GNSEC Academy

Welcome to the next generation of e-learning

IACS Security

Industrial Control and Automation Systems (IACS or ICS) - from ShopFloor to TopFloor

Security of IACS systems is one of the oldest core competences of GNSEC - whether audits in any complexity, the hardening of PLCs or the testing of wireless networks in a manufacturing plant. We create concepts for a secure remote connection of maintenance teams or we find weaknesses in the robot production of your compay. And all this now for more than 30 years all arround the world.

Between ICT - Information Communication Technology or better known as office systems - and Industrial and Automation Control Systems - IACS - are some very significant differences. And now we have a new player in the game: IoT - which makes things not easier. Check our services or contact us for more detailed informations.

Our ICS related services at a glance

IACS Security Assessments

We offer hollistic Assessments for IACS Systems - from an isolated system like a robot controled production line to a full plant, based on IEC 62443-3-2 and our experiences

    Our Services:

  • Full Communication and Risk Analysis
  • Based on IEC 622443-3-2 and our own experiences
  • Full Customer Integration in all phases (Octave Method)
  • Zero-Trust Model (there is no "good" site)
  • Protocol Analysis and Fuzzing
  • Siematic Security and PEN Testing
  • Attack Visualization (Attack Graphs, Threat Trees etc)
  • Wireless Communicaton Analysis / Testing / Interception

IACS Security Architecture

We design secure plant networks based on the IEC 62443 reference model using modern network technology, including Network Authorization, NG Firewalls and SDN's.

    Our Services:

  • IACS Security Architecture
  • Secure Network Level Design based on ISA reference model
  • Design of Security Levels, Zones and Conduits
  • Design and Engineering of Cybersecurity Countermeasures
  • High Security Network Design with Unidirectional Gateways
  • Advanced Security Measures MAC / AppArmor / RBAC /
  • Monitoring and Interceptions
  • Virtualization Concepts
  • Siematic Security Concept / Hardening
  • Encryption

IACS Security Governance

A Security Program for IACS is as important as a leveled security design. The importance of security guidelines are often underestimated - but they are crucial to enforcing a security architecture.

    Our Services:

  • Development of an IASC Security Program
  • Development of an IASC Security Policy Control Framework
  • Development of security guidelines based on IEC 62443 or NIST 800-82
  • Security Awareness Training

Modern ICS/IoT Training

We offer a wide range of special ICS/IOT related trainings, from virtual classes to fully LMS based courses. We develop the course material with you and take care of your special requirements.

    Our Services:

  • General Purpose ICS e-learning modules
  • Fully customized trainings, based on business needs and sector
  • Full hosting of ICS and IoT related Trainings for up to 3000 User
  • Development of a learning strategy
  • Global Training concept in many different language including diff chinese dialects