Recently, I read a RFP issued by a customer. The main topic focused on a perimeter security but a paragraph mentioned the protection of SCADA environments. I’ve no practical experience with SCADA and I tried to find relevant information about the deployment of security solutions in such environments. Here follows
Tag: Protocol
Avoid the “Any” Rule Like the Plague!
Even if next generation firewalls are at our door (filtering at applications level – layer 7), most firewalls are still working with source and destination ports. I often see firewall change requests submitted by customers to add rules like: “Allow traffic between X and Y” without further details. And when