Device security involves the actions and security controls concerning the AIC triad of ICS devices, where AIC stands for availability, integrity, and confidentiality. The acronym was deliberately turned around in order to reflect the priorities of the ICS environment. For regular IT systems and networks, the order of the security triad is CIA, or confidentiality, integrity, and availability, but in the context of an ICS, availability comes before the others as uptime (availability) is the number one goal in production and has the greatest impact on profitability.
Device security includes device patching, device hardening, physical ...