Use Case

Technology Planning: SCADA Security

Research Hub > Technology Planning: SCADA Security
The Process of Protecting Your Connected Networks from Cyberattack
May 17, 2021

Energy and utility companies need comprehensive visibility and control over interconnected SCADA networks in order to balance user access with critical infrastructure security. To achieve this goal, you need to strategically plan each stage of your technology journey.

A Guide to Mapping Your SCADA Security Journey

PHASE 1

Gap Analysis

Conducting a gap analysis is a critical first step to improving risk management.

  • Measure your SCADA security practices against the NIST SP 800-82 cybersecurity framework.
  • Identify gaps in compliance in key areas such as access control, password change management and physical security.
  • Prioritize vulnerabilities based on a clear understanding of your environment.
Close up image of a man working on a laptop device..
Close up image of a man with glasses reviewing a device screen.
PHASE 2

Mitigation

Develop a mitigation strategy to remediate the weaknesses identified through the gap analysis.

  • Properly document all risks.
  • Develop comprehensive policies and procedures to strengthen security.
  • Create playbooks to ensure consistent compliance with established security standards and in cyberattack responses.
  • Optimize existing security tools or acquire new ones as needed, such as automated vulnerability assessment and reporting, password management and network access control.
PHASE 3

Monitoring and Maintenance

Continually reevaluate your security tools and risks to protect against cyberthreats and determine how to maximize resource allocation.

  • Conduct regular penetration testing to track emerging vulnerabilities.
  • Install all security patches on a timely basis.
  • Provide security training to all employees on a consistent basis.
  • Repeat a gap analysis/review on an annual basis.

Woman typing on a keyboard and using a computer mouse.

Next step: Give us a call to get started on your journey.

CDW Amplified™ Services

CDW security experts can assess vulnerabilities and mitigate risk.

See how

CDW Penetration Testing

Learn how CDW can advise you on your security posture.

Take action

Cybersecurity Compliance

Are you prepared to meet the newest NIST standards?

Learn more

Learn more about how CDW can help you proactively protect your SCADA system against escalating cyberthreats.

Contact your account team, or give us a call.

800.800.4239

Learn more about how CDW can help you proactively protect your SCADA system against escalating cyberthreats.

Contact your account team, or give us a call.

You May Also Like

Article
Making Sense of Security Assessments
A fresh set of eyes can help enterprises to shore up cyber vulnerabilities
Use Case
NIST Framework Outlines Cybersecurity Best Practices
See how you can achieve NIST framework compliance and create a cybersecurity strategy for your business that's based on best practices.
Use Case
Stateful vs. Stateless Firewalls: What's the Difference?
What's the difference between a stateful and a stateless firewall? Which one is the best choice to protect your business?

MKT50197