Question: Defense in depth is a layered strategy for securing ICS systems. In fact, this approach has been used in the labs with the DMZ ,
Defense in depth is a layered strategy for securing ICS systems. In fact, this approach has been used in the labs with the DMZ firewalls, and penetration testing, for example. In your reading over the last several weeks, we have explored risk management, the ICS architecture, including the network architecture, perimeter and host security ICS security management standards policy and procedures and physical security. Peripherally, security monitoring, vendor management, and the human factor have been within the context. Pick two of the numbered areas and explain each of their roles in building a defense at depth strategy. What role does monitoring and implementing incident response plans play in the strategy for the areas you chose? Also, how does one of the following vulnerability management, configuration management, log management and change control impact the strategy for your two areas?
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
