PRESS RELEASE
At this time, CISA — together with U.S. and worldwide companions — launched joint steering Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products. As a part of CISA’s Safe by Demand collection, this steering focuses on serving to prospects determine producers devoted to steady enchancment and reaching a greater value stability, in addition to how Operational Know-how (OT) homeowners and operators ought to combine safe by design parts into their procurement course of.
Crucial infrastructure and industrial management techniques are prime targets for cyberattacks. The authoring businesses warn that menace actors, when compromising OT elements, goal particular OT merchandise somewhat than particular organizations. Many OT merchandise usually are not designed and developed with Safe by Design rules and sometimes have simply exploited weaknesses. When procuring merchandise, OT homeowners and operators ought to choose merchandise from producers who prioritize safety parts recognized on this steering.
For extra data on questions to contemplate throughout procurement discussions, see CISA’s Secure by Demand Guide: How Software Customers Can Drive a Secure Technology Ecosystem. To be taught extra about safe by design rules and practices, go to Secure by Design.
Source link