X

Ultra Electronics 3eTi

Authentication & Remote Access: Don’t Trust, Verify

December 13th, 2016 / By

The Department of Homeland Security (DHS) recently released guidance listing tactics to reliably protect ICS. The DHS paper, Seven Steps to Effectively Defend Industrial Control Systems, highlights the increasing frequency of successful intrusions into US critical infrastructure systems. It also provides cost-effective strategies that, if followed, will raise the security posture of the entire industry. View our four-part webinar series, where we discussed solutions for implementing the recommended actions to ensure a secure baseline on which to build efficient and resilient control systems.

Part 3 of 4: Protocols used in ICS environments generally lack inadequate network service authentication. Operators must use only validated cryptographic technology and flexible monitoring modes.

View recording >