Securing Assets Within a Closed Industrial Control System (ICS) Network

Abstract: The second in a series, this document focuses on system security within a "closed" ICS perimeter. It provides a systematic approach for implementing the access control concept of Least Privilege.

Date Published:

Last Reviewed: 01 October 2015

Creator: Vulnerability Solutions

Dissemination Control: N/A

Length: 17 page(s)

Format: pdf

Type: Guide/Plan; Reference/Overview; Report

Tags: Industrial Control System - ICS; Privileges; Network Security