Results 1 to 2 of 2

Thread: ICS

  1. #1
    Junior Member
    Join Date
    May 2018

    Post ICS

    What is the best way to protect ICS using Defense in Depth?

  2. #2
    Junior Member
    Join Date
    Nov 2018
    There are some steps to be done to start the Defense in Depth:
    1- you need to know your assets and their importance and impact on business services / processes, you may need to conduct both BIA and RA.
    2- Create architecture overview
    3- Decompose the application
    4- Identify the threats
    5- Document and rate the threats
    6- implement the suitable controls

    examples of strategies to protect ICS:
    1- white-listing applications
    2- Proper configuration and patch management
    3- manage authentication
    4- Assure proper monitoring and response

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts