General Considerations for Security
- Last UpdatedMar 24, 2020
- 1 minute read
Before you review the information in this section, it is recommended that you go through the following checklist to ensure you plan to cover the security areas that apply to your ICS and organization.
|
Security Area |
Reference Section |
|---|---|
|
Physical and virtual access to the host |
General Guidelines for Securing the Host |
|
Latest Windows patches applied |
Windows Updates |
|
Protecting the host from viruses and malware |
Scanning the Host |
|
Access to content on the host |
Protecting the Applications and Content on the Host |
|
Securing your network |
Securing the Network |
|
Configuring services and ports |
Managing Network Services and Ports |
|
Securing client/server communication |
Securing Communication between the Client and Server |
|
User and group management |
Securing Systems through Authentication and Authorization |
|
Planning for emergencies |
Contingency Planning |
For a list of security feature help topics refer to the table at the end of this section.