Network Segmentation
BlackBear’s observations: Data Diodes are used to segment networks in a simple and effective way.
BlackBear’s observations: Data Diodes are used to segment networks in a simple and effective way.
Secure configuration management Authentication and tracing logs Misconfiguration is a common issue in network Cyber Security events. They may be caused by intentional or unintentional operator changes, or sometimes by attacks from external networking. According to ISA62443 specification, any networking component that can be configured dynamically should follow the below principles: 1. User identification and …
An isolated OT is not a secure OT Discover what risks the OT may pose to itself and to the enterprise We have always been led to believe that the best way to secure a network, a system, or a subnet is to isolate it from the rest of the network. In short: disconnect it. …
Firewalls vs. Data Diodes To see is to believe When talking about data Diodes, a question that people often ask is, “So, what’s the difference between firewalls and Data Diodes?” We say that the two are complementary, as Data Diodes provide additional security measures for especially vulnerable network segments. Looking into more detail, however, it …
BlackBear’s observations: Firewalls are inadequate for this type of attack, since the command format itself is valid, even though the value is incorrect.
BlackBear’s observations: Two-way communication can cause possible exposure of critical assets.