
Industrial Cybersecurity
By :

Throughout the chapter, we have already discussed some of the key differences per assessment type between ICS (cyber)security assessments and purely IT-oriented ones.
In general, keep in mind that the scanning of equipment and identifying vulnerabilities within the industrial environment requires a different approach from the scanning and probing of a typical IT environment. In most cases, devices that are present on an IT system or network can be rebooted, restored from backup, or replaced with little to no interruption of service to the users of the IT resources. An ICS, on the other hand, controls a physical process and therefore interruption of service due to excessive scanning and probing can have real-world consequences, including physical damage or even harm to human life or the environment. For this reason, vulnerability assessments should be limited to passive scans of the ICS network, minimizing the interaction with the...