Reduce Vulnerability to Cyber Attacks in the Control Room

Technical guide to reduce vulnerability to Cyber attacks
Published by Schneider Electric
Starting At  $149.00
Contact Us Download

Overview

Technical guide to reduce control room vulnerability to cyberattacks.

This document describes examples of Schneider Electric’s defense-in-depth approach to cybersecurity, for reducing control room vulnerability to cyberattacks.

To demonstrate and test the approach, an example system was set up in Schneider Electric’s Network Competency Center laboratory.


This example system includes the following networks: enterprise network, DMZ network, control network, and field device network elements typical of those found in EcoStruxure™ Plant architectures and other control and automation systems.

 

***Chapters 1.1 & 1.2 are available for free download in the Resources section***

Reduce Vulnerability to Cyber Attacks in the Control Room

Benefits

Defense-in-depth approach

Schneider Electric recommends a defense-in-depth approach to cybersecurity. The defense-in-depth approach, conceived by the National Security Agency (NSA) layers the network with security features, appliances, and processes. 

Enhance the security of communications
The Design section presents system design, and configuration considerations that are relevant to enhancing the security of communications into and out of the control room.
Improve the operation and maintenance
The Operation and Maintenance section provides guidelines for ongoing use and maintenance of the system.