Table Of Contents - GE IPC2018 Deployment Manual

Table of Contents

Advertisement

Contents
1 Introduction ....................................................................................................................................... 7
2 Security and Secure Deployment................................................................................................. 9
2.1 What is Security?.....................................................................................................................................9
2.2 I have a Firewall: Isn't that Enough? ...........................................................................................................9
2.3 What is Defense in Depth? ........................................................................................................................9
2.4 General Recommendations ........................................................................................................................9
2.5 Checklist.............................................................................................................................................. 10
3 IPC2018 IPC Functional Overview.............................................................................................. 11
3.1 IPC2018 with iFix ................................................................................................................................. 11
3.2 IPC2018 with CIMPLICITY.................................................................................................................... 11
3.3 Platform Configuration and Hardening....................................................................................................... 11
4 Network Architecture and Secure Deployment ...................................................................... 13
4.1 Reference Architecture ........................................................................................................................... 13
4.2 Demilitarized Zones (DMZ)..................................................................................................................... 13
5 Other Considerations .................................................................................................................... 15
5.1 Anti-virus software ................................................................................................................................ 15
5.2 Data Execution Prevention (DEP) ............................................................................................................. 15
5.3 Patching............................................................................................................................................... 15
5.3.1 Patching GE Proficy Software ........................................................................................................... 15
5.3.2 Patching third-party Software ............................................................................................................ 15
5.4 Additional Guidance .............................................................................................................................. 16
5.4.1 Protocol-specific Guidance ............................................................................................................... 16
5.4.2 Government Agencies and Standards Organizations............................................................................... 16
For public disclosure
GFK-3015 Secure Deployment Guide 5

Advertisement

Table of Contents
loading

Table of Contents