Securing the Host
- Last UpdatedSep 05, 2024
- 1 minute read
Securing host computers and hardware
Given the sensitive nature of industrial control, it is important to secure not only the ICS software, but also:
-
The host on which it runs.
-
The network to which it is connected.
-
The hardware used for the ICS software.
Note: The "host" is the Windows computer or Windows Embedded device on which your ICS software is installed and running.
There are several factors to consider for securing the host including:
-
Access to the host.
-
Keeping track of and applying the latest Windows updates.
-
Keeping the host computer free of viruses and malware.
-
Protecting the applications and content on the host.
Each of these factors is covered in the topics below.