What is a Rogue Device?

A rogue device is an unauthorised or unknown device that connects to a network without approval or proper configuration. It can be a deliberately placed malicious component (an attack), but also an unintentionally connected laptop, Sensor, Switch or wireless access point.

In OT networks, rogue devices pose a serious risk, because they can directly affect the reliability, availability and safety of industrial systems.


🧠 Examples of rogue devices in OT

Device Risk
Unauthorised laptop Malware infection, ARP spoofing, network scans
Unmanaged unmanaged switch Open access to multiple networks, lack of visibility
Misconfigured sensor Disrupted measurements, faulty process actions
Personal Wi-Fi router Open back door, bypassing network segmentation
Dev board (e.g. Raspberry Pi) Covert packet capture or bridge to the internet

🔐 Why are rogue devices dangerous?

  1. No asset management – they are not recognised by Asset Inventory systems
  2. No policies – no updates, no logging, no access limits
  3. Possible malware – malware can spread invisibly or eavesdrop
  4. Bypassing security – they can connect networks or zones without control
  5. Can be added unintentionally – for instance, by suppliers or maintenance crews

🔍 How do you detect rogue devices?

Method Explanation
Asset Discovery Regularly scan the network and compare with known devices
MAC Binding and Port Security Only approved devices may connect
Network Access Control (NAC) Assess devices before granting network access
IDS / anomaly detection Detection of unusual behaviour, new devices or scan traffic
SNMP monitoring Switches report active MAC addresses per port

Implementing a Zero Trust Architecture helps limit the impact of rogue devices.


✅ Controls

Measure Effect
Whitelisting MAC addresses Only known devices can connect
802.1X authentication Access only after device or user verification
Segmentation via VLAN Isolate new/unknown devices
Switch configuration Limit active ports and detect new MACs
Physical access control Prevent unauthorised access to switchgear or ports
Supplier management Guidelines for maintenance crews on what they may and may not connect

📌 In summary

Rogue devices are invisible intruders in OT networks — placed deliberately or accidentally — that endanger the reliability and safety of industrial processes.

It is essential to maintain visibility of all connected devices and to restrict network access by default to known, authenticated components.