Secure the host
- Last UpdatedFeb 18, 2025
- 1 minute read
Given the sensitive nature of industrial controls, it is important to secure not only the ICS software, but also:
-
the host on which the ICS software runs
-
the network to which the ICS software is connected
-
the hardware used for the ICS software
Note: The "host" is the Windows computer or Windows Embedded device on which your ICS software is installed and running.
There are several factors to consider for securing the host including:
-
Access to the host
-
Keeping track of and applying the latest operating system (Windows, Linux, mobile device) updates
-
Keeping the host computer free of viruses and malware
-
Protecting the applications and content on the host
Each of these factors is covered in the following sections.