The Anatomy of an Effective Nuclear Cyber Security Solution
Request Your Free White Paper Now:

"The Anatomy of an Effective Nuclear Cyber Security Solution"

Achieve cyber security and maintain compliance throughout the lifecycle with robust Security Configuration Management.

Beyond the time-consuming and expensive initial cyber security assessment it is critical to maintain the controls that have been put in place. This white paper highlights the configuration and change management capabilities required to maintain cyber controls throughout the lifecycle of the nuclear facility.

  • Configuration management and change control are mandated in cyber security guidelines, including NIST, NEI, and critical infrastructure protection.
  • For cyber security tools to comply with the NIST and NEI guidelines proper configuration change control mechanisms must be inherently and fundamentally part of the software.
  • Security Configuration Management cannot be successfully maintained in isolation. It is, by definition, embedded in the entire asset lifecycle and must form part of the fundamentals that make up an organization's asset lifecycle information man­agement (ALIM) policy.
Download this free white paper today!

Offered Free by: Bentley Systems, Inc
See All Resources from: Bentley Systems, Inc


Recommended for Professionals Like You:

Copyright © 2016 NetLine Corporation. All rights reserved.
750 University Avenue | Suite 200 | Los Gatos, CA 95032
By submitting a request, your information is subject to's Privacy Policy.
Resources: | FAQ | Legal Notices