Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

Cybersecurity Deployment Guide - Security Concepts

Cloud-based ICS software

  • Last UpdatedFeb 18, 2025
  • 1 minute read

While hosting ICS software on the Cloud provides several benefits such as flexibility, scalability and availability, it is also vulnerable to security risks such as susceptibility to hacking resulting in damage to your organization's reputation. It is important to implement a security strategy before you make your ICS software accessible on the Cloud. For securing ICS software on the Cloud, consider the following:

  • Secure access points by putting in place authentication, monitoring, and support mechanisms.

  • Implement cloud-based, centralized security measures including encrypting communications using TLS.

    Note: It is recommended that you review the NIST Cybersecurity Framework for additional information.

Related Links
TitleResults for “How to create a CRG?”Also Available in