![]() ![]() Please consult our Security Vulnerabilities Whitepapers above to learn how to mitigate vulnerabilities for your specific version. If you are not running the latest version of ICONICS software, install the appropriate patch files listed in our Security Vulnerabilities Whitepapers below.Ī whitepaper is available for download that contains an overview, details and mitigation plan regarding previously identified ICS-CERT vulnerabilities for ICONICS GENESIS64 and GENESIS32 Supervisory Control and Data Acquisition (SCADA) products.ĭownload the GENESIS64 Security Vulnerabilities Whitepaper here for more information on GENESIS64.ĭownload the GENESIS32 Security Vulnerabilities Whitepaper here for more information on GENESIS32. ![]() ![]() Minimize the attack surface by turning off services and point managers which you are not going to use in the project.Control system devices should not directly face the Internet. Minimize network exposure for all control system devices.If remote access is required, utilize secure methods such as Virtual Private Networks (VPNs). Restrict access to all TCP ports, such as port 38080 and 6002.Place control system networks and devices behind firewalls and isolate them from the business network. Consider using a Web Application Firewall (WAF). To that end, ICONICS recommends that users of the ICONICS Suite, GENESIS64, Hyper Historian, AnalytiX, GENESIS32, BizViz, OPC Servers, or other ICONICS products take the following steps to mitigate security risks: ICONICS is committed to providing high-quality, secure products to its customers. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |