Recommended actions to secure the network
- Last UpdatedFeb 18, 2025
- 4 minute read
|
Network Component |
Recommended Action |
Notes |
|---|---|---|
|
Type of connection |
Decide how the host will connect to the network. Network connectivity has trended in recent years away from wired "Ethernet" networks to wireless "Wi-Fi" networks for both business and industrial uses. |
We recommend against using Wi-Fi for your ICS network. You do not have physical control over who or what might access the network. An intruder can intercept even a reasonably secure network and analyze network traffic and potentially discover a vulnerability. If you decide to use Wi-Fi for your ICS network, enable all access control features on the WAP including encryption (WPA/WPA2 or later methods), a strong password and a list of authorized MAC addresses. Do not try to "hide" the Wi-Fi network by disabling broadcast of the Service Set Identifier (SSID). Doing so requires users to perform additional operations to locate the network then enter the SSID and security credentials. This extra network traffic offers opportunities for interception and analysis. |
|
Network structure |
Segment the ICS network. The network can be either physically or logically segmented from your other corporate networks. A physically segmented network is the most secure. Network hardware and all computers and devices connected to it form a single closed network with no physical connection to any other network A logically segmented network is physically connected to your other corporate networks or to the public internet. We strongly advise against connecting to the public internet other than a trusted, secure ecosystem provided by your ICS software vendor. See the diagram following this table for an example of a segmented network. |
Methods to segment the network include:
|
|
Network services and ports |
Use firewalls to control traffic through network services and ports. Identify services and ports on your network and configure firewalls. The topology diagram following this table provides an example of using firewalls to segment the network. |
The documentation for your ICS software typically includes a list of network ports commonly used by the software. Given the nature of ICS, the list typically includes services like web, email, file transfer, external databases, device drivers, and the ICS software itself for server-client communications. Configure the firewalls to open only those network ports that are in use by your ICS. Disable all unused services and close all unused ports. |
|
Client/Server communication |
Encrypt client/server channels. Use the latest Transport Layer Security (TLS) standard. You can still use the Secure Sockets Layer (SSL) standard for older applications. |
TLS and SSL use a system of certificates and keys to digitally sign the messages sent between the server and client. When you configure this sort of communication, you need to use one of the following:
|
The following diagram is an example of a segmented network topology:

Note: In no case should your ICS network and devices be directly accessible from the public internet. If there is some part of your ICS that you want to be accessible, (for example, if you want to view web-enabled HMI screens from a browser or smart phone), your ICS software should include features that securely pass the necessary traffic between your ICS network and a public-facing server. Such features can include separate public and private subnets, private IP addresses, security groups, authentication protocols, user identity managers, gateways, custom route tables, Access Control Lists (ACLs), and others.