Tiefgreifende Verteidigung

Eine einzelne Schutzmaßnahme reicht nicht aus, um sich gegen die dynamischen und sich ständig weiterentwickelnden Bedrohungen von heute zu schützen. Deshalb haben wir eine „Defense in Depth“-Strategie entwickelt, die mehrere Sicherheitsebenen nutzt, um Ihre WinCC OA Projekte. Stellen Sie sich diese Strategie als eine Reihe konzentrischer Kreise vor, die sich gegenseitig verstärken. Dieses Video gibt Ihnen einen kurzen Überblick über diesen Ansatz.

Video Information

Länge
3:12
Sprache
Englisch

Transkript

Hello this is Mounir, your host of the WinCC OA securities video series! In this episode, we are going to explore the topic of Defense in Depth as a fundamental security strategy. It’s a holistic approach that utilizes multiple security layers to keep bad things from happening.

To illustrate a single layer of the Defense in Depth concept, consider the use of a Demilitarized Zone (DMZ). If an attacker targets a computer within the DMZ, they will be detected by the Intrusion Detection System (IDS). The IDS will then terminate the connection, securing the system and mitigating the risk.

However, a single protection measure cannot completely protect against today's increasingly evolving threats, and you must consider additional layers to prevent attackers by implementing a Defense in Depth strategy.

WinCC OA projects benefit from multiple layers of protection. They increase the overall security of your system because the additional layers act as a backup for broken layers. In the case of an intruder, you may detect suspicious activities if you configure an intruder detection or Intrusion Detection System (IDS). This layer may report if an attacker tries to brute force a password from a secured system.

Now, to implement layers of protection, you need to understand the risk to your system by considering its exposure. When your system is connected to the internet, it’s important to implement security layers that monitor and control internet traffic, unlike a system that is only accessible locally. Then you must harden your operating system to reduce the possible attack vectors. With an appropriate network configuration, you can control access to your secured servers, and they should be located in a locked room with privileged access.

OK, so these are layers of protection you can implement, but what about employees? First, you must train the security awareness of your employees so that an attacker may not access the system using social engineering methods.

Attackers are always evolving, and we must do the same. A system that was defined as secure yesterday may not be secure tomorrow. Therefore, you must continuously monitor your system and check for vulnerabilities, which is another layer of defense.

Defense in Depth should be viewed as a process that is repeated in regular cycles to ensure the best possibleprotection.

Thank you for watching and remember to follow us on LinkedIn and YouTube and be on the lookout for our next episode in this series.