Skip to main content

Using OT Asset Visibility and Firewalls to Protect Industrial Operations

Implementing a defensible architecture is one of the SANS Institute’s 5 Critical Controls, that organizations must consider. A defensible architecture reduces as much of the agreed-upon risk as possible through system design and implementation, while also simplifying the efforts of human defenders.  

Download this whitepaper, to review common attributes of good defensible architectures that include:

  • Achieving Accurate Asset Visibility for the Crown Jewels
  • Segmenting the Environment
  • Enabling Bi-Directional Communication When Required
  • Collecting Network Traffic and Logs from System of Value
  • Implementing a Defensible Cyber Position
  • Enhancing ICS/OT Security Perimeters: Improved Asset Visibility for Better Firewall Policy

Discover more resources.

Explore more resources to support you on your ICS cybersecurity journey.

Read our next whitepaper

whitepapers

Leveraging Threat Scenarios to Improve OT Cybersecurity in Manufacturing Environments

Dragos, Inc.
View Whitepaper
Right Arrow

View more whitepapers

Right Arrow

See the Dragos Platform in Action

Take the next step to protect your OT environment now with a free demo