Identify baseline security controls necessary to mitigate threats in PA.

Identification should include best practices such as the following:

  • Implement email and web browser protections (e.g., antivirus programs).
  • Limit and control network ports, protocols, and services (e.g., network- and host-based firewalls).
  • Inventory and control hardware assets.
  • Inventory and control software assets (e.g., patch management, updates, service packs).
  • Establish account monitoring and control.
  • Separate operational technologies and business operations.

Identification may also include

  • data security controls
    • data recovery capabilities
    • data protection
    • understanding data ownership
  • incident response and physical security
    • incident response and management
    • implementation of physical controls.

Teacher Resource: 

Center for Internet Security (CIS) Links to an external site.

Process/Skill Questions:

  • How are baseline (i.e., minimal) security controls identified?
  • Who might set the standards for baseline security controls in PA?
  • How does a host-based firewall improve security in a PA scenario?
  • How should a farmer/producer, who has one Internet-linked computer for both personal use and agricultural data/business management, protect the business data from potential corruption or inadvertent loss?
  • What practices are included in a comprehensive best management practices (BMP) program for an agribusiness?