Solution
The waste management company collaborated with a cyber security services group and a product vendor to embed security not just in the network perimeter, but throughout the system. The team followed the ISA/IEC 62443 standard to partition the critical plant infrastructure into zones, secured through conduits (these concepts were discussed in Chapter 3, IIoT Identity and Access Management). Each zone was protected by a specialized industry security appliance (a field-level firewall). This firewall was transparent to the network (no IP address), and was capable of deep packet inspection for industrial protocol communications, to protect against all malformed packet attacks. Each PLC and microprocessor unit was protected by the firewall. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access