Implementing secure SCADA

Securing SCADA is a tough job when it has to be performed practically; however, we can look for some of the following key points when securing SCADA systems:

  • Keep an eye on every connection to the SCADA network and check if any unauthorized attempts were made
  • Make sure all the network connections are disconnected when they are not required
  • Implement all the security features provided by the system vendors
  • Implement IDPS technologies for both internal and external systems and apply incident monitoring for 24 hours
  • Document all the network infrastructure and define individual roles to administrators and editors
  • Establish IR teams and blue teams for identifying attack vectors on a regular basis

Get Mastering Metasploit - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.