Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Mitigations
  3. Encrypt Sensitive Information

Encrypt Sensitive Information

Protect sensitive data-at-rest with strong encryption.

ID: M0941
Security Controls: IEC 62443-3-3:2013 - SR 4.1, IEC 62443-4-2:2019 - CR 4.1, NIST SP 800-53 Rev. 5 - SC-28
Version: 1.0
Created: 11 June 2019
Last Modified: 16 April 2025
ICS Layer
downloadview

Techniques Addressed by Mitigation

DomainIDNameUse
ICST0811Data from Information Repositories

Information which is sensitive to the operation and architecture of the process environment may be encrypted to ensure confidentiality and restrict access to only those who need to know.[1][2]

ICST0893Data from Local System

Information which is sensitive to the operation and architecture of the process environment may be encrypted to ensure confidentiality and restrict access to only those who need to know.[1][2]

ICST0839Module Firmware

The encryption of firmware should be considered to prevent adversaries from identifying possible vulnerabilities within the firmware.

ICST0873Project File Infection

When at rest, project files should be encrypted to prevent unauthorized changes.[2]

ICST0857System Firmware

The encryption of firmware should be considered to prevent adversaries from identifying possible vulnerabilities within the firmware.

ICST0882Theft of Operational Information

Encrypt any operational data with strong confidentiality requirements, including organizational trade-secrets, recipes, and other intellectual property (IP).

ICST0864Transient Cyber Asset

Consider implementing full disk encryption, especially if engineering workstations are transient assets that are more likely to be lost, stolen, or tampered with.[2]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp