What is URL Filtering?
URL Filtering is a security measure in which access to websites is controlled based on their URL, domain or category. It enables organisations to block unwanted, unsafe or unnecessary web requests.
In OT environments, URL Filtering prevents systems such as Engineering Stations, HMIs or Jump Servers from connecting to malicious or unauthorised web sources.
🧠 Why is URL Filtering important in OT?
| Risk without filtering | Possible consequence |
|---|---|
| Access to malware-hosting sites | Drive-by download or phishing |
| Visits to unauthorised cloud services | Data exfiltration, shadow IT |
| Unintended click on a phishing link | Stolen credentials or session tokens |
| Automatic updates from unsafe sources | Supply chain risk, installation of unverified software |
In OT systems that sometimes have (temporary) access to the internet or cloud, web traffic is an underestimated attack vector.
🔍 What can you filter on?
| Filter type | Examples |
|---|---|
| Category | Social media, file sharing, hacking tools, adult |
| Domain name | example.com, vendor-support.com |
| Subdomain | updates.vendor.com, malicious.attacker.org |
| URL path | /download/firmware.exe, /scripts/backdoor.js |
| Geolocation (optional) | Domains from high-risk regions (e.g. Russia, North Korea) |
| Time-based | Access only during a maintenance window |
🛠️ Application in OT networks
| Location | Application |
|---|---|
| Jump Server | Filter all outbound traffic to the internet |
| Engineering Station | Block access to everything except whitelisted vendor portals |
| Proxy server | Centrally enforce filtering rules |
| Firewall or NGFW | URL Filtering as part of deep packet inspection |
🔐 Combination with other security measures
| Combined with | Result |
|---|---|
| DNS Monitoring | Domain-name and URL-path control |
| Anomaly detection | Detect unusual browsing behaviour on OT systems |
| Security Awareness | Support safe browsing through policy and training |
| Application Whitelisting | Combine network and local application control |
✅ Best practices
- Use a URL whitelist for OT: only access to trusted vendor, support or update portals
- Block all other categories by default (default-deny)
- Periodically review for false positives/negatives
- Forward alerts to your SIEM or SOC
- Make sure that temporary internet connections (e.g. for maintenance) also pass through filtering
📌 In summary
URL Filtering protects OT systems against uncontrolled web traffic and is essential when systems have access to external resources. Combined with DNS Monitoring and Application Control, it provides a strong layer of defence.
