Skip to main content

AWS Solutions Library

Guidance for Securing Operational Technology (OT) Assets with Dragos on AWS

Reduce attack surface and vulnerabilities with a cybersecurity solution to protect your critical infrastructure

Overview

This Guidance demonstrates how to monitor the connectivity between operational technology (OT), IT, or external networks to ensure the security and integrity of critical industrial systems. It provides centralized monitoring and threat management for connected assets, enabling you to identify and prioritize risks to your OT environment with a holistic view of your assets and threat detection capabilities. This Guidance also supports auditing and compliance regulations, with its comprehensive monitoring and reporting capabilities. It generates detailed reports on asset inventory, vulnerabilities, security events, and timeline-based auditing of network communications, reducing your security risk while helping you meet compliance requirements.

How it works

This architecture diagram shows how to use the cybersecurity platform Dragos to secure operational technology (OT) assets at various manufacturing sites.

Benefits

Detect and respond to cybersecurity threats across industrial control systems and manufacturing networks. Gain comprehensive visibility into operational technology environments while maintaining production continuity and safety.

Consolidate threat detection and incident response across multiple manufacturing sites from a single console. Enable your security teams to monitor and protect distributed operations with consistent policies and centralized analytics.

Identify security anomalies in near real-time using automated monitoring and machine learning-powered analysis. Reduce investigation time by correlating operational technology and enterprise security events in one unified view.

Disclaimer

The sample code; software libraries; command line tools; proofs of concept; templates; or other related technology (including any of the foregoing that are provided by our personnel) is provided to you as AWS Content under the AWS Customer Agreement, or the relevant written agreement between you and AWS (whichever applies). You should not use this AWS Content in your production accounts, or on production or other critical data. You are responsible for testing, securing, and optimizing the AWS Content, such as sample code, as appropriate for production grade use based on your specific quality control practices and standards. Deploying AWS Content may incur AWS charges for creating or using AWS chargeable resources, such as running Amazon EC2 instances or using Amazon S3 storage.

Did you find what you were looking for today?

Let us know so we can improve the quality of the content on our pages