Week 24: Identify All OT Electronic Security Perimeters - Dale Peterson: ICS Security Catalyst
Summary by Dale Peterson: ICS Security Catalyst
1 Articles
1 Articles
All
Left
Center
Right
Week 24: Identify All OT Electronic Security Perimeters - Dale Peterson: ICS Security Catalyst
Last week’s task identified, and initiated steps to remove, all unauthorized or insecure Internet access to OT. The remaining OT network access will come from your IT networks or business partner networks. The first step to evaluating the OT electronic security perimeter is to know what it is. This week is about gathering this information. The information is likely to consist of network diagrams and firewall rulesets. You may also have one-way d…
Coverage Details
Total News Sources1
Leaning Left0Leaning Right0Center0Last UpdatedBias DistributionNo sources with tracked biases.
Bias Distribution
- There is no tracked Bias information for the sources covering this story.
Factuality
To view factuality data please Upgrade to Premium