Although these challenges may seem daunting, doing nothing to address these risks will eventually lead to an incident that impacts production, safety, reputation or the environment. By implementing even the simplest form of controls, industrial businesses can see significant improvements in their overall cybersecurity posture.
Access Management Options
Centralized multi-function cybersecurity tools can provide excellent benefits when deployed properly. However, this option might not be appropriate for smaller businesses and facilities with more restrictive budgets and for those with a lower level of cybersecurity maturity.
The table below lists a few options to consider, but it is important to remember these will be limited to the capabilities of the ICS devices. As a general rule of thumb, it can be advantageous to have more than one method in your toolbox of options. It should also be noted that most of the options listed have free open-source alternatives, although these may lack some features or user interface refinements.
Finally, it is important to highlight that the access management options discussed are for local electronic access, and a dedicated remote access solution must be considered if remote access functionality is required. In this case, this means implementing an intermediate termination point (e.g., DMZ) for remote users and enforcing multi-factor authentication, among other recommended good practices. For more details on remote access considerations, refer to this blog article.