Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Plant SCADA

Conclusion

  • Last UpdatedJul 19, 2024
  • 1 minute read

Security lapses present a serious threat to ICS software and infrastructure. Therefore, it is important for every organization to:

  • Be proactive about preventing security lapses

  • Identify potential lapses

  • Detect them in a timely manner when they occur

  • Address lapses to ensure minimum disruption and maximum availability

To this end:

  • Computers and networks must be secured

  • Users and groups must be authenticated and authorized

  • Contingency plans must be in place to recover from untoward or intentional events

Refer to the document "Guide to Industrial Control Systems (ICS) Security" [NIST Special Publication 800-82 Revision 2](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf) for additional details and recommendations.

TitleResults for “How to create a CRG?”Also Available in