- Products
- Learn
- Local User Groups
- Partners
- More
Welcome to Maestro Masters!
Talk to Masters, Engage with Masters, Be a Maestro Master!
Join our TechTalk: Malware 2021 to Present Day
Building a Preventative Cyber Program
Be a CloudMate!
Check out our cloud security exclusive space!
Check Point's Cyber Park is Now Open
Let the Games Begin!
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
CheckFlix!
All Videos In One Space
Hi Everyone,
Time determined activities in ICS network are common in use. An anomaly can be devastating and as a result might be a threat to the ICS network. Even a simple fuzzing attack can trigger a time determined activity, harming the ICS network normal behavior. As a consequence it is required to detected or even prevented improper triggering of such activities. Logic protections on the PLC side can prevent this risk, however in most cases OT people don’t implement the required protection.
Following we will see how we can create an application based on SCADA protocol command and address which trigger the proper ICS activity , link it with a policy and detect and prevent it based on time configuration
Let consider that we manage an Industrial Control system based on Modbus protocol. The process requires a daily machinery backwash sequence at a specific time of the day. During the rest of the day we want to be advised or even to block any attempt to start the backwash sequence, as it can damage or even cause production to stop.
How we can solve this necessity with Check Point ICS solution:
For further information please contact .
Shlomi Feldman
ICS Solution Expert
Direct line: +972-73-2265136
Cell: +972-54-5583040
Thanks Eyal
I'm very curious to know how this is going to work in R80.20.. I see that the application control for Modbus was just removed in R80.20.
Do you have any information on that?
Hi Iain,
SCADA Protocols, Functions & Commands are still available in Application Control blade in R80.20. What has been (re)moved is Deep Protocol Inspection of Modbus and three other protocols that allowed 'value-based' policy i.e. the ability to do a policy not only on the protocol, function/command but the value too. This ability is now available as an API rather than a GUI function of Application Control. You can find more details in the ICS user guide
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY