Saturday, June 25, 2022
  • USENIX Enigma 2022 – Ram Shankar Siva Kumar’s ‘Why Has Your Toaster Been Through More Security Testing Than The AI System’
  • XKCD ‘Roman Numerals’
  • USENIX Enigma 2022 – Chris Krebs’ ‘#Protect2020: An After Action Report’
  • A “whole-of-state” approach to cybersecurity
  • Hackers Are Still Exploiting Log4Shell Vulnerability, Warns CISA

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Events
    • Upcoming Events
    • Upcoming Webinars
    • On-Demand Events
    • On-Demand Webinars
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • Techstrong Group
    • Container Journal
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About Us

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Security Bloggers Network 

Home » Security Bloggers Network » Defense in Depth: 4 Essential Layers of ICS Security

SBN

Defense in Depth: 4 Essential Layers of ICS Security

by Dean Ferrando on October 14, 2018

Having been fortunate enough to work for a security company like Tripwire for a number of years, I’ve had the privilege to work with different teams in different verticals across the world. I am still amazed at how many organizations see security differently.

DevOps Connect:DevSecOps @ RSAC 2022

Some spend lots of time focusing on physical security, especially those with industrial control systems. Others are small one-man organizations that are worried about their personal data being stolen. And then there’s everything in between the two. The one great thing that I can say is that at least everyone is now talking more about security in some form.

Having dealt with all these different areas/verticals/geos, I’ve found that the end goal is usually the same for each entity, with the problem of understanding boiling down to language or some industry-specific phrasing.

A good example of that would be someone from the ICS world referring to their log management solution as the historian whereas someone in the commercial vertical knows it as a SIEM. Fundamentally, they do the same thing in gathering up all the activity or log data from devices to be forensically stored/analyzed at a later date.

Over the years, I have been trying to bridge the gap of industry jargon to try and explain that even though things might be known as something else does not mean it will provide a different function. The best way I have been able to overcome this is by using analogies.

Although there are a lot of areas that ‘security’ can play in from things like software, hardware or even physical access, below are four areas of security concerns that all organizations should maintain or at least adhere to (at a minimum).

1. Asset Management

This refers to the consistent management or awareness of devices within an organization (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Dean Ferrando. Read the original post at: https://www.tripwire.com/state-of-security/ics-security/defense-depth-layers-ics-security/

October 14, 2018October 14, 2018 Dean Ferrando _Change Management, continous monitoring, ICS, ICS Security, network segmentation, Security Hardening, Vulnerability Assesment
  • ← Placing More Importance on Data Security
  • NCSAM: Consider the Nexus Between your Personal and Professional Life on Social Media →

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Most Read on the Boulevard

Digital Value Chain Attacks on the Rise
Machine Learning Tackles Ransomware Attacks
TechStrong Con: Diversity Key to Solving Cybersecurity Talent Shortage
The Million-Dollar Question: To Pay or Not to Pay Ransom?
Hacker Paige Thompson Could Face 45 Years in Prison — ‘Suicide by Law Enforcement’
WordPress Security
Complete Guide to Cyber Threat Intelligence Feeds
2 Min Read – Is your Digital DevOps strategy worth investing in?
Is Cyber Breach Insurance part of your Cybersecurity roadmap?
NIST SP 800-161r1: What You Need to Know

Upcoming Webinars

Mon 27

AI and ML in Security

June 27 @ 1:00 pm - 2:00 pm
Thu 30

Closing the Gap: Reducing Enterprise AppSec Risks Without Disrupting Deadlines

June 30 @ 11:00 am - 12:00 pm
Jul 19

Finding the Ransomware Threat INSIDE Your Backups

July 19 @ 3:00 pm - 4:00 pm
Jul 25

Applying the 2022 Open Source Findings to Software Supply Chain Risk Management

July 25 @ 3:00 pm - 4:00 pm
Jul 27

How to Shift Security Left: Best Practices From a Fortune 500 DevSecOps Leader

July 27 @ 1:00 pm - 2:00 pm
Aug 30

CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together

August 30 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

The State of Cloud Native Security 2020

Industry Spotlight

HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook
Analytics & Intelligence Application Security Cloud Security Cyberlaw Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Identity & Access Incident Response Industry Spotlight Most Read This Week Network Security News Popular Post Security Boulevard (Original) Spotlight Threats & Breaches Vulnerabilities 

HIPAA FAIL: ~33% of Hospital Websites Send PII to Facebook

June 17, 2022 Richi Jennings | Jun 17 0
Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity
Cybersecurity Governance, Risk & Compliance Industry Spotlight IoT & ICS Security Security Awareness Security Boulevard (Original) Threat Intelligence 

Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity

May 23, 2022 Mike Hodge | May 23 Comments Off on Cars in the Crosshairs: Automakers, Regulators Take on Cybersecurity
Establishing a Root of Trust in Embedded Linux and IoT
Cybersecurity Endpoint Industry Spotlight IoT & ICS Security Security Boulevard (Original) Vulnerabilities 

Establishing a Root of Trust in Embedded Linux and IoT

April 18, 2022 Anita Buehrle | Apr 18 Comments Off on Establishing a Root of Trust in Embedded Linux and IoT

Top Stories

NSA Wants To Help you Lock Down MS Windows in PowerShell
Analytics & Intelligence Application Security Cloud Security Cybersecurity Data Security Endpoint Featured Governance, Risk & Compliance Incident Response Malware Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

NSA Wants To Help you Lock Down MS Windows in PowerShell

June 24, 2022 Richi Jennings | 1 day ago 0
Hacker Paige Thompson Could Face 45 Years in Prison — ‘Suicide by Law Enforcement’
Analytics & Intelligence Application Security Blockchain Cloud Security Cyberlaw Cybersecurity Data Security DevOps Digital Currency Editorial Calendar Featured Governance, Risk & Compliance Identity & Access Identity and Access Management Incident Response Most Read This Week Network Security News Popular Post Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

Hacker Paige Thompson Could Face 45 Years in Prison — ‘Suicide by Law Enforcement’

June 21, 2022 Richi Jennings | 4 days ago 0
TechStrong Con: Diversity Key to Solving Cybersecurity Talent Shortage
Careers Cybersecurity Featured News Security Boulevard (Original) Spotlight 

TechStrong Con: Diversity Key to Solving Cybersecurity Talent Shortage

June 21, 2022 Michael Vizard | 4 days ago 0

Security Humor

XKCD 'Roman Numerals’

XKCD ‘Roman Numerals’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Container Journal
  • DevOps.com
  • Techstrong Research
  • Techstrong TV
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
  • Digital Anarchist
Powered by Techstrong Group
Copyright © 2022 Techstrong Group Inc. All rights reserved.