Whitepaper
Implementing a Defensible Architecture
Using OT Asset Visibility and Firewalls to Protect Industrial Operations
Implementing a defensible architecture is one of the SANS Institute’s 5 Critical Controls, that organizations must consider. A defensible architecture reduces as much of the agreed-upon risk as possible through system design and implementation, while also simplifying the efforts of human defenders.
Download this whitepaper, to review common attributes of good defensible architectures that include:
- Achieving Accurate Asset Visibility for the Crown Jewels
- Segmenting the Environment
- Enabling Bi-Directional Communication When Required
- Collecting Network Traffic and Logs from System of Value
- Implementing a Defensible Cyber Position
- Enhancing ICS/OT Security Perimeters: Improved Asset Visibility for Better Firewall Policy
Discover more resources.
Explore more resources to support you on your ICS cybersecurity journey.
Read our next whitepaper
View Whitepaper
Right Arrow
See the Dragos Platform in Action
Take the next step to protect your OT environment now with a free demo