Topic

Authentication

Collection size
2 articles
Page 1 of 1
Architects Research Society
Architects Research Society
May 24, 2023 · Information Security

Best Practices for Secure Remote Access to Industrial Control Systems (ICS)

This article explains why remote access to industrial control systems is essential, outlines the risks demonstrated by high‑profile attacks, and provides detailed best‑practice guidance—including DMZ architecture, authentication, jump hosts, file transfer, and policies for direct connections—to securely manage OT environments.

AuthenticationBest PracticesICS
0 likes · 18 min read
Best Practices for Secure Remote Access to Industrial Control Systems (ICS)
Architects Research Society
Architects Research Society
Jan 29, 2022 · Information Security

Best Practices for Secure Remote Access to Industrial Control Systems (ICS)

This article explains why remote access to industrial control systems is essential, outlines the Purdue Enterprise Reference Architecture levels, and provides detailed best‑practice recommendations—including DMZ design, authentication, jump‑host usage, secure file transfer, and controls for direct connections—to mitigate the significant security risks associated with remote ICS access.

AuthenticationICSSecurity
0 likes · 19 min read
Best Practices for Secure Remote Access to Industrial Control Systems (ICS)