Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

AVEVA™ System Platform

Common control system security considerations

  • Last UpdatedAug 12, 2024
  • 1 minute read

When securing a control system, the number one criteria is defining and understanding the information/data that needs to be secured. In doing so, potential vulnerabilities are identified. The vulnerabilities may be the result of practices adopted primarily for convenience.

Once identified, vulnerabilities may be removed or altered to increase security with no impact on production operation performance. Areas of focus include:

  • Multiple remote access points.

  • Information queries that can be deferred or accessed though a DMZ/off control network, etc.

TitleResults for “How to create a CRG?”Also Available in