Communiquez avec les autres et partagez vos connaissances professionnelles

Inscrivez-vous ou connectez-vous pour rejoindre votre communauté professionnelle.

Suivre

Data-Diodes security Best Practices?

What are the Best Practices of Data-Diodes security Architectures deployement: in Protecting Industrial Systems, Data Storage, Security Operations Centers SOC, ...

user-image
Question ajoutée par Hemza ATOUB , Sr. CYBER SECUIRITY Consultant IT/OT Certified IBM QRadar| Arcsight SIEM | ISO 27k1 | ICS | 20 CSC , CONFIDENTIAL
Date de publication: 2017/04/19
abdul nadeem shaikh
par abdul nadeem shaikh , project engineer /project manager electrical , different companies in different times

Security Operation Centers

ROBINSON REYES
par ROBINSON REYES , IT Engineer - Level 2 , Technology Elite

in an enterprise environment a hardware and software firewall implementation is a must. Hard restrictions and continuous monitoring of network activity should  be carried out  in compliance with the business structure.

Oren Shani
par Oren Shani , CEO , Vado Data Diode

  1. The world > Firewall > data diode  No 1 > content filtering > Data Diode No 2 > LAN
  2. Industrial Systems: Engineering LAN > Data Diode > Public network/LAN
  3. Security Operations Centers: Difrent clasifed LANs > individial data diodes > SOC.

Chinenye Nwankwo
par Chinenye Nwankwo , Data Acquisition Engineer/ welltest Operator , Rofnel Energy Services limited

The best Practices of Data-Diodes Security Architectures deployment is real time continuos data monitoring and analysis.

Khaled Al Ali
par Khaled Al Ali , IT Manager , Halabi Holding Group

Monitoring Data-Diods in realtime is the best practice to keep it protected.

Wissam Khabbaz
par Wissam Khabbaz , Manager cyber security architecture , Abu Dhabi Islamic Bank

since diodes doesn't support TCP (bi-directional communication) using logging solutions will not work efficiently unless you deployed a firewall on CCAs traffic preferred @ perimeters both traffic and config changes  should be monitored and it require of expert ppl @ monitoring team to review configuration changes and perform analytics(profiling) in real time 

Mabrouk Hamouda
par Mabrouk Hamouda , Comptable , Port skikda

Sécurity opérations centrés soc

More Questions Like This