The First Step for SCADA Security Is Developing an Inventory
As threat actors continue to develop more advanced tools and techniques, visibility is more essential than ever to protect your organization against attack. And as supervisory control and data acquisition (SCADA) networks are frequently outdated, that challenge can be even more significant. That’s why it’s so important to establish a baseline by creating an inventory of everything in your environment.
“The first thing we need to do is figure out what your rules are. In what box do you want to play?” Serrano says. “When we talk about mobile devices, are we talking about mobile devices that you carry? Are we talking about mobile devices that I issued to you? Or are we talking about mobile devices that you bring from home, such as my iPad, that I can connect to work and get my company email?”
“An inventory is a must,” Serrano continues. “The moment you do an inventory, then you can do that gap analysis. Because then you can see where you are.”
A gap analysis can be key to developing complete visibility and strengthening your security posture. It outlines the vulnerabilities lurking within your environment.