Blog

Contenido Blog

Industrial control systems endpoints defence guide

Posted on 22/05/2023, by
INCIBE (INCIBE)
Cover image Industrial control systems endpoints defence guide
When talking about an endpoint device, we are talking about an end asset present at the network level. Among these devices we can find engineering stations (workstations), HMI, SCADA or PLC, among others. The evolution of industrial environments towards models in which these equipment are connected, both with corporate networks and remotely with suppliers, for maintenance purposes, exposes them to new threats. That is why industrial endpoints must be properly and individually protected and at multiple levels so that they cannot be compromised.   These end systems are key security hotspots because their vulnerabilities could affect other assets within the network.  

The vulnerability life cycle in an industrial environment

Posted on 18/05/2023, by
INCIBE (INCIBE)
The vulnerability life cycle in an industrial environment
A growing number of industrial companies are adopting vulnerability management on their devices and systems, in order to perform this management in a correct and efficient way, the first step is to create an asset inventory or update it. Some companies are looking for vulnerability management services to stay on top of the latest cybersecurity issues affecting their assets. In addition, we are also noticing an increase in the availability of tools and their implementation for vulnerability management.

Best practices in industrial network segmentation

Posted on 04/05/2023, by
INCIBE (INCIBE)
Decorative image network segmentation blog
The growth of cyberattacks suffered in the industrial world is very worrying, since it is a sector that until recently the vast majority of its devices were not connected to the Internet, so the implementation of cybersecurity had never been thought of.But with Industry 4.0 all that has changed, since almost all devices are interconnected or have Internet connection creating many advantages, but also some problem.That is why experts in this field have seen the need to improve and implement cybersecurity in the industry, for this they have created different models and applications. Some of these can be seen in the following article.

The power of the gateways in the IIoT

Posted on 27/04/2023, by
INCIBE (INCIBE)
gears with shadow of a walking man image
With the industrial revolution of Industry 4.0, industrial processes have become more intelligent, and this has led to the deployment of a greater number of devices. All these deployments usually have a common point, being the gateways, which, after being deployed, are responsible for the translation of some protocols to the TCP/UDP frame or simply send the information to the cloud.Being a point that gathers a large amount of data and capable of providing intelligence to industrial processes, industrial gateways have become a very desirable target for attackers.

Maintenance for new industry

Posted on 20/04/2023, by
INCIBE (INCIBE)
Two technician looking at a screen
One of the most important activities in the industry is the industrial maintenance because it could extend the service life of devices. This activity has always been more mechanically oriented, but currently it might talk a new type of maintenance because the new industry technologies and increase of cyberattacks.This maintenance is more related with the informatic world and in this article will be able to see the principals characteristics and the actions to be taken to ensure that it is carried out correctly.

The importance of technical reports

Posted on 13/04/2023, by
INCIBE (INCIBE)
Gavel and notebook on a table
Technical reporting is one of the most important parts of the completion of a task, as it reflects the results of all the work done. Moreover, it does not only constitute a final deliverable for a customer, or for the decision-makers within an organization, but also acts as the link between the person or team that has carried out the task and the decision-makers, based on the findings.

ICS matrix, the status of v11

Posted on 05/04/2023, by
INCIBE (INCIBE)
ICS matrix, the status of v11
Currently, there is a constant evolution in the technologies and implementations made in Industrial Control Systems. On one hand, some of the most common implementations for the improvement of industrial systems infrastructures are digitalization and the use of cloud technology. On the other hand, the increase in communication protocols and IIoT devices (due to the growth of the Industry 4.0) generates a large volume of traffic that is difficult to control and secure.

Cybersecurity in TETRA networks study

Posted on 30/03/2023, by
INCIBE (INCIBE)
Cybersecurity in TETRA networks study decorative image
The TETRA (Terrestrial Trunked Radio) network is a standard developed in Europe in the 1990s by ETSI (European Telecommunications Standards Institute), whose emergence came because of the management of telephone communications for extreme cases, in which standard communication via mobile might not work properly. Therefore, it can be considered as an alternative network for communications with emergency and security services to be always operational. TETRA unifies different digital radio interface alternatives for communications and serves as a standard for the construction of private mobile networks or PMR (Private Mobile Radio).