General Considerations for ICS Security
- Last UpdatedAug 01, 2024
- 1 minute read
This chapter provides general recommendations for Industrial Control Systems (ICS) in AVEVA.
Securing your Network
|
Using wired or wireless networks |
|
|
Configuring services and network ports |
|
|
Isolating your ICS network |
|
|
Apply regular software updates |
Securing the Host
|
Securing the Host |
|
|
Physical and virtual access to the host |
|
|
Securing client/server communication |
|
|
Protecting the host from viruses and malware |
|
|
Access to content on the Host |
|
|
Latest Windows patches applied |
User Authentication
|
User Authentication |
|
|
Authentication and Authorization |
|
|
Using Windows to manage users |
|
|
Using the ICS application to manage users |
Planning for Emergencies
|
Contingency Planning |
|
|
Develop a Disaster Plan |
|
|
Develop Business Continuity Plans |
|
|
Implement auditing and logging |
|
|
Conclusion |