General Considerations for ICS Security
- Last UpdatedOct 14, 2022
- 1 minute read
This chapter provides general security recommendations for Industrial Control Systems (ICS) in AVEVA.
To learn how to deploy your AVEVA software product as an Industrial Control Systems, see Introduction.
Securing your network
|
Using wired or wireless networks |
|
|
Configuring services and network ports |
|
|
Isolating your ICS network |
|
|
Apply regular software updates |
Securing the Host
|
Securing the Host |
|
|
Physical and virtual access to the host |
|
|
Securing client/server communication |
|
|
Protecting the host from viruses and malware |
|
|
Access to content on the Host |
|
|
Latest Windows patches applied |
User Authentication
|
User Authentication |
|
|
Authentication and Authorization |
|
|
Using Windows to manage users |
|
|
Using the ICS application to manage users |
Planning for Emergencies
|
Contingency Planning |
|
|
Develop a Disaster Plan |
|
|
Develop Business Continuity Plans |
|
|
Implement auditing and logging |
|
|
Conclusion |