Defining and inventorying the ICS assets

"Strategize and prioritize mitigation efforts by assessing systems, then inventorying assets."

This program development activity involves assessing production systems, then categorizing them by criticality, value, and sensitivity. With this characterizing information we can prioritize systems, which helps us spend our security budget wisely. Next, the assets within the systems are identified and inventoried. The result of this activity will be a prioritized list of assets (IP addresses) that will be used in an upcoming security program development activity, the initial risk assessment. For more details on performing this activity, refer to chapter 4 -Industrial Control System Risk Assessments, Step ...

Get Industrial Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.