OT/ICS Secure by Design

  • Policy and Procedure vulnerabilities
  • Architecture and Design Vulnerabilities
  • Configuration and Maintenance Vulnerabilities
  • Physical Vulnerabilities
  • Software Development Vulnerabilities
  • Communication and Network Configuration Vulnerabilities
  • Metal (For protection)
  • Ports (remove or close unnecessary ports , otherwise authentication is required)
  • Pins and Electromagnetic Interference (EMI)
  • Electromagnetic Pulse and Cyber Defense (EMP)
  • Counterfeiting
  • Cryptography and Strong Encryption
  • Secure boot
  • True Random Numbers
  • Security Hardened Operating Systems
  • Evaluation Assurance Level
  • Anti-Tamper for Cyber Defense
  • Secure Supply Chain and Key Management System
  • Public Key Infrastructure (PKI)
  • Hardware Root of Trust

References:

  1. https://www.linkedin.com/pulse/pivot-process-variable-anomaly-detection-dale-peterson/
  2. https://www.langner.com/2019/03/what-does-insecure-by-design-actually-mean-for-ot-ics-security/
  3. https://www.controlglobal.com/blogs/unfettered/the-ot-paradigm-is-broken-technically-and-culturally-it-must-be-fixed

--

--

--

ICS/IT security researcher

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Productized Podcast — Ted Harrington— How to do application security right

Will the WallStreetBets vs. Wall Street Lead to a Decentralized Internet?

Padlock those fingers with a Kitty

Top 5 web application security testing tools in 2021.

Shedding a Light on Decentralized Identifiers

{UPDATE} Find The Pipe Road Hack Free Resources Generator

Review: Records and Information Management (2018)

Business People Seek Protection Against the Threat of Cyber Attacks

Person in black costume pointing at viewer.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Sulaiman Alhasawi

Sulaiman Alhasawi

ICS/IT security researcher

More from Medium

TOP TIPS TO STRENGTHEN YOUR IMMUNE SYSTEM WITH NITRIC OXIDE

Survival Knife 101 — How To Choose

folding survival knife

Cosela (Trilaciclib) — Pivotal Trial

Work hard or Work smart!