26 Mar 2019 Network Criticality – Industrial Visibility with disciplined control
Thoroughly-secured sites strictly differentiate control-critical from non-critical networks and protect the two classes of networks very differently. Such sites determine criticality by the potential business impacts of cyber attacks, analogous to how critical infrastructure standards evaluate potential societal impacts.
Secure sites deploy conventional IT Security (IT-SEC) techniques nearly universally, seeking to protect the information. These sites also apply Secure Operations Technology (SEC-OT) techniques to protect control-critical networks from information, more specifically from cyber attacks that may be embedded in information.
The difference between these approaches is called out most sharply at the IT/OT interface. Universal visibility into operations has great benefits, but only when accompanied by a strict discipline over control information entering critical networks – and there is always such control information.
Join us to explore how a sharp distinction between control-critical and non-critical networks can simplify and strengthen ICS/SCADA network security programs.
Latest posts by Waterfall Team (see all)
- Waterfall Security Solutions Expands Into New Industries - January 16, 2020
- Know more about your system than attackers do: Matt Gibson | Podcast Episode #26 - January 13, 2020
- Top 2019 cyber attacks on ICS (Infographic) - December 19, 2019