by Eugeniusz Wypior | 18 October 2022 | Blog-EN, Newest post
Eugene Wypior Anti-patterns in security architecture – part 3 Back-to-back firewall Some wrongly believe that there is a security benefit in ‘doubling up’ on firewalls to implement the same set of controls. In addition, some believe it is beneficial if the two...
by Eugeniusz Wypior | 13 October 2022 | Blog-EN, Newest post
Eugene Wypior IEC62443 – Examples of practical requirements implementation – Part 4 Security Assurance Level 3 By definition should an SL3-compliant system be able to withstand intentional violation of its integrity by the use of sophisticated means...
by Eugeniusz Wypior | 10 October 2022 | Blog-EN, Newest post
Eugene Wypior Anti-patterns in security architecture – part 2 Management bypass Defence-in-depth is a widely accepted approach to protecting the critical resources of a system. In addition, a good system architecture practice is to separate the data plane from...
by Eugeniusz Wypior | 6 October 2022 | Blog-EN, Newest post
Eugene Wypior IEC62443 – Examples of practical requirements implementation – Part 3 Security Assurance Level 2 Additionally, to the specification of SL1, IEC 62443-3-3 defines a further 23 requirements (or enhancements to SL1) necessary to be...
by Eugeniusz Wypior | 4 October 2022 | Blog-EN, Newest post
Eugene Wypior Anti-patterns in security architecture – part 1 An Anit-pattern is a common solution or repeated behaviour that is ineffective or has the potential to create more problems than the advantages it is supposed to bring. In security architecture, an...