October is National Cybersecurity Awareness Month (NCSAM). During the month of October we will highlight cybersecurity tips to help make you more cyber aware.
Design Considerations for Securing Industrial Automation Networks
Rockwell Automation has collaborated with Cisco to develop Converged Plantwide Ethernet (CPwE) Architectures to provide education, design guidance, and best practices. These documents provide design considerations to deploy a holistic defense-in-depth industrial security policy to help secure networked assets. Leverage the specific design considerations to help with the successful design and deployment of an Industrial Demilitarized Zone (IDMZ). You can use Cisco Identity Services Engine within industrial automation plant-wide architectures.
Below are the CPwE reference documents that provide design considerations for ICS security.
ControlLogix® 5580 Family achieves first TÜV Rheinland IEC 62443-4-2 certification for a high-performance controller.
The Cyber Security Management Certificate (ISA/IEC 62443) reinforces the security requirements through the implementation of the Security Development Lifecycle for our design processes.
See use cases to design and deploy an IDC within plant-wide industrial automation and control system (IACS) applications.
Application guide for security use cases to design and deploy end-to-end connectivity with FactoryTalk® software from the machine, to the enterprise, to the cloud within a CPwE architecture.
Guidelines for protecting IACS assets through deploying a centrally manageable defense-in-depth security approach that addresses internal security threats.
Guidelines to help with the successful design and deployment of an Industrial Demilitarized Zone within Industrial Automation and Control System (IACS) architectures.
Read about use cases for designing, deploying, and managing industrial firewalls throughout a plant-wide IACS network infrastructure.
Outlines the concepts, requirements, technology and design considerations for connecting remote industrial automation and control system (IACS) assets to a plant-wide network architecture.
How FactoryTalk Security can be used to help tighten your application security.
Looking for more information?
Contact your local automation specialist or account manager at The Reynolds Company to discuss your automation applications. Find your specialist.