Company Y completes a network scan. The facility has unsecured inbound and outbound connections to the internet on the operational network, leaving the entire network vulnerable. The network was also found to be using unauthenticated and unencrypted protocols, and vulnerable versions of Rockwell controllers and main switches. With so many devices and equipment connected to the network onsite and offsite, facility management is unsure of what all assets they have and where they are. The ICS were found to be misconfigured and left vulnerable to outside control.
Julie Security forms a strategy to remotely connect Company Y’s OT and IoT networks to our AI-driven threat detection and monitoring platform. The strategy begins with performing a complete network scan to detect threats and map all assets. Our Intrusion Detection platform will then monitor the network and analyze traffic, sending reports to the team along the way. Julie will implement network segmentation to prevent lateral movement of attackers to the rest of the network. Next, our team will deploy firewall rules, update firmware on the main switch, and implement the use of secure versions of the protocols. Then, the team completes an ICS risk assessment to secure the building control systems.