OT cyber incident reports

Identifies documents containing references to ot cyber incident reports in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations.

Type
regex
Engine
boost_regex
Confidence
medium
Confidence justification
structural regex with domain-specific anchors and constrained context replaces phrase-only marker. Added context gating and exclusion rules improve precision and reduce incidental matches.
Detection quality
Mixed
Jurisdictions
global
Regulations
AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth)
Frameworks
ISO 27001, ISO 27701
Data categories
pii
Scope
wide
Platform compatibility
Purview: Compatible, GCP DLP: Compatible, Macie: Compatible, Zscaler: Compatible, Palo Alto: Degraded, Netskope: Unsupported

Pattern

(?is)\b(?:ot\s+cyber\s+incident\s+reports|OT\s+cyber\s+incident|ICS\s+incident|industrial\s+cyber|incident\s+report|threat\s+actor|indicators\s+of\s+compromise|critical\s+infrastructure|incident\s+response)\b

Corroborative evidence keywords

ot cyber incident reports, cyber, incident, reports, critical, infrastructure, systems, SCADA, PLC, DCS, HMI, Modbus, Modbus TCP, Modbus RTU, DNP3, OPC-UA, OPC Classic, IEC 61850, IEC 60870, IEC 60870-5-104 (+38 more)

Proximity: 300 characters

Should match

Should not match

Known false positives

References