Reduce Vulnerability to Cyber Attacks in the Control Room

Technical guide to reduce vulnerability to Cyber attacks
Published by Schneider Electric


Defense in Depth (DiD) approach to cybersecurity for reducing cyberattacks

This document describes examples of Schneider Electric’s defense-in-depth approach to cybersecurity, for reducing control room vulnerability to cyberattacks.

To demonstrate and test the approach, an example system was set up in Schneider Electric’s Network Competency Center laboratory.

This example system includes the following networks: enterprise network, DMZ network, control network, and field device network elements typical of those found in EcoStruxure™ Plant architectures and other control and automation systems.


***Chapters 1.1 & 1.2 are available for free download in the Resources section***

Reduce Vulnerability to Cyber Attacks in the Control Room


Defense-in-depth approach

Schneider Electric recommends a defense-in-depth approach to cybersecurity. The defense-in-depth approach, conceived by the National Security Agency (NSA) layers the network with security features, appliances, and processes. 

Enhance the security of communications

The Design section presents system design, and configuration considerations that are relevant to enhancing the security of communications into and out of the control room.

Improve the operation and maintenance

The Operation and Maintenance section provides guidelines for ongoing use and maintenance of the system.
Unauthorised background image

Your product is just steps away!

Register for FREE to buy, get downloads and access free trials.

Get Resources and Start FREE Trials

Easy Product Activation with Your Account

Products Saved to Personal Digital Library