You Need a Blueprint to Help Mitigate Cyber Security Risks
Industrial companies looking to avoid the devastating and costly impacts of cyberattacks need a proven and consistent approach. They need a blueprint for planning, implementing and deploying industrial control system networks using industry best practices and IEC standards. ABB ICS Cyber Security Reference Architecture is that blueprint.
The ABB ICS Cyber Security Reference Architecture
The ABB ICS Cyber Security Reference Architecture is a proven and consistent approach to planning, implementing, and deploying industrial control system networks using industry best practices and IEC standards. As a template solution, it provides a common vocabulary for discussing implementations, often with the aim of stressing commonality.
The ABB ICS Cyber Security Reference Architecture is vendor agnostic and based on the IEC 62443 control system security standard to create a secure area between the production and external systems. While the architecture significantly improves cyber security posture, it is not a guarantee to pass external audits or that the system is secure.
Minimize Your Cyber Security Risks
The ABB ICS Cyber Security Reference Architecture helps you make better decisions, enable IIoT and maintain robust security. To mitigate cyber security risks, you need a solid architecture for your OT systems. That’s because your reference architecture is the keystone of OT security and your go-to document.
Make Better Decisions
Collects data from all devices without compromising security—so that you make better informed operational decisions.
Serves as an enabler for deployment of IIoT and digital services so that you continue on your path towards operational excellence.
Enables you to create zones and conduits in accordance with 62243 and other standards for increased security.
How it works
The ABB ICS Cyber Security Reference Architecture is based on the five levels found in the IEC 62443 reference model, as described in IEC 62443-1-1.
The ABB ICS Cyber Security Reference Architecture eliminates the need for an additional secure area, often called DMZ or Level 3.5, that separates the trusted area (Levels 0, 1, 2, 3) from the untrusted area (Levels 4, 5) by using Level 3 as the secure area between the trusted and untrusted areas. This unique approach reduces complexity, keeps the Architecture consistent with IEC principles while not breaking from the 62443 model, and lets communication flow from secure to unsecure areas while maintaining security.