Defence in depth expected in the environment
The "Defense in Depth" involves multiple security mechanisms to safeguard OT controller environments comprehensively. It not only necessitates the deployment of technical defenses but also emphasizes the active participation of users in maintaining the security posture.
Measure |
Description |
User Responsibility of the Users |
Network Firewalls |
Hardware or software-based network security systems that control incoming and outgoing traffic. |
Ensure proper configuration to safeguard against unauthorized access. |
Intrusion Prevention Systems (IPS) |
Devices or applications that monitor the network and/or system activities for malicious activity. |
Regularly update IPS signatures and monitor alerts. |
Implement VPN Service |
Virtual Private Networks to provide secure remote access. |
Employ strong encryption and require VPN for all remote connections. |
Regular Software Updates |
Keeping all software up-to-date with the latest security patches. |
Enforce patch management protocols as detailed on the https://security.tasind.com website. Additionally, subscribe to TAS Products and Solutions' News and Alerts to stay informed about security incidents and necessary updates. |
Physical Security Measures |
Protection of physical assets from unauthorized physical access. |
Implement access controls, surveillance, and environmental protections. |
Secure Configuration |
Harden configurations to minimize unnecessary services and access. |
Regularly review and update configurations to remain secure. |
Define Network Traffic Rules |
Lists that provide permissions to who can access what resources. |
Define and maintain ACLs based on the principle of least privilege. |
Two-Factor Authentication (2FA) |
An additional layer of security beyond just passwords. |
Mandate the use of 2FA for access to all users of WP500 Controller access. |
Employee Training and Awareness |
Regular training on security best practices and current threats. |
Conduct ongoing security awareness training for all users. |
TAS Incident Response Process |
A prepared strategy for identifying and responding to security incidents. |
In the event of detecting any security incidents or anomalies, please promptly forward / write an email to security.alerts@tasind.com. |
Data Backup and Recovery |
Regular backups and a clear recovery plan for critical data. |
Test backups and ensure recovery processes are in place and functional. |
Secure Disposal of Data |
Procedures for the secure deletion of data. |
Employ data wiping and media destruction policies for decommissioned devices. |
Change Management |
Processes to manage changes to systems and software. |
Use a formal change management process for any system changes. |
File Integrity Check |
Post comissioning and during Maintenace routine checks Scan and Run File Integrity Service. |
Perform a file integrity check on the WPConnex service to ensure that all essential files are secure, originate from trusted sources, and have accurate timestamps by using SHA matching. |
Implement Syslog Server Configuraiton |
Solutions for real-time analysis of security alerts. |
Configuring and implementing a Syslog server and connecting all WP500 controllers centrally to it is an essential step to centralize log management and monitoring for better network and security management. |
Created with the Personal Edition of HelpNDoc: Transform your help documentation into a stunning website