Navigation and service

Recommendations for ICS Operators

Industrial Control System Security: Top 10 Threats and Countermeasures

This document provides an overview of the primary threats to industrial systems and presents possible countermeasures. It is particularly suitable as a basis for discussions related to industrial control system security.

Monitoring and Anomaly Detection in Production Networks v1.0

Today’s modern production networks feature a topology comparable to conventional IT networks and increasingly use protocols that are also based on TCP/IP. These protocols are addressed not only by intelligent control devices; sensors and actuators are using them to communicate more and more often, as well. The sheer number of such components and the connections among them are resulting in networks of ever greater complexity.

This cyber security recommendation explains the basic principles of monitoring and anomaly detection and also offers assistance in selecting related products.

Remote maintenance in industrial environments

The solutions available on the market for remote maintenance in industrial environments range from VPN solutions and cloud-based approaches to provider solutions in the machine-to-machine (M2M) realm. In line with the current state of technology, this recommendation provides an overview of the generic requirements for industrial remote maintenance and serves as a basis for discussing more in-depth recommendations.

Industrial Control System Security: insiders

Insiders pose a particular challenge, especially in the area of industrial systems. This document reveals possible threats and provides an overview of possible security measures.

Security of IP-based surveillance cameras

Network-compatible surveillance or web cameras pose a potential security risk as many other types of devices in the context of the Internet of Things (IoT). This is particularly due to the fact that the aspect of cyber security is a design objective which is not taken into account or is taken into account only secondarily when developing and operating these devices. Therefore, such cameras can become a security risk for the organisation’s own infrastructure as well as for third parties.

The objective of this document is to give an overview of the fundamental best practices regarding the secure operation of these cameras in the business environment.