by Eugeniusz Wypior | 5 January 2022 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 16 – Define a safe process state in case of a PLC restart Define safe states for the process in case of PLC restarts (e.g., energize contacts, de-energize, keep the previous state) Security Objective...
by Eugeniusz Wypior | 4 January 2022 | Blog-EN, Newest post
Eugene Wypior Security Operations Centre – part 4 The human factor of SOCs According to the definition of Security Operations Centre (SOC) we used in part 1 of these series, ‘SOC is a combination of people, processes and technologies (…)’. How does a SOC’s team...
by Eugeniusz Wypior | 23 December 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 15 – Restrict third-party data interfaces Restrict the type of connections and available data for 3rd party interfaces. The connections and/or data interfaces should be well defined and restricted to...
by Eugeniusz Wypior | 21 December 2021 | Blog-EN, Newest post
Eugene Wypior Security Operations Centre – part 3 The SOC’s main purpose is the identification and reaction to threats. A SOC needs to be able to see what is going on the in the information system it is intending to protect. What else you envision your SOC to do...
by Eugeniusz Wypior | 15 December 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 14 – Disable unneeded / unused communication ports and protocols PLC controllers and network interface modules generally support multiple communication protocols that are enabled by default. Disable...