SEQRED
  • About
    • Seqred
    • Press Releases
  • Services
    • Cloud Cybersecurity
      • Cloud Services Security
    • Product Assessment
      • Mobile device security
      • Security code review
      • Secure Product Development
    • Offensive Cybersecurity
      • Penetration tests
      • Red Team
    • Infrastructure Cybersecurity
      • Cybersecurity for Faciliity Related Control Systems
      • CMMC assessment
      • Smart Building Cybersecurity
      • AMI system security
      • Network segmentation
    • NIS2 Directive
      • NIS Directive Audit
      • Security Audit ICS
      • Cybersecurity Bill of Materials
      • Critical Infrastructure protection
    • Threat Management
      • Open Source Intelligence / OSINT
      • Threat Intelligence
  • Products
    • SMX Secure Media Exchange
    • Secure Remote Access
  • Events
  • Blog
  • Contact
  • 
  • 
  • 
  • 
  • PLPL
Select Page
The Top 20 Secure PLC Coding Practices. Part 13 – Validate inputs based on physical plausibility

The Top 20 Secure PLC Coding Practices. Part 13 – Validate inputs based on physical plausibility

by Eugeniusz Wypior | 8 December 2021 | Blog-EN, Newest post

Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 13 – Validate inputs based on physical plausibility Ensure operators can only input what’s practical or physically feasible in the process. Set a timer for an operation to the duration it should...
The Top 20 Secure PLC Coding Practices. Part 12 – Instrument for plausibility checks

The Top 20 Secure PLC Coding Practices. Part 12 – Instrument for plausibility checks

by Eugeniusz Wypior | 1 December 2021 | Blog-EN, Newest post

Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 12 – Instrument for plausibility checks Instrument the process in a way that allows for plausibility checks by cross-checking different measurements.  Security Objective Target Group Integrity oI/O...
The Top 20 Secure PLC Coding Practices. Part 11 – Assign designated register blocks by function (read/write/validate)

The Top 20 Secure PLC Coding Practices. Part 11 – Assign designated register blocks by function (read/write/validate)

by Eugeniusz Wypior | 25 November 2021 | Blog-EN, Newest post

Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 11 – Assign designated register blocks by function (read/write/validate) Assign designated register blocks for specific functions in order to validate data, avoid buffer overflows and block unauthorized...
The Top 20 Secure PLC Coding Practices. Part 10 – Validate indirections

The Top 20 Secure PLC Coding Practices. Part 10 – Validate indirections

by Eugeniusz Wypior | 17 November 2021 | Blog-EN, Newest post

Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 10 – Validate indirections Validate indirections by poisoning array ends to catch fence-post errors.  Security Objective Target Group Integrity of PLC variables Product Supplier Integration / Maintenance...
The Top 20 Secure PLC Coding Practices. Part 9 – Validate HMI input variables at the PLC level, not only at HMI

The Top 20 Secure PLC Coding Practices. Part 9 – Validate HMI input variables at the PLC level, not only at HMI

by Eugeniusz Wypior | 10 November 2021 | Blog-EN, Newest post

Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 9 – Validate HMI input variables at the PLC level, not only at HMI HMI access to PLC variables can (and should) be restricted to a valid operational value range at the HMI, but further cross-checks in...
« Older Entries
Next Entries »

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.

News

Search on blog

Categories

Tags

ABC security CMMC conference critical infrastructure cve cybersecurity Cybersecurity Maturity Model Certification energy fuzzing ICS information security IT security leadership management memory tagging messaging security news OT OT security PLC PLC security processors proptech ransomware research Response & recovery secure password Shodan smart building UPnP vulnerability

SEQRED Sp. z o.o.
SEQRED International Sp. z o.o.
Rzymowskiego 34, 02-697 Warszawa
tel. +48 22 292 32 23
fax +48 22 292 32 21
[email protected]

Privacy Policy All rights reserved © SEQRED 2021