У нас вы можете посмотреть бесплатно EP7: Optimizing Events and Policies in Tenable OT Security - Part 2 или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In the seventh episode of my series on Tenable OT Security, I dive deeper into the nuances of optimizing Operational Technology (OT) by effectively managing and refining policies and groups. I start by exploring the intricacies of cleaning up and managing policies in a way that makes them easily adjustable for future amendments. My focus shifts to event management, particularly on external policies and how to troubleshoot and refine them for improved operational clarity and security. Throughout this episode, I walk you through the process of filtering events, adjusting table settings for a clearer view of policy impacts, and customizing policy settings to better manage unresolved items. I introduce the concept of creating groups for managing assets coming from approved VPNs, underscoring the importance of recognizing and categorizing trusted network traffic. I stress the significance of understanding the network environment, including VPN networks and their interaction with OT assets. By creating specific asset groups and modifying policies to include these groups, I show how to reduce unnecessary policy triggers, ensuring that security measures are both effective and efficient. I explain the logic behind using "and" statements in policy conditions and promise to delve deeper into Boolean logic in future content for a clearer understanding of policy management in Tenable OT. My approach to resolving events and refining policy triggers through asset grouping, approved VPN clients, and understanding network traffic is a testament to the strategic depth required in OT security management. By the end of the episode, viewers gain insights into the meticulous process of securing OT environments, emphasizing the importance of continuous monitoring, analysis, and adjustment of security policies and practices. This episode serves as a comprehensive guide for IT and security professionals looking to deepen their understanding of OT security management, demonstrating the balance between operational functionality and security within an OT environment.