{"id":121,"date":"2006-02-02T00:00:00","date_gmt":"2006-02-02T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/02\/02\/best-practices-for-control-system-security\/"},"modified":"2021-12-30T11:36:33","modified_gmt":"2021-12-30T11:36:33","slug":"best-practices-for-control-system-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/02\/02\/best-practices-for-control-system-security\/","title":{"rendered":"Best Practices for Control System Security"},"content":{"rendered":"<p>Traditional security products have focused on the biggest threats that emerged as computer networking, email and web applications were adopted by corporations.  These technologies do not address new attacks that ride over existing protocols to attack applications, or new content-based attacks that attack systems before vendors are able to release and distribute signatures and other countermeasures.  For the control system environment the underlying theme for intrusion prevention has to be around Day-Zero attacks being managed.  IPS is a new technology category that focuses on taking a proactive approach to both IT and control network security by preventing attacks on multiple network resources, as opposed to similar technologies that merely detect and report on attacks that have already taken place.   Intrusion prevention can be thought of as the logical follow-on to signature-based technologies such as IDS and anti-virus, and to network-oriented protection solutions such as firewalls.   Like an IDS, an IPS can run in host mode directly on the control system station, and the closer to the control system it is, the better the protection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Best practices should include:<br \/>\n&#8211; Host-based protection.<br \/>\n&#8211; Real-time prevention decisions.<br \/>\n&#8211; Defense in depth.<br \/>\n&#8211; Real-time correlation.<br \/>\n&#8211; Behavioral approach.<br \/>\n&#8211; Flexibility.<br \/>\n&#8211; Ease of deployment.<br \/>\n&#8211; Centralized event management.<br \/>\n&#8211; Platform coverage.<br \/>\n&#8211; Administration. <\/p>\n<p>http:\/\/www.cioupdate.com\/article.php\/3582536<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-121","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=121"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/121\/revisions"}],"predecessor-version":[{"id":2608,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/121\/revisions\/2608"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}