
Reduce Vulnerability to Cyber Attacks in the Control Room

Reduce Vulnerability to Cyber Attacks in the Control Room
Overview
Defense in Depth (DiD) approach to cybersecurity for reducing cyberattacks
This document describes examples of Schneider Electric’s defense-in-depth approach to cybersecurity, for reducing control room vulnerability to cyberattacks.
To demonstrate and test the approach, an example system was set up in Schneider Electric’s Network Competency Center laboratory.
This example system includes the following networks: enterprise network, DMZ network, control network, and field device network elements typical of those found in EcoStruxure™ Plant architectures and other control and automation systems.
***Chapters 1.1 & 1.2 are available for free download in the Resources section***
Defense in Depth (DiD) approach to cybersecurity for reducing cyberattacks
This document describes examples of Schneider Electric’s defense-in-depth approach to cybersecurity, for reducing control room vulnerability to cyberattacks.
To demonstrate and test the approach, an example system was set up in Schneider Electric’s Network Competency Center laboratory.
This example system includes the following networks: enterprise network, DMZ network, control network, and field device network elements typical of those found in EcoStruxure™ Plant architectures and other control and automation systems.
***Chapters 1.1 & 1.2 are available for free download in the Resources section***
Benefits
Defense-in-depth approachSchneider Electric recommends a defense-in-depth approach to cybersecurity. The defense-in-depth approach, conceived by the National Security Agency (NSA) layers the network with security features, appliances, and processes.
Enhance the security of communicationsThe Design section presents system design, and configuration considerations that are relevant to enhancing the security of communications into and out of the control room.
Improve the operation and maintenanceThe Operation and Maintenance section provides guidelines for ongoing use and maintenance of the system.
Defense-in-depth approachSchneider Electric recommends a defense-in-depth approach to cybersecurity. The defense-in-depth approach, conceived by the National Security Agency (NSA) layers the network with security features, appliances, and processes.
Schneider Electric recommends a defense-in-depth approach to cybersecurity. The defense-in-depth approach, conceived by the National Security Agency (NSA) layers the network with security features, appliances, and processes.