Loading

Securing Industrial Control Systems

Enhancing the protection of people, property, and information
Team of Industrial Engineers Lean on Office Table, Analyze Machinery Blueprints, Architectural Problem Solving, Consult Project on Tablet Computer, Inspect Metal Component. Flat Lay Top Down View
Securing Industrial Control Systems
Enhancing the protection of people, property, and information
Cybersecurity
    • Overview
    • Overview
    • Overview
    • Zero Trust
    • Zero Trust
    • Identity & Access Management
    • Identity & Access Management
    • IT / OT Convergence
    • IT / OT Convergence
    • CIP Security
    • CIP Security
    • Technology & Certification
    • Technology & Certification
    • Security & LifecycleIQ
    • Security & LifecycleIQ
    • Secure Digital Transformation
    • Secure Digital Transformation
    • NIST Cybersecurity Framework
    • NIST Cybersecurity Framework
    • Overview
    • Overview
    • Overview
    • Managed Services
    • Managed Services
    • Threat Detection
    • Threat Detection
    • Incident Response
    • Incident Response
    • SOC as a Service
    • SOC as a Service
    • IT Cybersecurity Services
    • IT Cybersecurity Services
    • Endpoint Protection
    • Endpoint Protection
    • Overview
    • Overview
    • Overview
    • Critical Infrastructure
    • Critical Infrastructure
    • Life Sciences
    • Life Sciences
    • Automotive
    • Automotive
    • Manufacturing
    • Manufacturing
    • Food & Beverage
    • Food & Beverage
    • Mining
    • Mining
    • Overview
    • Overview
    • Overview
    • Advisories & Support
    • Advisories & Support
    • Design & Planning
    • Design & Planning
    • Network Security
    • Network Security
    • Penetration Testing
    • Penetration Testing
    • Respond & Recover
    • Respond & Recover
    • Risk Assessment
    • Risk Assessment
    • Vulnerability Assessment
    • Vulnerability Assessment
  • World Class Partners
    • Blogs
    • Blogs
    • Press Releases
    • Press Releases
    • Webinars
    • Webinars
    • Whitepapers
    • Whitepapers

Identifying and mitigating industrial security risks are essential considerations for all industrial control systems (ICS) to enhance the protection of people, property, and information. Rockwell Automation provides ICS security owners OT patch management and product/system upgrade programs to keep these systems current. Additionally, we communicate timely and actionable information through security advisories to keep security teams alerted to issues that can impact ICS.


Security Alerts and Advisories

The importance of securing Industrial Control Systems

As the world leader in industrial automation, Rockwell Automation recognizes the importance of protecting industrial control systems. We build ever-increasing levels of security in our products to better defend and preserve your production operations.

For this reason, our security design, testing, and manufacturing processes are complemented with a continual improvement process, helping to address and communicate risks we may learn about well after our products are put to use.

When product security vulnerabilities are reported, an incident response process is activated to investigate, determine appropriate mitigations, and communicate timely information to customers. Rockwell Automation actively works with research communities to identify and resolve vulnerabilities and with national response organizations, such as the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), to communicate and notify the broader industrial community.

As threats evolve, security becomes a collaborative necessity. Our transparency is meant to drive awareness and encourage customers to make informed decisions on steps they should take to improve their security.

Enabling Safe and Secure Industrial Operations
Three Heavy Industry Engineers Stand in Pipe Manufacturing Factory, Use Digital Tablet Computer, Have Discussion. Large Pipe Assembled. Design and Construction of Oil, Gas and Fuels Transport Pipeline
Brochure
Enabling Safe and Secure Industrial Operations

Security is a priority in Rockwell Automation products. Our security development lifecycle (SDL) program is TÜV Rheinland certified to meet the stringent IEC 62443-4-1 standard.

Download Now

OT Patch Management Strategy: Seven Best Practices
Industry 4.0 Factory: Two Engineers Uses Digital Tablet Computer with Augmented Reality Software Visualize 3D Model of a Jet Turbine Engine. Aircraft Maintenance and Diagnostics. High Angle Shot
Blog
OT Patch Management Strategy: Seven Best Practices

With stakes this high, effective OT patch management is paramount. Read the blog, then talk to the experts at Rockwell Automation about our OT patch management services.

Read Now

OT Patch Management Programs

Keeping systems current keeps your enterprise safer

Patch management programs must include policies, processes, and procedures to help ensure the security and operational integrity of industrial control products and systems.

Microsoft releases a range of security updates, operating systems, and other software updates to help improve security. Rockwell Automation qualifies certain Microsoft updates for software that impact our products and promotes continued planning and investment throughout the development lifecycle. This planning helps you move toward newer products and technologies, as existing product support and availability ends, or as products reach an end to their useful life.

The need to patch vulnerabilities is clear, yet handling OT patching on your own is often complex. In a recent survey of industrial security leaders, only 34% had effective OT patch management in place. Our expertise in OT patch management can help you address this complex situation, evaluating your infrastructure and recommending and/or managing the right steps.


Industrial Security Reference Architectures

Design considerations for securing industrial automation networks

Rockwell Automation collaborated with Cisco to develop Converged Plantwide Ethernet (CPwE) architecture, a proven approach to securing communications within plants and production operations.

CPwE helps prevent cyberattacks from successfully breaching networks and controllers through communications networks. CPwE is a proven approach for Man-in-the-Middle attack prevention, for example.

Rockwell Automation provides education, design guidance, and best practices around CPwE architecture. These documents supply design considerations for deploying a holistic defense in depth industrial security policy to help secure networked assets – such as the specific design considerations for the successful design and deployment of an Industrial Demilitarized Zone (IDMZ). You can also use Cisco Identity Services Engine within industrial automation plant-wide architectures.

Deploying CIP Security Through a CPwE Architecture
Industrial cybersecurity and network connectivity concept
Guide
Deploying CIP Security Through a CPwE Architecture

This Design Guide outlines several use cases for designing and deploying CIP Security technology across plant-wide or site-wide Industrial Automation and Control System (IACS) applications.

Download Now
Contact a Rockwell Automation Cybersecurity Specialist
Contact Us
Recommended for You
Loading
  • Sales
  • Customer Care
  • TechConnect Support
  • General Questions
  1. Chevron LeftChevron Left Home Chevron RightChevron Right
  2. Chevron LeftChevron Left Cap... Chevron RightChevron Right
  3. Chevron LeftChevron Left Industrial Cybersecurity Solutions Chevron RightChevron Right
  4. Chevron LeftChevron Left Cybersecurity Products and Services Chevron RightChevron Right
  5. Chevron LeftChevron Left ICS Cybersecurity Alerts & Advisories Chevron RightChevron Right