How to provide protection for Operational Technology environments

Description

SonicWall provides a variety of security signatures for Operational Technology environments. Examples of Operational Technology include:

  • Supervisory control and data acquisition systems (SCADA)
  • Distributed control systems (DCS)
  • Computer numerical control (CNC) systems
  • Scientific equipment
  • Lighting controls
  • Industrial control systems
  • Building management systems
  • Fire control systems
  • Programmable logic controllers (PLCs)

SonicWall currently has 1,206 signatures that provide protection for Operational Technology environments of which:

  • IoT-ATTACKS (exploit detection) - 614
  • IoT Apps - 54
  • SCADA-ATTACKS (exploit detection) - 433
  • SCADA  Apps - 105

Resolution

To enable App control perform the following:

  1. Login to the firewall and navigate to Policy
    Image

  2. Click on Security Services | App Control and then Enable App Control and click Accept 
    Image

  3. Next, click the Signatures tab 
  4. Click the Category drop-down and select SCADA-APPS
    Image
  5. Select and edit which apps should be blocked.

To enable IPS perform the following:

  1. Click Intrusion Prevention and then Enable IPS. Next click Accept.
    Image

  2. Next, click Signatures and then under the category field select SCADA-ATTACKS
    Image

  3. Select and edit the apps that should be blocked.


NOTE:
Ensure that App control and IPS are enabled on the zone. Go to the Objects tab and then Zones to confirm.

Related Articles

  • How to block ICMP (Ping ) using Application control
    Read More
  • SonicWall GEN8 TZ and NSa Firewalls FAQ
    Read More
  • How to configure Link Aggregation
    Read More
not finding your answers?