Identify baseline security controls necessary to mitigate threats in PA.
Identification should include best practices such as the following:
- Implement email and web browser protections (e.g., antivirus programs).
- Limit and control network ports, protocols, and services (e.g., network- and host-based firewalls).
- Inventory and control hardware assets.
- Inventory and control software assets (e.g., patch management, updates, service packs).
- Establish account monitoring and control.
- Separate operational technologies and business operations.
Identification may also include
- data security controls
- data recovery capabilities
- data protection
- understanding data ownership
- incident response and physical security
- incident response and management
- implementation of physical controls.
Teacher Resource:
Center for Internet Security (CIS) Links to an external site.
Process/Skill Questions:
- How are baseline (i.e., minimal) security controls identified?
- Who might set the standards for baseline security controls in PA?
- How does a host-based firewall improve security in a PA scenario?
- How should a farmer/producer, who has one Internet-linked computer for both personal use and agricultural data/business management, protect the business data from potential corruption or inadvertent loss?
- What practices are included in a comprehensive best management practices (BMP) program for an agribusiness?