Content area
Abstract
User account and credential management. Let's take the hypothetical example of Joe, a recently fired and disgruntled employee. Joe was hired to work as an operator by the city. After being hired he was given a username and password to log onto the city's network. When he reported for duty at the water treatment plant, he was given another username and password to access the ICS network, including remote access so he could check on the system during his on-call shift.