Passing the Audit, Failing the Attack Path Test
Compliance frameworks confirm your controls are documented. Shadow currents don't care about documentation.
Passing an audit isn't the same as stopping an attack.
The Lights Went Out Through Controls That Passed
On Dec. 23, 2015, a Ukrainian electric utility passed every relevant security check it faced. Its VPN access controls were in place. Its perimeter defenses were documented. Operators used legitimate credentials to connect to SCADA systems, just as designed.
That's exactly how the lights went out for approximately 225,000 customers.
Attackers didn't break the controls. They flowed through them. According to CISA's advisory on the incident, malicious operators used stolen but legitimate credentials through existing VPN connections to manipulate industrial control systems remotely. The attack path ran straight through infrastructure that any compliance audit would have checked and approved.
This is what compliance frameworks can't catch: shadow currents flowing through controls that exist and are documented but never tested against actual attack paths.
What Compliance Frameworks Actually Measure
The major frameworks governing industrial cybersecurity have a common design. NERC CIP checks that electric utilities have documented Electronic Security Perimeters, access controls and physical security measures. IEC 62443 verifies that industrial control systems have the security properties their design specifies. NIST CSF confirms organizations can identify, protect, detect, respond and recover. ISO 27001 validates information security management practices.
What none of them require is proof that those controls stop a real attack from reaching critical systems.
As Dragos notes, compliance frameworks are "detailed guidelines for implementing controls" rather than validated proof that attack paths are blocked. Auditors confirm controls exist and are documented. They don't test whether the shadow current can still find its way through.
That design flaw created a glaring gap in the electric sector that persisted for decades. NERC CIP required perimeter security from its earliest versions. But it contained no mandatory requirement for monitoring internal east-west traffic until CIP-015-1 was approved in 2025. Regulated entities have until October 2028 to implement it.
East-west traffic is exactly how attack paths travel after breaching a perimeter. Lateral movement, the technique attackers use to expand access from an initial foothold, flows east-west through internal networks. For years, utilities could be fully NERC CIP compliant while having zero mandatory requirement to monitor the traffic patterns that indicate a shadow current is moving toward critical assets. FERC's Order 887, which directed NERC to develop the standard, found the CIP-networked environment remained vulnerable to attacks bypassing perimeter-based controls.
Decades of compliance. Zero requirement to watch what happened inside.
The False Confidence Problem
ISACA has documented what it calls the "compliant yet breached" phenomenon extensively. Target, FedEx, Staples and others held compliance certifications and suffered major breaches. A Fortune 500 breach victim described the dynamic precisely: "The hackers focused on overcoming our security controls while the security and compliance teams were measuring our security in terms of adherence with formal compliance certification."
Two teams. Two completely different definitions of security.
The data reinforces how widespread this gap is. According to Gartner's 2025 research, only 37% of compliance leaders feel fully confident in their ability to assess the effectiveness of their own compliance programs. Most compliance teams don't actually know if their programs work against real attack paths. They know documentation is complete. That's not the same thing.
SANS 2025 research on ICS/OT environments offers an important nuance: regulated sites report the same number of incidents as unregulated ones but show roughly 50% fewer operational impacts. Compliance isn't worthless. It reduces damage. But it doesn't stop shadow currents from flowing in the first place.
Compliance Is Reactive by Design
The Colonial Pipeline attack in May 2021 illustrates another dimension of the compliance-security gap. The 5,500-mile pipeline carrying roughly 45% of East Coast fuel had no mandatory cybersecurity requirements at all. Prior to the attack, the Transportation Security Administration had issued only voluntary guidelines for pipeline operators. Only the electric grid operated under mandatory compliance requirements.
Attackers used compromised VPN credentials to access Colonial's IT network, then pivoted toward OT-adjacent systems. The pipeline operator shut down operations preemptively rather than risk physical damage. Colonial paid a $4.4 million ransom.
Days after the attack, TSA issued mandatory Security Directive Pipeline-2021-01.
This is how compliance frameworks develop: reactively, after attacks demonstrate where gaps exist. The frameworks that industrial organizations comply with today were shaped by incidents that already happened. The shadow currents flowing through your environment right now don't wait for the next regulatory update.
As we traced in our earlier post on the email-to-outage attack path, every step of that incident, from phishing email through IT compromise to OT impact, could have existed inside a fully compliant environment. Compliance checked whether controls were documented. The attack path flowed through the spaces between them.
The Attack Paths No Compliance Framework Monitors
The compliance-security gap isn't just about incomplete frameworks. It's structural. Compliance measures point-in-time status. A FireMon analysis captures the problem: "Networks aren't static. Firewalls get updated, rules change, new cloud instances spin up daily. What was compliant yesterday could be out of alignment today. Between audits, you're flying blind."
Attack paths don't operate on audit schedules. Shadow currents flow continuously, adapting to whatever conditions exist in your environment right now. A penetration test conducted last November tells you almost nothing about your exposure in January.
There's also the cross-domain visibility problem. NERC CIP audits Electronic Security Perimeters. IEC 62443 audits industrial automation and control systems. Neither framework requires mapping or monitoring the attack paths that cross from IT networks into OT. Yet according to SANS 2025 research, 58% of ICS/OT incidents had IT compromise as the initial attack vector.
The attack path starts where compliance doesn't look.
And attackers know it. According to Forescout's annual Threat Roundup research, more than 70% of actively exploited vulnerabilities do not appear in CISA's Known Exploited Vulnerabilities catalog, leaving organizations without official guidance on most threats attackers are actively using.
Compliance Is Table Stakes, Not a Finish Line
None of this means compliance is wrong. NERC CIP, IEC 62443, NIST CSF and comparable frameworks establish security foundations that matter. Compliant organizations do demonstrate fewer operational impacts when incidents occur. The governance discipline compliance requires has genuine value.
But passing an audit isn't the same as stopping an attack.
Shadow currents don't respect documentation. They find the paths that compliant controls don't monitor, cross the boundaries that compliance frameworks don't scope and flow through legitimate channels that auditors check off as functional. The Ukraine attack flowed through a working VPN. The Colonial attack used credentials that worked exactly as designed.
The real question isn't whether your controls are documented. It's whether your controls actually block the paths attackers would use.
That means continuous validation instead of annual audits, cross-domain visibility into how paths flow from IT into OT, and testing controls against actual attack behavior rather than simply verifying they exist. As Shieldworkz notes in their 2026 OT security guidance, organizations should use Breach and Attack Simulation tools designed for OT to validate that controls actually work.
Compliance creates documentation. Shadow currents create risk. You need both, but they're not the same thing.
If compliance audits don't catch shadow currents, organizations often turn to penetration testing for validation. Pen tests simulate attacks, find vulnerabilities and test defenses. But do they map shadow currents? Not usually. That's where we'll look next.
Your Controls Are Documented. Are They Actually Blocking the Attack Path?
⚠️ 37% of Compliance Leaders Are Confident Their Programs Work. 58% of OT Incidents Start in IT. Both Numbers Are About the Same Gap.
Compliance audits confirm that controls are documented and present. They don't confirm that those controls block actual attack paths. Shadow currents flow through compliant environments every day.
Five Things Compliance Frameworks Don't Catch
Click each card to see the specific gap
East-West Traffic
Lateral movement after a perimeter breach
NERC CIP required perimeter security for decades with no mandatory east-west monitoring until 2025. Attackers use lateral movement to expand from initial footholds. Utilities could be fully compliant while having zero visibility into traffic that indicates a shadow current moving toward critical assets.
IT-to-OT Cross-Domain Paths
The paths that cross framework boundaries
NERC CIP audits your Electronic Security Perimeter. IEC 62443 audits your industrial control systems. Neither requires mapping the attack paths that cross from IT into OT. Yet 58% of ICS incidents start in IT. The attack path begins where compliance doesn't look.
Point-in-Time Snapshots
Audits capture a moment. Attacks are continuous.
Networks aren't static. Firewalls get updated, rules change, new cloud instances spin up daily. What was compliant yesterday could be out of alignment today. A penetration test conducted in November tells you almost nothing about your exposure in January. Shadow currents flow continuously.
Most Exploited Vulnerabilities
70%+ of active exploits have no compliance guidance
Over 70% of actively exploited vulnerabilities do not appear in CISA's Known Exploited Vulnerabilities catalog. Compliance frameworks reference official guidance. Attackers don't wait for official guidance. Organizations following only cataloged vulnerabilities are blind to the majority of active threats.
Control Existence vs. Control Effectiveness
Documented is not the same as blocking
Auditors confirm controls exist and are documented. They don't test whether those controls block a real attack from reaching critical systems. The Ukraine 2015 attack used legitimate VPN credentials. The Colonial attack used valid access. Both flowed straight through controls that any auditor would have approved.
💡 Ukraine 2015: The Attack That Flowed Through Every Control
225,000 customers lost power through a VPN that worked exactly as designed
The Setup: On Dec. 23, 2015, Ukrainian electric utility operators were following documented procedures. VPN access controls were in place. Perimeter defenses were documented and functional. Legitimate credentials were in use. Every control that compliance would have checked was present.
The Attack Path: According to CISA's advisory on the incident, attackers had pre-positioned inside the network. They used stolen but legitimate VPN credentials to log into SCADA systems remotely, exactly as real operators do. Once inside, they issued commands to open breakers at multiple substations simultaneously while also overwriting firmware on serial-to-Ethernet converters to prevent operators from using remote controls to restore service.
Why Compliance Didn't Catch It: The attack used no malware visible to endpoint detection. The VPN connection was legitimate. The credentials were valid. The commands issued were ones the system was designed to accept. Every layer of documented control functioned as intended. The shadow current flowed directly through them.
The Broader Lesson: The Ukraine attack is the clearest example of why compliance frameworks can't be the endpoint for security validation. Documented controls existed. Auditors would have approved them. 225,000 people lost power anyway. The question compliance can't answer is: does this control actually stop the attack path?
⛽ Colonial Pipeline and the Reactive Compliance Cycle
$4.4M ransom, mandatory directives issued days after the attack
The Gap: The 5,500-mile Colonial Pipeline carried roughly 45% of East Coast fuel with no mandatory cybersecurity requirements. Prior to the May 2021 attack, TSA had issued only voluntary guidelines for pipeline operators. The electric grid had NERC CIP. Pipelines had suggestions.
The Attack: Attackers used compromised VPN credentials to access Colonial's IT network, then pivoted toward OT-adjacent systems. Colonial shut down the pipeline preemptively rather than risk physical damage to industrial equipment. The shutdown caused fuel shortages across the Southeast. Colonial paid a $4.4 million ransom.
The Response: Days after the attack, TSA issued mandatory Security Directive Pipeline-2021-01. The requirements that now govern pipeline cybersecurity were written in direct response to demonstrating that gaps existed. This is the compliance development cycle: attack occurs, gap is documented, framework is updated, organizations implement over years.
The Shadow Current Problem: The frameworks industrial organizations comply with today were shaped by incidents that already happened. The attack paths that exist in your environment right now don't wait for the regulatory response cycle. Compliance is always playing catch-up to attacker behavior.
🎯 Beyond Compliance: What Real Attack Path Validation Requires
Continuous validation, cross-domain visibility, testing against actual behavior
Continuous Validation Over Annual Audits: Networks change daily. Compliance snapshots taken once a year miss the configuration drift, new cloud instances and firewall rule changes that open or close attack paths between audits. Continuous validation tools that monitor control effectiveness in real time provide what point-in-time audits structurally cannot.
Cross-Domain Visibility: The attack path that starts in IT and ends in OT doesn't respect the boundaries between compliance frameworks. Organizations need visibility that spans both domains, tracking how a shadow current moves from a phishing email in a corporate mailbox to a control network, across the exact gap that neither NERC CIP nor IEC 62443 scopes.
Breach and Attack Simulation for OT: Shieldworkz's 2026 OT security guidance recommends using Breach and Attack Simulation tools specifically designed for OT environments to validate that controls actually work. The question isn't "is the firewall rule documented?" It's "does the firewall rule stop an attacker moving from IT to OT along this specific path?"
Red Team Assessment of the Full Attack Chain: A red team assessment scoped to include cloud management planes, IT-OT boundary crossing and legitimate credential abuse tests the exact attack paths compliance frameworks don't monitor. Ukraine and Colonial both used legitimate access that any audit would have approved. A red team tests whether that legitimate access can be weaponized against your specific environment.
Three Things Compliance Can't Tell You
Compliance Is Point-in-Time. Attacks Are Continuous.
Shadow currents adapt to whatever conditions exist right now. Annual audits capture a snapshot. The configuration drift, new cloud instances and rule changes that happen between audits are invisible to compliance, and visible to attackers who are watching continuously.
The Attack Path Starts Where Compliance Doesn't Look
58% of OT incidents begin in IT. Neither NERC CIP nor IEC 62443 requires mapping or monitoring the paths that cross from IT into OT. The most critical attack surface in industrial security sits in the gap between the frameworks designed to protect it.
Documentation Is Not Validation
The Ukraine attack used controls that worked as designed. Colonial's VPN credentials were valid. Compliance confirmed both environments had the right controls in place. Real validation tests whether those controls actually block the paths attackers would use, not just whether they exist on paper.
