Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ Production Management

Conclusion

  • Last UpdatedOct 30, 2024
  • 1 minute read

Security lapses present a serious threat to ICS software and infrastructure. Therefore, it is important for every organization to:

  • Be proactive about preventing security lapses.

  • Identify potential lapses.

  • Detect them in a timely manner when they occur.

  • Address lapses to ensure minimum disruption and maximum availability.

To this end:

  • Computers and networks must be secured.

  • Users and groups must be authenticated and authorized.

  • Contingency plans must be in place to recover from untoward or intentional events.

Refer to the document Guide to Industrial Control Systems (ICS) Security [NIST Special Publication 800-82 Revision 2] (https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf) for additional details and recommendations.

TitleResults for “How to create a CRG?”Also Available in