Company XYZ recently acquired a manufacturing plant from Company ABC which uses a different
manufacturing ICS platform. Company XYZ has strict ICS security regulations while Company
ABC does not. Which of the following approaches would the network security administrator for
Company XYZ MOST likely proceed with to integrate the new manufacturing plant?
A.
Conduct a network vulnerability assessment of acquired plant ICS platform and correct all
identified flaws during integration.
B.
Convert the acquired plant ICS platform to the Company XYZ standard ICS platform solely to
eliminate potential regulatory conflicts.
C.
Conduct a risk assessment of the acquired plant ICS platform and implement any necessary or
required controls during integration.
D.
Require Company ABC to bring their ICS platform into regulatory compliance prior to
integrating the new plant into Company XYZ’s network.