Control Systems Cyber Security: Defense-in-Depth Strategies
Conference
·
OSTI ID:923499
Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.
- Research Organization:
- Idaho National Laboratory (INL)
- Sponsoring Organization:
- USDOE
- DOE Contract Number:
- AC07-99ID13727
- OSTI ID:
- 923499
- Report Number(s):
- INL/CON-07-12804
- Country of Publication:
- United States
- Language:
- English
Similar Records
Control Systems Cyber Security:Defense in Depth Strategies
A cyber‐secure control‐detector architecture for nonlinear processes
Recommended Practice for Securing Control System Modems
Technical Report
·
Mon May 01 00:00:00 EDT 2006
·
OSTI ID:911553
A cyber‐secure control‐detector architecture for nonlinear processes
Journal Article
·
Sun Jan 12 19:00:00 EST 2020
· AIChE Journal
·
OSTI ID:1582486
Recommended Practice for Securing Control System Modems
Technical Report
·
Mon Dec 31 23:00:00 EST 2007
·
OSTI ID:924510