
ProjectX: GrayMatter Keeps New Kent ‘Ahead of the Game’ in SCADA Technology
February 25, 2022
2022 OT Cyber Snapshot
March 11, 2022
ProjectX: GrayMatter Keeps New Kent ‘Ahead of the Game’ in SCADA Technology
February 25, 2022
2022 OT Cyber Snapshot
March 11, 2022GrayMatter OT Cybersecurity Best Practices
The top nine cybersecurity best practices for industrial environments - Want to print this list out and share with your team? Download the printable checklist here:

01 | Redundancy
Domain Controllers: Minimum of two
VMWare Hosts: Minimum of two
Firewalls: Recommend HA where needed
Switches: redundant topology or cold spares


No Shared/Generic Accounts
Managed: Process for Removal
Active Directory (Utilized where applicable)
02 | Logins
03 | Password
No Default
Basic Complexity
2FA or MFA when available


Manual/Automated
Tracked and Maintained
04 | Asset Management
05 | License Management
Manual/Automated
Tracked and Maintained
Expiration Dates


Document Contacts
Clear plan for escalation
06 | Escalation/Incident Planning
07 | Backup Power
UPS - Short-term
Generator - Long-term


Local
Replicated Offsite or Secondary Site
Cold Backup to NAS
08 | DR/Backups
Download the Checklist
Want a printable version of this cyber best pratice checklist?
Download it now and share with your team.