Compensating Controls in ICS Security
How and when to apply OT/ICS compensating controls when software patching is not an option in industrial cyber security.
Read the StoryTechnological progress cannot be undone, and Microsoft’s extended support is ending soon for two widely deployed products: Windows 7 and Server 2008. Microsoft wishes for everyone to upgrade to ensure security against vulnerabilities. But for asset owners, this represents a series of new questions or pain points if a host is physically deployed.
This Windows-host upgrade approach may involve using VMware V-Sphere Converter as an example to create “digital twins” or “virtual twins” from a stand-alone perspective, but other tools are available including Microsoft’s migration tooling.
In a vendor agnostic fashion, the process is broken up into five steps:
This isn’t an exhaustive guide, but it should help you get started with migrating to a virtualized deployment. However, this process might help you test legacy software in newer Operating Systems (OS) or convert systems to virtual ones so you can retire legacy equipment where possible.
How and when to apply OT/ICS compensating controls when software patching is not an option in industrial cyber security.
Read the StoryFollowing the SolarWinds software incident, what lessons can asset owners learn from published causation and guidance - and how can product owners for more to help secure their customers?
Read the StoryEver feel like your counterparts are from another planet? It doesn't have to be that way!
Read the Story