ICS Access Control

A key element in ICS security is controlling the human users or other computer systems that are allowed to logically gain access to the system. Access control involves identifying the users who should have access to the system, the specific resources they should have access to, the privileges they should be granted and the enforcement of those rules.

aeSolutions can assist your organization in developing and implementing an ICS access control strategy whether it be for your corporation, plant or individual control system.