Technical guide to reduce control room vulnerability to cyberattacks.
This document describes examples of Schneider Electric’s defense-in-depth approach to cybersecurity, for reducing control room vulnerability to cyberattacks.
To demonstrate and test the approach, an example system was set up in Schneider Electric’s Network Competency Center laboratory.
This example system includes the following networks: enterprise network, DMZ network, control network, and field device network elements typical of those found in EcoStruxure™ Plant architectures and other control and automation systems.
***Chapters 1.1 & 1.2 are available for free download in the Resources section***
Schneider Electric recommends a defense-in-depth approach to cybersecurity. The defense-in-depth approach, conceived by the National Security Agency (NSA) layers the network with security features, appliances, and processes.