As an ICS systems engineer, I need to provide broad, real-time access to operations data using the PI System while assuring that sensitive systems are defended appropriately via standard security zones and authorization mechanisms. So I need guidance on best practices in deployment and security as well as tools to verify them.
ADMIN RESPONSE
Aug 20, 2022
We have compiled the seven best practices for securing the PI Server in the following article: https://customers.osisoft.com/s/knowledgearticle?knowledgeArticleUrl=KB00833