OT cybersecurity areas of concern
In addition to the preceding list, Figure A.6 provides a short list of some of the pillars of cybersecurity by type. These can be considered capabilities of a fully functional DMZ, as discussed earlier. Factory personnel use applications deployed within the OT network or factory network almost exclusively for viewing, gathering or controlling data. The ability to update and access those applications securely is critical.
Figure A.6 – Major pillars of OT cybersecurity
Network and equipment monitoring is another area where capabilities can be added. The ability to continuously monitor threats to the system can provide some initial protection you may not already have.
Finally, the management of the network and environment should be considered. How are firewall rules checked and changed? What processes are in place for incident response? Is there a Disaster Recovery (DR) plan in place?
Figure A.6 can act as a...