ICS Integrity monitors, detects, and remediates unauthorized configuration changes with the following capabilities:
-
Changes: Monitors for unauthorized changes to control strategies, inventories, asset configuration, and logical and graphical files. Automates remediation actions through workflows based on asset value and risk guiding operations, compliance, and cybersecurity responses.
-
Policies: Maintains security and operational imperatives through configuration policies, alerts, and workflows using asset-specific incident responses.
-
Baselines: Defines the set of configuration data required for ICS cybersecurity, compliance, governance, and operations change monitoring.