A recommended default rule for IACS firewalls is to block all traffic by default, and then allow only the necessary and authorized traffic based on the security policy and the zone and conduit model. This is also known as the principle of least privilege, which means granting the minimum access required for a legitimate purpose. Blocking all traffic by default provides a higher level of security and reduces the attack surface of the IACS network. The other choices are not recommended default rules for IACS firewalls, as they may expose the IACS network to unnecessary risks. Allowing all traffic by default would defeat the purpose of a firewall, as it would not filter any malicious or unwanted traffic. Allowing IACS devices to access the Internet would expose them to potential cyber threats, such as malware, phishing, or denial-of-service attacks. Allowing traffic directly from the IACS network to the enterprise network would bypass the demilitarized zone (DMZ), which is a buffer zone that isolates the IACS network from the enterprise network and hosts services that need to communicate between them. References:
ISA/IEC 62443 Standards to Secure Your Industrial Control System training course1
ISA/IEC 62443 Cybersecurity Fundamentals Specialist Study Guide2
Using the ISA/IEC 62443 Standard to Secure Your Control Systems3
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit