ICS device security considerations during the installation phase

Once the right ICS equipment or devices are purchased, they should be configured and installed with security in mind. Some considerations for this phase of the device life cycle include the following:

  • Configuration management:
    • Define standard configuration templates that are tested and proven to work and best secure the ICS devices they are developed for. These templates will function as the starting point for configuring additional devices of the same type.
    • If deviations from the template are necessary to accommodate the installation of the device or the environment it is ...

Get Industrial Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.