ICS-CERT suggests that asset owners simply just simply take protective measures by leveraging guidelines to reduce the chance from comparable malicious cyber activity.

ICS-CERT suggests that asset owners simply just simply take protective measures by leveraging guidelines to reduce the chance from comparable malicious cyber activity.

Application Whitelisting (AWL) can identify and give a wide berth to attempted execution of malware uploaded by harmful actors. The fixed nature of some systems, such as for instance database servers and HMI computer systems, make these ideal applicants to operate AWL. Operators ought to use their vendors to baseline and calibrate AWL deployments. A

Businesses should separate ICS companies from any untrusted systems, particularly the online. All unused ports should be locked down and all sorts of unused solutions switched off. If a definite company requirement or control function exists, only allow connectivity that is real-time outside systems. Continue reading “ICS-CERT suggests that asset owners simply just simply take protective measures by leveraging guidelines to reduce the chance from comparable malicious cyber activity.”