Use Case
Technology Planning: SCADA Security
The Process of Protecting Your Connected Networks from Cyberattack
Energy and utility companies need comprehensive visibility and control over interconnected SCADA networks in order to balance user access with critical infrastructure security. To achieve this goal, you need to strategically plan each stage of your technology journey.
A Guide to Mapping Your SCADA Security Journey
PHASE 1
Gap Analysis
Conducting a gap analysis is a critical first step to improving risk management.
- Measure your SCADA security practices against the NIST SP 800-82 cybersecurity framework.
- Identify gaps in compliance in key areas such as access control, password change management and physical security.
- Prioritize vulnerabilities based on a clear understanding of your environment.
PHASE 2
Mitigation
Develop a mitigation strategy to remediate the weaknesses identified through the gap analysis.
- Properly document all risks.
- Develop comprehensive policies and procedures to strengthen security.
- Create playbooks to ensure consistent compliance with established security standards and in cyberattack responses.
- Optimize existing security tools or acquire new ones as needed, such as automated vulnerability assessment and reporting, password management and network access control.
PHASE 3
Monitoring and Maintenance
Continually reevaluate your security tools and risks to protect against cyberthreats and determine how to maximize resource allocation.
- Conduct regular penetration testing to track emerging vulnerabilities.
- Install all security patches on a timely basis.
- Provide security training to all employees on a consistent basis.
- Repeat a gap analysis/review on an annual basis.
Next step: Give us a call to get started on your journey.
You May Also Like
White Paper
What Is GDPR, and How Does It Affect Retailers?
A major regulation went into effect this year to govern how organizations that do business in the European Union handle data. Here's what you need to know.
Article
Why a Risk-Based Approach Yields Effective Security
A holistic assessment of threats and vulnerabilities helps an organization appropriately prioritize and mitigate its risks.
Article
Smarter Security Addresses Evolving Threats
Artificial intelligence and data analytics are improving the performance of endpoint security solutions.MKT50197