Get the Easy-to-Follow Management Guidelines for Critical Infrastructure
Are you confident your ICS network can recover quickly from network downtime?
Configuration Management
Based on the technical recommendations of the IEC 62443 standard, all event logs should be recorded. By having complete event logs, OT operators can trace any cybersecurity incident that occurs on the network and respond to the event in a timely manner. Moreover, network device configuration data should be kept confidential. If the configurations are changed without permission from the network operator, it could result in all of the data being corrupted. Therefore, configuration encryption and regular backups are very important to ensure that the network can return to normal quickly if a cybersecurity incident occurs.
Moxa’s Offering
Moxa’s MXview network management software has a job scheduler function, which helps users routinely back up the configuration data and newtork settings. Moxa also provides ABC-02 automatic backup configurators to save the configuration files, which enhances maintenance efficiency and reduces system downtime.