Secure the host
- Last UpdatedJul 19, 2024
- 1 minute read
Given the sensitive nature of industrial control, it is important to secure not only the ICS software, but also:
-
the host on which it runs
-
the network to which it is connected
-
the hardware used for the ICS software.
Note: The "host" is the Windows computer or Windows Embedded device on which your ICS software is installed and running.
There are several factors to consider for securing the host including:
-
Access to the host
-
Keeping track of and applying the latest Windows updates
-
Keeping the host computer free of viruses and malware
-
Protecting the applications and content on the host
Each of these factors is covered in the sections below.