Once the right ICS equipment or devices are purchased, they should be configured and installed with security in mind. Some considerations for this phase of the device life cycle include the following:
- Configuration management:
- Define standard configuration templates that are tested and proven to work and best secure the ICS devices they are developed for. These templates will function as the starting point for configuring additional devices of the same type.
- If deviations from the template are necessary to accommodate the installation of the device or the environment it is ...