SEQRED
  • About
    • Seqred
    • Press Releases
  • Services
    • Cloud Cybersecurity
      • Cloud Services Security
    • Product Assessment
      • Mobile device security
      • Security code review
      • Secure Product Development
    • Offensive Cybersecurity
      • Penetration tests
      • Red Team
    • Infrastructure Cybersecurity
      • Cybersecurity for Faciliity Related Control Systems
      • CMMC assessment
      • Smart Building Cybersecurity
      • AMI system security
      • Network segmentation
    • NIS2 Directive
      • NIS Directive Audit
      • Security Audit ICS
      • Cybersecurity Bill of Materials
      • Critical Infrastructure protection
    • Threat Management
      • Open Source Intelligence / OSINT
      • Threat Intelligence
  • Products
    • SMX Secure Media Exchange
    • Secure Remote Access
  • Events
  • Blog
  • Contact
  • 
  • 
  • 
  • 
  • PLPL
Select Page
The Top 20 Secure PLC Coding Practices. Part 8 – Validate and alert for paired inputs / outputs

The Top 20 Secure PLC Coding Practices. Part 8 – Validate and alert for paired inputs / outputs

by Eugeniusz Wypior | 3 November 2021 | Blog-EN, Newest post

Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 8 – Validate and alert for paired inputs / outputs If you have paired signals, ensure that both signals are not asserted together. Alarm the operator when input / output states occur that are physically...
The Top 20 Secure PLC Coding Practices. Part 7 – Validate timers and counters

The Top 20 Secure PLC Coding Practices. Part 7 – Validate timers and counters

by Eugeniusz Wypior | 28 October 2021 | Blog-EN, Newest post

Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 7 – Validate timers and counters If timers and counters values are written to the PLC program, they should be validated by the PLC for reasonableness and verify backward counts below zero Security...
The Top 20 Secure PLC Coding Practices. Part 6 – Use cryptographic and / or checksum integrity checks for PLC code

The Top 20 Secure PLC Coding Practices. Part 6 – Use cryptographic and / or checksum integrity checks for PLC code

by Eugeniusz Wypior | 21 October 2021 | Blog-EN, Newest post

Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 6 – Use cryptographic and / or checksum integrity checks for PLC code Use cryptographic hashes, or checksums if cryptographic hashes are unavailable, to check PLC code integrity and raise an alarm when...
The Top 20 Secure PLC Coding Practices. Part 5 – Use PLC flags as integrity checks

The Top 20 Secure PLC Coding Practices. Part 5 – Use PLC flags as integrity checks

by Eugeniusz Wypior | 13 October 2021 | Blog-EN, Newest post

Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 5 – Use PLC flags as integrity checks Put counters on PLC error flags to capture any math problems  Security Objective Target Group Integrity of PLC Logic Product SupplierIntegration /Maintenance Service...
The Top 20 Secure PLC Coding Practices. Part 4 – Leave operational logic in the PLC wherever feasible

The Top 20 Secure PLC Coding Practices. Part 4 – Leave operational logic in the PLC wherever feasible

by Eugeniusz Wypior | 6 October 2021 | Blog-EN, Newest post

Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 4 – Leave operational logic in the PLC wherever feasible Leave as much operational logic e.g., totalising or integrating, as possible directly in the PLC. The HMI does not get enough updates to do this...
« Older Entries
Next Entries »

About our blog

As a team of highly experienced professionals, we aim to share our knowledge and expertise in a variety of subjects related to cybersecurity. Our goal is to help solve problems, but most importantly, we intend to assist our readers in securing themselves against cyber threats.

News

Search on blog

Categories

Tags

ABC security CMMC conference critical infrastructure cve cybersecurity Cybersecurity Maturity Model Certification energy fuzzing ICS information security IT security leadership management memory tagging messaging security news OT OT security PLC PLC security processors proptech ransomware research Response & recovery secure password Shodan smart building UPnP vulnerability

SEQRED Sp. z o.o.
SEQRED International Sp. z o.o.
Rzymowskiego 34, 02-697 Warszawa
tel. +48 22 292 32 23
fax +48 22 292 32 21
[email protected]

Privacy Policy All rights reserved © SEQRED 2021