Summary

Application security will not be an easy task, especially for ICS owners. The sensitivity of the equipment to probing and testing, the stringent uptime requirements, and the unique applications that make up the ICS network make it an almost impossible task. Tackling security early on in the application life cycle will help secure your ICS by discovering vulnerabilities at a more convenient time and under better conditions, making it possible to address them with relative ease.

This finishes our discussion on ICS application security. In the next chapter, we will look at securing the devices found on an ICS network.

Get Industrial Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.