Categorizing ICS systems and network assets

The information security team should define, inventory, and categorize the applications and computer systems within the ICS as well as the networks within and interfacing with the ICS. The focus should be on systems rather than just devices, and should include PLCs, DCS, SCADA, and instrument-based systems that use a monitoring device such as an HMI. Assets that use a routable protocol or are dial-up accessible should be documented. The team should review and update the ICS asset list annually and after each asset addition or removal.

There are several commercial enterprise IT inventory tools that can identify and document all hardware and software resident on a network. Care must be taken before ...

Get Industrial Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.