For the management teams of organizations with OT environments, the question is not if they can afford to have remote access into their Industrial Control Systems, but rather if they can afford not to.
The operational and cost efficiencies of these types of connections mean they are here to stay. However, remote access connections into ICS have been exploited in several high profile cyber-attacks in recent years, so they also represent an attack vector that security practitioners cannot ignore.
In Part III of our Introduction to ICS Cybersecurity series, we delve into the best practices for securing remote access connections into Industrial Control Systems.
Check it out here!
This series is written by iON’s Field CTO (and certified SANS instructor) Stephen Mathezer and Technical Writer Jordan Coldham, and is produced in partnership with the SANS Institute.