This site has been deprecated in favor of https://attack.mitre.org and will remain in place until 11/1/22.
Engineering Workstation
Description
The engineering workstation is usually a high-end very reliable computing platform designed for configuration, maintenance and diagnostics of the control system applications and other control system equipment. The system is usually made up of redundant hard disk drives, high speed network interface, reliable CPUs, performance graphics hardware, and applications that provide configuration and monitoring tools to perform control system application development, compilation and distribution of system modifications.1
Levels
Notes
Many engineering workstations are laptops. Because of their mobile nature, lack of desktop standard, and frequent connection to control system devices and network, engineering workstations can serve as entry points for attacks.
Techniques That Apply
- Commonly Used Port
- Data from Information Repositories
- Default Credentials
- Exploitation of Remote Services
- Hooking
- Loss of View
- Manipulation of View
- Project File Infection
- Remote Services
- Rogue Master
- Scripting
- Service Stop
- Spearphishing Attachment
- Standard Application Layer Protocol
- Transient Cyber Asset
- User Execution
- Valid Accounts
References
- ^ ICS-CERT definitions