1661899654440 Isabookcover

Securing manufacturing and control systems

Jan. 10, 2005
This ISA Technical Report provides recommendations and guidance for effectively using electronic security technology to protect manufacturing automation and control systems.

T

his ISA Technical Report provides recommendations and guidance for effectively using electronic security technology to protect manufacturing automation and control systems. It was developed by world-renowned cyber security and automation systems experts under the auspices of the ANSI accredited procedures of the ISA Standards and Practices Department.

Security Technologies for Manufacturing and Control Systems provides an evaluation and assessment of current types of electronic security technologies and tools that apply to the manufacturing and control systems environment (including development, implementation, operations, maintenance, engineering and other user services). It provides guidance to manufacturers, vendors, and security practitioners at end-user companies on the technological options for securing these systems against electronic (cyber) attack. 

The report describes several categories of security technologies, the types of products available in those categories, the pros and cons of using those products in the manufacturing and control systems environment, relative to expected threats and known vulnerabilities, along with preliminary recommendations and guidance for using those security technologies. Each technology is discussed in terms of:
•   Security Vulnerabilities Addressed by the Technology
•   Typical Deployment
•   Known Issues and Weaknesses
•   Assessment of Use in the Manufacturing and Control Systems Environment
•   Future Directions
•   Recommendations and Guidance
•   References

An additional non-cyber technology (physical security control) is an essential requirement for some aspects of cyber-security and is also discussed in this report.

Table of Contents
Book Preview

Click Security Technologies for Manufacturing and Control Systems to order this definitive guide developed by experts working with leading automation systems standards developers.

RELATED REPORT
Integrating Electronic Security into the Manufacturing and Control Systems Environment

Sponsored Recommendations

IEC 62443 4-1 Cyber Certification – Why ML 3 is So Important

The IEC 62443 Security for Industrial Automation and Control Systems - Part 4-1: Secure Product Development Lifecycle Requirements help increase resilience for control systems...

Multi-Server SCADA Maintenance Made Easy

See how the intuitive VTScada Services Page ensures your multi-server SCADA application remains operational and resilient, even when performing regular server maintenance.

Your Industrial Historical Database Should be Designed for SCADA

VTScada's Chief Software Architect discusses how VTScada's purpose-built SCADA historian has created a paradigm shift in industry expectations for industrial redundancy and performance...

Linux and SCADA – What You May Not Have Considered

There’s a lot to keep in mind when considering the Linux® Operating System for critical SCADA systems. See how the Linux security model compares to Windows® and Mac OS®.