An increase in malware and attacks on Industrial Control Systems (ICS), the growing number of new vulnerabilities in ICS equipment and an increased necessity for these systems to be integrated with other environments (like ERP, for example) have necessitated a more thorough approach to ICS security. In addition, ICS security is closely tied with functional security and a successful hacker attack could lead to production accidents.
Our ICS Security Assessment service identifies security flaws in ICS on all layers: starting from physical and network security, to vendor-specific vulnerabilities in ICS components such as supervisory control and data acquisition (SCADA) systems, programmable logic controllers (PLCs) and others. This service provides you with information on the consequences of vulnerabilities exploitation, evaluates the effectiveness of implemented security measures, and enables you to plan further actions to fix detected flaws and improve security.
A security assessment that simulates various types of intruders upon your choice with the goal to elevate current privileges and access the ICS environment
Internal penetration testing and careful assessment of the ICS environment specifics, including analysis of industrial systems and protocols followed by pre-approved tests demonstrated on the real system
A deep security research of the software and hardware ICS components conduted in the test environment with the goal to find new vulnerabilities, followed by pre-approved demonstrations on the real system
A summary report detailing all discovered vulnerabilities and security flaws, with actionable recommendations for immediate resolution
GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and is used herein with permission. All rights reserved.
Various vulnerabilities leading to obtaining unauthorised access to critical network components may be identified, including:
As a result of the service, customers obtain a report containing: