Summary
Application security will not be an easy task, especially for ICS owners. The sensitivity of the equipment to probing and testing, the stringent uptime requirements, and the unique applications that make up the ICS network make it an almost impossible task. Tackling security early on in the application life cycle will help secure your ICS by discovering vulnerabilities at a more convenient time and under better conditions, making it possible to address them with relative ease.
This finishes our discussion on ICS application security. In the next chapter, we will look at securing the devices found on an ICS network.
Â
Â
Â