SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThis 4th control involves the identification and inventory of all remoteaccess points and allowed destination environments, on-demand accessand MFA authentication where possible, and jump host platforms to providecontrol and monitoring points within secure segments.
Oil and natural energy consideration—Review, monitor, and limit all remote access to critical ICS assets—such as, but not limited to, modern and connected wellhead controllers and human machine interfaces (HMIs)—and allow access only in required, emergency, and time-based or scheduled remote access windows. All remote access must have MFA and best practice jump host configurations with monitors applied throughout the Purdue Levels for that access.
Watch All Parts in This Series:
Dean Parsons, CEO of ICS Defense Force, has established comprehensive ICS security programs and leading industrial-grade incident responses across sectors like telecommunications and energy. He wrote the pivotal SANS ICS Cybersecurity Field Manuals.
Read more about Dean Parsons