Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

Cybersecurity Deployment Guide - Security Concepts

Secure the host

  • Last UpdatedFeb 18, 2025
  • 1 minute read

Given the sensitive nature of industrial controls, it is important to secure not only the ICS software, but also:

  • the host on which the ICS software runs

  • the network to which the ICS software is connected

  • the hardware used for the ICS software

    Note: The "host" is the Windows computer or Windows Embedded device on which your ICS software is installed and running.

There are several factors to consider for securing the host including:

  • Access to the host

  • Keeping track of and applying the latest operating system (Windows, Linux, mobile device) updates

  • Keeping the host computer free of viruses and malware

  • Protecting the applications and content on the host

Each of these factors is covered in the following sections.

TitleResults for “How to create a CRG?”Also Available in