This 4th control involves the identification and inventory of all remoteaccess points and allowed destination environments, on-demand accessand MFA authentication where possible, and jump host platforms to providecontrol and monitoring points within secure segments.
Oil and natural energy consideration—Review, monitor, and limit all remote access to critical ICS assets—such as, but not limited to, modern and connected wellhead controllers and human machine interfaces (HMIs)—and allow access only in required, emergency, and time-based or scheduled remote access windows. All remote access must have MFA and best practice jump host configurations with monitors applied throughout the Purdue Levels for that access.
Watch All Parts in This Series: