domain admin |
| Allen-Bradley / Rockwell Automation | PLC firmware updates, Studio 5000 configuration support | Onsite + USB Media | MEDIUM | Firmware updates delivered via USB thumb drives without hash verification; no malware scan on removable media before OT use |
| SAP Business One Partner (TexasBiz ERP LLC) | SAP B1 ERP support, quarterly updates and customizations | Remote VPN — SRV-006 Admin (quarterly) | MEDIUM | Remote access quarterly; no MFA; session not recorded; vendor personnel turnover not communicated to LSML; same credentials since 2021 |
| Halliburton (Field Inspection Contractor) | Pipeline integrity inspections, in-line inspection tool runs, hydrostatic testing | Physical Site Access (escorted) | LOW | Physical access only; no IT/OT system access; badge access issued for duration of project; escorted at all sites |
| AT&T / Lumen Technologies | MPLS network, T1 leased lines to field sites, internet connectivity | Physical Infrastructure — Carrier Access | MEDIUM | LSML does not encrypt traffic on internal T1/MPLS circuits; telecom provider access to network infrastructure not reviewed; no redundant carrier for critical pipeline sites |
| PHMSA / TSA Inspector Access | Regulatory compliance audits — pipeline integrity and cybersecurity inspections | Read-Only Historian Data Access (on-site) | REGULATORY | Inspectors granted temporary read-only access to OSIsoft PI historian during audits; no formal process for provisioning and deprovisioning temporary regulatory access accounts |
LSML maintains a partial IT asset inventory in spreadsheets and has begun tracking OT assets, earning the highest relative score. However, OT configuration baselines and change management for field devices are absent.
Qualys scanner deployed on IT network provides some vulnerability visibility, but OT assets are entirely excluded. No threat intelligence program exists and no OT-specific vulnerability sources are monitored.
No formal cyber risk assessment or risk register exists. Physical pipeline integrity risk is well-managed under PHMSA requirements, but cybersecurity risk is not systematically identified, evaluated, or documented.
Active Directory provides basic IT identity management. SCADA HMI and VPN access lack MFA, and OT identities are locally managed outside AD. Former employee accounts have not been fully deprovisioned.
No SIEM, no OT network monitoring, and no centralized log management. Windows event logs are collected locally but not aggregated or analyzed. OT network activity is completely invisible from a cybersecurity perspective.
A draft IRP exists but has never been tested and contains no OT-specific content. No tabletop exercises have been conducted. TSA SD-02C 24-hour incident reporting requirements are not proceduralized. Service continuity plans do not address cyber scenarios.
No third-party risk management program exists. Critical vendors (Emerson, MSP) hold administrative access without MFA, session recording, access time limits, or annual review. No vendor security requirements in contracts.
Background checks are performed for new hires and annual safety training is mandatory, but no cybersecurity awareness training program exists. Control room operators have not received ICS security training. The TSA Cybersecurity Coordinator has no security certification.
A partial IT/OT segmentation boundary exists at HQ but is bypassed by WS-005 (dual-homed engineering workstation). Remote sites have no network boundary. Unmanaged switches at field sites create blind spots. SNMP community string "public" is widely deployed.
No formal cybersecurity program exists. The TSA CIP was filed to meet regulatory requirements but lacks executive sponsorship, budget allocation, or a structured roadmap. Cybersecurity is treated as an IT function rather than an enterprise risk management priority.
Cybersecurity Capability Maturity Model (C2M2) Program
Developed by the U.S. Department of Energy (DOE) Office of Cybersecurity, Energy Security, and Emergency Response (CESER)
C2M2 Version 2.1 | Training Case Study — Lone Star Midstream LLC (LSML)
All case study organizations, personnel, and data are entirely fictional and for educational use only.