What is ICS Security?

Photo by American Public Power Association on Unsplash

What is ICS security?

  • Asset inventory and detection
  • Vulnerability management
  • Network intrusion protection and detection
  • Endpoint detection and response
  • Patch management
  • User and access management
  • The type of devices protected are often sensitive to unintended changes or interaction, including a whole new class of OT assets known as embedded equipment, and are typically much older than IT systems.
  • Risks are not only to information confidentiality but especially to the availability and integrity of the process or safety to personnel and property.
  • The remediation of risks requires different techniques because of the differences in types of devices.

Why do we need ICS security?

How do we achieve ICS security?

Establish an objective and design an ICS security program

Bring IT and OT together to develop an ICS security solution that works for both

Leverage a security platform, rather than a series of individual tools

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Verve Industrial Protection

Verve Industrial Protection

Verve's mission is to protect the world's critical infrastructure. Learn more at verveindustrial.com