{"id":538,"date":"2024-04-19T12:26:50","date_gmt":"2024-04-19T12:26:50","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/resources\/?p=538"},"modified":"2024-10-05T09:14:33","modified_gmt":"2024-10-05T09:14:33","slug":"industrial-control-system-security-guide","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/resources\/industrial-control-system-security-guide\/","title":{"rendered":"Industrial Control System Security Guide"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"538\" class=\"elementor elementor-538\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-377239d5 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"377239d5\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;curve&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M500,97C126.7,96.3,0.8,19.8,0,0v100l1000,0V1C1000,19.4,873.3,97.8,500,97z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6f8b773\" data-id=\"6f8b773\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b38917b aux-appear-watch-animation aux-fade-in-down-2 elementor-widget elementor-widget-aux_modern_heading\" data-id=\"b38917b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h1 class=\"aux-modern-heading-primary\">WHITE PAPER<\/h1><h3 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">Industrial Control System Security Guide<\/span><\/h3><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-585e6c4 elementor-widget elementor-widget-aux_modern_button\" data-id=\"585e6c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t    <div class=\"aux-modern-button-wrapper aux-modern-button-align-center\" >\n                    <a class=\"aux-modern-button aux-black aux-modern-button-md aux-modern-button-normal aux-modern-button-default aux-icon-left\" href=\"https:\/\/lmntrix.com\/resources\/\">\n                <div class=\"aux-overlay\"><\/div>\n                                    <div class=\"aux-icon \">\n                        <i aria-hidden=\"true\" class=\"auxicon2 auxicon2-arrow-chevron-fat-left\"><\/i>                    <\/div>\n                                <div class=\"aux-text\">\n<span class=\"aux-text-before\">Back to Resource center<\/span>                <\/div>\n            <\/a>\n            \n    <\/div>\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-41fabb5b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"41fabb5b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-28109664\" data-id=\"28109664\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8ee01ea elementor-widget elementor-widget-aux_image\" data-id=\"8ee01ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<section class=\"widget-container aux-widget-image aux-alignnone aux-parent-au327afd3d\">\n    <div class=\"aux-media-hint-frame \">\n        <div class=\"aux-media-image \" >\n        \n            \n\n            \n            <img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"482\" src=\"https:\/\/lmntrix.com\/resources\/wp-content\/uploads\/2024\/04\/lmntrix-mobile-threat.webp\" class=\"aux-attachment aux-featured-image aux-attachment-id-492\" alt=\"lmntrix-mobile-threat\" data-ratio=\"1.24\" data-original-w=\"600\" \/>            \n                <\/div>\n    <\/div>\n\n<\/section><!-- widget-container -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c67db8 elementor-widget elementor-widget-aux_modern_button\" data-id=\"2c67db8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t    <div class=\"aux-modern-button-wrapper aux-modern-button-align-center\" >\n                    <a class=\"aux-modern-button aux-info aux-modern-button-md aux-modern-button-curve aux-modern-button-default aux-icon-\" href=\"https:\/\/lmntrix.com\/res\/ICS-Security-Guide-LMNTRIX.pdf\">\n                <div class=\"aux-overlay\"><\/div>\n                                    <div class=\"aux-icon \">\n                                            <\/div>\n                                <div class=\"aux-text\">\n<span class=\"aux-text-before\">Download White Paper<\/span>                <\/div>\n            <\/a>\n            \n    <\/div>\n\n    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1b717a7\" data-id=\"1b717a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f1c1c2e elementor-widget elementor-widget-aux_modern_heading\" data-id=\"f1c1c2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h1 class=\"aux-modern-heading-primary\"><\/h1><div class=\"aux-modern-heading-description\"><p>This white paper explores the issues around industrial control system security solutions to help you determine your cyber security protection requirements to select the appropriate managed security solution for your operational technology systems.<\/p><p>We also discuss how LMNTRIX XDR can be used for industrial strength OT and IoT security and visibility.<\/p><p>Whether you\u2019re a cybersecurity professional or just interested in learning more about ICS and how to protect your organization from ICS based cyber threats, this whitepaper is a must-read!<\/p><p>Download this ICS Security Guide to learn:<\/p><\/div><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd1b214 elementor-widget elementor-widget-aux_icon_list\" data-id=\"fd1b214\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_icon_list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<section class=\"widget-container aux-widget-icon-list aux-parent-au53dae1ec\"><div class=\"widget-inner\"><div class=\"aux-widget-icon-list-inner\"><ul class=\"aux-icon-list-items aux-direction-default\"><li class=\"aux-icon-list-item aux-list-item-has-icon aux-icon-list-item-d24794f elementor-repeater-item-d24794f\"><i aria-hidden=\"true\" class=\"aux-icon-list-icon auxicon2 auxicon2-check-mark\"><\/i><span class=\"aux-icon-list-text\">Overview of Industrial Control Systems<\/span><\/li><li class=\"aux-icon-list-item aux-list-item-has-icon aux-icon-list-item-7975459 elementor-repeater-item-7975459\"><i aria-hidden=\"true\" class=\"aux-icon-list-icon auxicon2 auxicon2-check-mark\"><\/i><span class=\"aux-icon-list-text\">ICS Architecture<\/span><\/li><li class=\"aux-icon-list-item aux-list-item-has-icon aux-icon-list-item-cbd06bd elementor-repeater-item-cbd06bd\"><i aria-hidden=\"true\" class=\"aux-icon-list-icon auxicon2 auxicon2-check-mark\"><\/i><span class=\"aux-icon-list-text\">General Introduction to SCADA and Modbus<\/span><\/li><li class=\"aux-icon-list-item aux-list-item-has-icon aux-icon-list-item-e70b31f elementor-repeater-item-e70b31f\"><i aria-hidden=\"true\" class=\"aux-icon-list-icon auxicon2 auxicon2-check-mark\"><\/i><span class=\"aux-icon-list-text\">ICS Misconceptions.<\/span><\/li><li class=\"aux-icon-list-item aux-list-item-has-icon aux-icon-list-item-b05b54c elementor-repeater-item-b05b54c\"><i aria-hidden=\"true\" class=\"aux-icon-list-icon auxicon2 auxicon2-check-mark\"><\/i><span class=\"aux-icon-list-text\">A Brief History of ICS<\/span><\/li><li class=\"aux-icon-list-item aux-list-item-has-icon aux-icon-list-item-0f884d2 elementor-repeater-item-0f884d2\"><i aria-hidden=\"true\" class=\"aux-icon-list-icon auxicon2 auxicon2-check-mark\"><\/i><span class=\"aux-icon-list-text\">ICS Threat Landscape<\/span><\/li><li class=\"aux-icon-list-item aux-list-item-has-icon aux-icon-list-item-0ce2496 elementor-repeater-item-0ce2496\"><i aria-hidden=\"true\" class=\"aux-icon-list-icon auxicon2 auxicon2-check-mark\"><\/i><span class=\"aux-icon-list-text\">ICS Weaknesses and Vulnerabilities<\/span><\/li><li class=\"aux-icon-list-item aux-list-item-has-icon aux-icon-list-item-da03c1b elementor-repeater-item-da03c1b\"><i aria-hidden=\"true\" class=\"aux-icon-list-icon auxicon2 auxicon2-check-mark\"><\/i><span class=\"aux-icon-list-text\">ICS Threat Vectors<\/span><\/li><li class=\"aux-icon-list-item aux-list-item-has-icon aux-icon-list-item-cf05b43 elementor-repeater-item-cf05b43\"><i aria-hidden=\"true\" class=\"aux-icon-list-icon auxicon2 auxicon2-check-mark\"><\/i><span class=\"aux-icon-list-text\">ICS Threat Actors<\/span><\/li><li class=\"aux-icon-list-item aux-list-item-has-icon aux-icon-list-item-9e1b02a elementor-repeater-item-9e1b02a\"><i aria-hidden=\"true\" class=\"aux-icon-list-icon auxicon2 auxicon2-check-mark\"><\/i><span class=\"aux-icon-list-text\">ICS Security Controls<\/span><\/li><li class=\"aux-icon-list-item aux-list-item-has-icon aux-icon-list-item-782b230 elementor-repeater-item-782b230\"><i aria-hidden=\"true\" class=\"aux-icon-list-icon auxicon2 auxicon2-check-mark\"><\/i><span class=\"aux-icon-list-text\">ICS Risk Management<\/span><\/li><li class=\"aux-icon-list-item aux-list-item-has-icon aux-icon-list-item-cd68bd7 elementor-repeater-item-cd68bd7\"><i aria-hidden=\"true\" class=\"aux-icon-list-icon auxicon2 auxicon2-check-mark\"><\/i><span class=\"aux-icon-list-text\">ICS Risk Assessment Preparation<\/span><\/li><\/ul><\/div><\/div><\/section><!-- widget-container -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>WHITE PAPER Industrial Control System Security Guide Back to Resource center Download White Paper This white paper explores the issues around industrial control system security solutions to help you determine your cyber security protection requirements to select the appropriate managed security solution for your operational technology systems. We also discuss how LMNTRIX XDR can be [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":493,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[13,16,12,15,11,14],"class_list":["post-538","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-white-paper","tag-paper","tag-white","tag-white-paper","tag-white-papers","tag-whitepaper","tag-whitepapers"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/posts\/538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/comments?post=538"}],"version-history":[{"count":21,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/posts\/538\/revisions"}],"predecessor-version":[{"id":1798,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/posts\/538\/revisions\/1798"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/media\/493"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/media?parent=538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/categories?post=538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/resources\/wp-json\/wp\/v2\/tags?post=538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}