DATAFLOW DIAGRAMS AND ICS NETWORK

Cybersecurity of an ICS network is important to secure and the first step in assessing this is to create accurate maps or data flow diagrams of the networks, the devices connected to them and normal or expected data flows. Without this initial assessment, the security of an ICS network (also known as a process control network (PCN) or SCADA network) can be severely compromised due to undocomented connections to unauthorized and unmanaged assets that are not identified in the map or data flow diagram.

ATS can help organizations develop or update these data flow diagrams using physical assessment and passive network discovery. For efficiency, this effort is combined with an ICS asset inventory and/or a cybersecurity vulnerability assessment.

ASK FOR A CONSULTATION