{"id":61774,"date":"2024-08-28T10:22:07","date_gmt":"2024-08-28T09:22:07","guid":{"rendered":"https:\/\/www.wallix.com\/scada-security-and-privileged-access-management-pam\/"},"modified":"2025-11-18T10:14:03","modified_gmt":"2025-11-18T09:14:03","slug":"scada-security-and-privileged-access-management-pam","status":"publish","type":"post","link":"https:\/\/www.wallix.com\/it\/blogpost\/scada-security-and-privileged-access-management-pam\/","title":{"rendered":"Sicurezza SCADA e Privileged Access Management (PAM)"},"content":{"rendered":"<div id='full_slider_1'  class='avia-fullwidth-slider main_color avia-shadow   avia-builder-el-0  el_before_av_two_third  avia-builder-el-first   container_wrap fullsize'  ><div  class='avia-slideshow av-llqm8q5m-a92c9635fd328199fa681c07aad80233 avia-slideshow-entry_without_sidebar av_slideshow_full avia-slide-slider av-slideshow-ui av-control-default av-slideshow-manual av-loop-once av-loop-manual-endless av-default-height-applied   avia-slideshow-1' data-slideshow-options=\"{&quot;animation&quot;:&quot;slide&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:5,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;bg_slider&quot;:false,&quot;keep_padding&quot;:false,&quot;hoverpause&quot;:false,&quot;show_slide_delay&quot;:0}\"  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><ul class='avia-slideshow-inner ' style='padding-bottom: 34.95867768595%;'><li  class='avia-slideshow-slide av-llqm8q5m-a92c9635fd328199fa681c07aad80233__0  av-single-slide slide-1 slide-odd'><div data-rel='slideshow-1' class='avia-slide-wrap '  title='Cyber security concept ,computer network and communication,System administrator working in laptop for develop software of data protection from hacker to protect the critical information and reduce the vulnerability in their network' ><img decoding=\"async\" fetchpriority=\"high\" class=\"wp-image-38042 avia-img-lazy-loading-not-38042\"  src=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/12\/AdobeStock_614759545-1210x423.jpeg\" width=\"1210\" height=\"423\" title='Cyber security concept ,computer network and communication,System administrator working in laptop for develop software of data protection from hacker to protect the critical information and reduce the vulnerability in their network' alt='Cyber security concept ,computer network and communication,System administrator working in laptop for develop software of data protection from hacker to protect the critical information and reduce the vulnerability in their network'  itemprop=\"thumbnailUrl\"   \/><\/div><\/li><\/ul><\/div><\/div><div id='after_full_slider_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-61774'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-4tsoow4-85e5dbd3dfac66ce73d75c8ce6a3d5aa sc-av_two_third av-equal-height-column-flextable'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4tsoow4-85e5dbd3dfac66ce73d75c8ce6a3d5aa\">\n#top .flex_column_table.av-equal-height-column-flextable.av-4tsoow4-85e5dbd3dfac66ce73d75c8ce6a3d5aa{\nmargin-top:-300px;\nmargin-bottom:0px;\n}\n.flex_column.av-4tsoow4-85e5dbd3dfac66ce73d75c8ce6a3d5aa{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-4tsoow4-85e5dbd3dfac66ce73d75c8ce6a3d5aa{\nmargin-top:-200px;\n}\n}\n<\/style>\n<div  class='flex_column av-4tsoow4-85e5dbd3dfac66ce73d75c8ce6a3d5aa av_two_third  avia-builder-el-1  el_after_av_slideshow_full  el_before_av_one_third  avia-builder-el-first  first no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lq0tkgy1-c0609d1ef79e067496304dcf647a1440\">\n#top .av-special-heading.av-lq0tkgy1-c0609d1ef79e067496304dcf647a1440{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-lq0tkgy1-c0609d1ef79e067496304dcf647a1440 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-lq0tkgy1-c0609d1ef79e067496304dcf647a1440 .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-lq0tkgy1-c0609d1ef79e067496304dcf647a1440 av-special-heading-h1 blockquote modern-quote  avia-builder-el-2  el_before_av_post_metadata  avia-builder-el-first '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Sicurezza SCADA e Privileged Access Management (PAM) <\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n<div  class='av-post-metadata-container av-av_post_metadata-36bcf33e90f22125c019c70beb35c7b9 av-metadata-container-align-left  avia-builder-el-3  el_after_av_heading  el_before_av_hr  av-metadata-container-1'><div class='av-post-metadata-container-inner'><span class=\"av-post-metadata-content av-post-metadata-meta-content\"><span class=\"av-post-metadata-content av-post-metadata-author\"  itemprop=\"author\" ><span class=\"av-metadata-before av-metadata-before-author\">by<\/span><span class=\"av-post-metadata-author-link\" ><a href=\"https:\/\/www.wallix.com\/it\/author\/alex\/\"  rel=\"author\">WALLIX<\/a><\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-modified\"><span class=\"av-post-metadata-modified-date\" >18 Novembre 2025<\/span><\/span><span class=\"av-post-metadata-content av-post-metadata-separator\">\/<\/span><span class=\"av-post-metadata-content av-post-metadata-category\"><span class=\"av-metadata-before av-metadata-before-categories\">in<\/span><span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/it\/category\/blogpost\/blog-audit-compliance-it\/\" >AUDIT &amp; COMPLIANCE<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/it\/category\/blogpost\/\" >BLOGPOST<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/it\/category\/blogpost\/industria\/\" >INDUSTRIA<\/a><\/span>, <span class=\"av-post-metadata-category-link\" ><a href=\"https:\/\/www.wallix.com\/it\/category\/blogpost\/privileged-access-management-it\/\" >PRIVILEGED ACCESS MANAGEMENT<\/a><\/span><\/span><\/span><\/div><\/div><br \/>\n<div  class='hr av-av_hr-bca31578670ae9d408d6d6d291fc57a6 hr-default  avia-builder-el-4  el_after_av_post_metadata  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-llqma02k-767714612b8604775de7db24ffad72d7 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><span data-contrast=\"auto\">Gli impianti industriali e le utility di energia utilizzano comunemente il ben consolidato framework SCADA (Supervisory Control and Data Acquisition) per gestire i loro sistemi di Tecnologia Operativa (OT). Negli ultimi anni, l&#8217;esposizione al rischio informatico di SCADA \u00e8 aumentato con l&#8217;avvento di Internet e l&#8217;abilitazione IP degli elementi dei sistemi SCADA tradizionalmente isolati.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Il framework di sicurezza SCADA raccomanda controlli per contrastare il rischio di attacchi informatici ai sistemi SCADA, attacchi che possono causare gravi danni e persino la perdita di vite umane. I controlli di accesso, inclusa la gestione degli accessi privilegiati (<\/span><a href=\"https:\/\/www.wallix.com\/it\/gestione-degli-accessi-privilegiati\/\"><span data-contrast=\"none\">PAM<\/span><\/a><span data-contrast=\"auto\">), sono elementi fondamentali della sicurezza SCADA, proteggendo i sistemi industriali dagli attori malintenzionati.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<blockquote>\n<p><b><span data-contrast=\"none\">\u201cSCADA \u00e8 il framework in atto per gestire e prevenire gli attacchi informatici sui sistemi di tecnologia operativa come impianti industriali e utility di energia.\u201d<\/span><\/b><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<\/blockquote>\n<p><b><span data-contrast=\"auto\">Che cos&#8217;\u00e8 SCADA?<\/span><\/b><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">SCADA \u00e8 un framework tecnologico maturo che comprende svariati dispositivi e applicazioni software. Collettivamente, le tecnologie guidate da SCADA formano una sorta di sistema nervoso industriale. Si trovano in fabbriche, centrali elettriche e ospedali. Gestiscono anche i sistemi di riscaldamento e condizionamento dell&#8217;aria negli edifici. Combinando sensori con computer di supervisione e Unit\u00e0 Terminali Remote (RTU), monitorano e controllano i processi fisici. Ad esempio, il sistema SCADA di un&#8217;acciaieria pu\u00f2 rilevare quando l&#8217;acciaio fuso \u00e8 abbastanza caldo da essere colato e poi attivare attuatori che fanno fluire l&#8217;acciaio negli stampi. SCADA include anche interfacce macchina-uomo per la segnalazione e l&#8217;input di controllo.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Sicurezza SCADA nell&#8217;Era di Internet<\/span><\/b><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Tradizionalmente, la sicurezza SCADA non era una grande preoccupazione per i gestori di tali sistemi. Utilizzando protocolli di comunicazione proprietari e funzionando su reti isolate, i sistemi SCADA erano difficili da raggiungere e complessi da penetrare. Gli architetti della sicurezza potevano fare riferimento al &#8220;gap aereo&#8221;, la separazione completa delle reti SCADA dal mondo esterno, come una contromisura estremamente robusta contro le potenziali minacce.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Detto questo, gli impatti potenziali degli attacchi ai sistemi SCADA sono significativi. Vanno da inconvenienti come un&#8217;interruzione di corrente a vere e proprie catastrofi come la fusione del nocciolo di un reattore nucleare, il cedimento di una diga o la morte o lesioni dei lavoratori industriali. Un tempo possibilit\u00e0 remote, tali conseguenze potenzialmente disastrose sono ora pi\u00f9 probabili.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Due fattori stanno aumentando il profilo di rischio dei sistemi SCADA. Innanzitutto, il gap aereo potrebbe non essere mai stato un livello di protezione efficace come si pensava. Numerosi attacchi di alto profilo, come l&#8217;attacco Stuxnet alle strutture nucleari iraniane, hanno rivelato che gli hacker possono accedere ai sistemi isolati utilizzando l&#8217;ingegneria sociale, le unit\u00e0 USB e tecniche simili.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Tuttavia, lo sviluppo pi\u00f9 importante \u00e8 la tendenza a dotare le tecnologie SCADA del Protocollo Internet (IP). Questa \u00e8 una mossa completamente comprensibile, dato quanto sia diffuso e conveniente l&#8217;IP. Ora, i sistemi SCADA possono essere completamente accessibili via Internet, con tutta la flessibilit\u00e0 e la portata che ci\u00f2 implica. Tuttavia, da una prospettiva di sicurezza, \u00e8 un disastro.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\u201cIl passaggio ai sistemi SCADA abilitati per IP presenta un intero nuovo regno di possibilit\u00e0 per violazioni potenzialmente catastrofiche.\u201d<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Lo standard avverte ulteriormente contro l&#8217;adozione di un approccio distribuito all&#8217;autenticazione e all&#8217;autorizzazione, dove ogni sistema memorizza le proprie credenziali utente, affermando che &#8220;\u00c8 problematico in quanto non si adatta bene all&#8217;aumento delle dimensioni del sistema.&#8221; Nota inoltre: &#8220;Ad esempio, se un utente lascia l&#8217;organizzazione, l&#8217;account utente corrispondente deve essere rimosso da ciascun sistema individualmente.&#8221; Con il controllo centralizzato sugli utenti privilegiati, PAM pu\u00f2 disattivare l&#8217;accesso dell&#8217;utente quando quest&#8217;ultimo lascia l&#8217;organizzazione. <\/span><a href=\"https:\/\/www.wallix.com\/it\/gestione-degli-accessi-privilegiati\/\"><span data-contrast=\"none\">La soluzione PAM <\/span><\/a><span data-contrast=\"auto\">risponde alla necessit\u00e0 suggerita dal standard, che afferma, &#8220;L&#8217;autorizzazione \u00e8 applicata da un meccanismo di controllo degli accessi.&#8221;<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">La Soluzione PAM di WALLIX Bastion<\/span><\/b><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.wallix.com\/it\/gestione-degli-accessi-privilegiati\/\"><span data-contrast=\"none\">WALLIX Bastion<\/span><\/a><span data-contrast=\"auto\">, ad esempio, fornisce ai gestori SCADA un tale meccanismo. L\u2019Access Manager consiste in un centro di controllo centralizzato per tutti gli accessi privilegiati in tutto l&#8217;ecosistema SCADA. Gli utenti privilegiati accedono all\u2019Access Manager per eseguire operazioni di account privilegiati sui dispositivi SCADA. Con il Password Manager, gli utenti privilegiati non hanno bisogno di conoscere la password fisica effettiva del dispositivo. Questo impedisce agli utenti di compromettere accidentalmente o intenzionalmente un dispositivo fisico utilizzato nel controllo industriale.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Il Session Manager registra le sessioni degli account privilegiati. Rende i log e i video delle sessioni disponibili ai team di Security Operations (SecOps) in caso di incidente di sicurezza. Il Session Manager fornisce risposte alle domande pi\u00f9 urgenti che sorgono in tali momenti: chi ha fatto cosa, quando e su quale sistema. Senza questo tipo di registrazione delle sessioni, i SecOps possono sprecare tempo prezioso cercando di capire tali fattori causali di base in una violazione o un atto di sabotaggio.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">PAM \u00e8 Cruciale nell&#8217;Applicazione del Framework SCADA<\/span><\/b><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">La sicurezza SCADA \u00e8 un argomento serio e complesso. La posta in gioco \u00e8 alta, con il pubblico a rischio se le minacce non sono adeguatamente mitigate. PAM emerge come un elemento critico di una strategia di sicurezza SCADA. \u00c8 direttamente necessario per proteggere l&#8217;accesso amministrativo sensibile ai sistemi SCADA. PAM supporta anche indirettamente molti altri controlli richiesti dallo standard NIST. Il patching, ad esempio, funziona solo quando PAM \u00e8 in atto. Altrimenti, sarebbe impossibile tracciare efficacemente il patching. PAM \u00e8 un fattore chiave di successo per una robusta sicurezza SCADA.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Sei interessato a saperne di pi\u00f9 su come WALLIX Bastion \u00e8 in grado di applicare il framework SCADA utilizzando funzionalit\u00e0 PAM robuste? Contattaci per ulteriori informazioni.<\/span><span data-ccp-props=\"{\">\u00a0<\/span><\/p>\n<\/div><\/section><\/p><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4amy0kk-38127a2ad69e442270cfeefcb71220fd\">\n#top .flex_column_table.av-equal-height-column-flextable.av-4amy0kk-38127a2ad69e442270cfeefcb71220fd{\nmargin-top:-300px;\nmargin-bottom:0px;\n}\n.flex_column.av-4amy0kk-38127a2ad69e442270cfeefcb71220fd{\npadding:50px 50px 50px 50px;\nbackground-color:#ffffff;\n}\n\n@media only screen and (max-width: 479px){ \n#top .flex_column_table.av-equal-height-column-flextable.av-4amy0kk-38127a2ad69e442270cfeefcb71220fd{\nmargin-top:-200px;\n}\n}\n<\/style>\n<div  class='flex_column av-4amy0kk-38127a2ad69e442270cfeefcb71220fd av_one_third  avia-builder-el-6  el_after_av_two_third  avia-builder-el-last  no_margin flex_column_table_cell av-equal-height-column av-align-top  '     ><p><div  class='av-social-sharing-box av-3zr4nd0-c7585511e62493116b27dce39dcc3cfe av-social-sharing-box-default  avia-builder-el-7  el_before_av_hr  avia-builder-el-first  av-social-sharing-box-fullwidth'><div class=\"av-share-box\"><h5 class='av-share-link-description av-no-toc '>Condividi questa voce<\/h5><ul class=\"av-share-box-list noLightbox\"><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Condividi su X\" href='https:\/\/twitter.com\/share?text=Sicurezza%20SCADA%20e%20Privileged%20Access%20Management%20%28PAM%29&#038;url=https:\/\/www.wallix.com\/it\/?p=61774' data-av_icon='\ue932' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Condividi su X'><span class='avia_hidden_link_text'>Condividi su X<\/span><\/a><\/li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target=\"_blank\" aria-label=\"Condividi su LinkedIn\" href='https:\/\/linkedin.com\/shareArticle?mini=true&#038;title=Sicurezza%20SCADA%20e%20Privileged%20Access%20Management%20%28PAM%29&#038;url=https:\/\/www.wallix.com\/it\/blogpost\/scada-security-and-privileged-access-management-pam\/' data-av_icon='\ue8fc' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Condividi su LinkedIn'><span class='avia_hidden_link_text'>Condividi su LinkedIn<\/span><\/a><\/li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label=\"Condividi attraverso Mail\" href='mailto:?subject=Sicurezza%20SCADA%20e%20Privileged%20Access%20Management%20%28PAM%29&#038;body=https:\/\/www.wallix.com\/it\/blogpost\/scada-security-and-privileged-access-management-pam\/' data-av_icon='\ue805' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Condividi attraverso Mail'><span class='avia_hidden_link_text'>Condividi attraverso Mail<\/span><\/a><\/li><\/ul><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3dh3mck-a67bd0aaa29b5c7b8830a014828b73ce\">\n#top .hr.hr-invisible.av-3dh3mck-a67bd0aaa29b5c7b8830a014828b73ce{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-3dh3mck-a67bd0aaa29b5c7b8830a014828b73ce hr-invisible  avia-builder-el-8  el_after_av_social_share  el_before_av_heading '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-36r523o-fed0ace6d0e285ca12ef7dbf2e11fddc\">\n#top .av-special-heading.av-36r523o-fed0ace6d0e285ca12ef7dbf2e11fddc{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-36r523o-fed0ace6d0e285ca12ef7dbf2e11fddc .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-36r523o-fed0ace6d0e285ca12ef7dbf2e11fddc .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-36r523o-fed0ace6d0e285ca12ef7dbf2e11fddc av-special-heading-h3 blockquote modern-quote  avia-builder-el-9  el_after_av_hr  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Contenuti correlati<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-2kbgeuc-45728acca01b7d68107936d444d27fc3\">\n#top .hr.hr-invisible.av-2kbgeuc-45728acca01b7d68107936d444d27fc3{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-2kbgeuc-45728acca01b7d68107936d444d27fc3 hr-invisible  avia-builder-el-10  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-1\"  class='av-magazine av-1xl690k-e6a218db4f565c2744eff7523acc1c14  avia-builder-el-11  el_after_av_hr  el_before_av_heading   avia-builder-el-11  el_after_av_hr  el_before_av_heading ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-68339 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Come PAM consente l&#039;implementazione di IEC 62443\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T15:28:25+01:00\" >12 Febbraio 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/blogpost\/come-pam-consente-limplementazione-di-iec-62443\/' title='Link a: Come PAM consente l&#8217;implementazione di IEC 62443'>Come PAM consente l&#8217;implementazione di IEC 62443<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-68313 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Il Legame Vitale: Gli Standard IEC-62443 nella Protezione degli Ecosistemi Cyber Industriali\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-12T13:45:30+01:00\" >12 Febbraio 2025<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/blogpost\/il-legame-vitale-gli-standard-iec-62443-per-la-protezione-dei-cyberecosistemi-industriali\/' title='Link a: Il Legame Vitale: Gli Standard IEC-62443 nella Protezione degli Ecosistemi Cyber Industriali'>Il Legame Vitale: Gli Standard IEC-62443 nella Protezione degli Ecosistemi Cyber Industriali<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-62794 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: NIS2: Obblighi, sanzioni e costi per le organizzazioni dell&#039;UE\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-09-17T09:54:47+01:00\" >17 Settembre 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/blogpost\/nis2-obligations-fines-and-costs-for-eu-organisations\/' title='Link a: NIS2: Obblighi, sanzioni e costi per le organizzazioni dell&#8217;UE'>NIS2: Obblighi, sanzioni e costi per le organizzazioni dell&#8217;UE<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-61774 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Sicurezza SCADA e Privileged Access Management (PAM)\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-08-28T10:22:07+01:00\" >28 Agosto 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/blogpost\/scada-security-and-privileged-access-management-pam\/' title='Link a: Sicurezza SCADA e Privileged Access Management (PAM)'>Sicurezza SCADA e Privileged Access Management (PAM)<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1kthguc-c4b629a25f8d68bf594e8064ec69070e\">\n#top .av-special-heading.av-1kthguc-c4b629a25f8d68bf594e8064ec69070e{\npadding-bottom:10px;\n}\nbody .av-special-heading.av-1kthguc-c4b629a25f8d68bf594e8064ec69070e .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n.av-special-heading.av-1kthguc-c4b629a25f8d68bf594e8064ec69070e .av-subheading{\nfont-size:15px;\n}\n<\/style>\n<div  class='av-special-heading av-1kthguc-c4b629a25f8d68bf594e8064ec69070e av-special-heading-h3 blockquote modern-quote  avia-builder-el-12  el_after_av_magazine  el_before_av_hr '><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >Risorse correlate<\/h3><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-4ukxhg-ecfe8f1b1e7cb7ca9d7a875f85fdbff6\">\n#top .hr.hr-invisible.av-4ukxhg-ecfe8f1b1e7cb7ca9d7a875f85fdbff6{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-4ukxhg-ecfe8f1b1e7cb7ca9d7a875f85fdbff6 hr-invisible  avia-builder-el-13  el_after_av_heading  el_before_av_magazine '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<div  id=\"avia-magazine-2\"  class='av-magazine av-jcb2w4-17f8dab1b628409eb8bc0c0e2bdc0aa4  avia-builder-el-14  el_after_av_hr  avia-builder-el-last   avia-builder-el-14  el_after_av_hr  avia-builder-el-last ' ><div class='av-magazine-group sort_all'><article class='av-magazine-entry av-magazine-entry-id-63647 av-magazine-format-standard av-magazine-type-post av-magazine-entry-1 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Proteggi le tue strutture sanitarie con il programma CaRE!\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-10-04T09:46:40+01:00\" >4 Ottobre 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/risorse\/whitepaper-it\/proteggi-le-tue-strutture-sanitarie-con-il-programma-care\/' title='Link a: Proteggi le tue strutture sanitarie con il programma CaRE!'>Proteggi le tue strutture sanitarie con il programma CaRE!<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-61251 av-magazine-format-standard av-magazine-type-post av-magazine-entry-2 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: GARANTIRE IL FUTURO: Salvaguardare gli ambienti OT nell\u2019industria manifatturiera italiana e non solo\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-08-09T10:32:59+01:00\" >9 Agosto 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/risorse\/whitepaper-it\/whitepaper-audit-compliance-it\/garantire-il-futuro-salvaguardare-gli-ambienti-ot-nellindustria-manifatturiera-italiana-e-non-solo\/' title='Link a: GARANTIRE IL FUTURO: Salvaguardare gli ambienti OT nell\u2019industria manifatturiera italiana e non solo'>GARANTIRE IL FUTURO: Salvaguardare gli ambienti OT nell\u2019industria manifatturiera italiana e non solo<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-60634 av-magazine-format-standard av-magazine-type-post av-magazine-entry-3 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Proteggi le tue operazioni di produzione dai cyber attacchi\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-07-22T11:13:25+01:00\" >22 Luglio 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/risorse\/whitepaper-it\/whitepaper-audit-compliance-it\/proteggi-le-tue-operazioni-di-produzione-dai-cyber-attacchi\/' title='Link a: Proteggi le tue operazioni di produzione dai cyber attacchi'>Proteggi le tue operazioni di produzione dai cyber attacchi<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-59493 av-magazine-format-standard av-magazine-type-post av-magazine-entry-4 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: Proteggere l&#039;assistenza sanitaria: 7 modi per resistere ai cyberattacchi\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-06-19T12:27:48+01:00\" >19 Giugno 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/risorse\/whitepaper-it\/proteggere-lassistenza-sanitaria-7-modi-per-resistere-ai-cyberattacchi\/' title='Link a: Proteggere l&#8217;assistenza sanitaria: 7 modi per resistere ai cyberattacchi'>Proteggere l&#8217;assistenza sanitaria: 7 modi per resistere ai cyberattacchi<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><article class='av-magazine-entry av-magazine-entry-id-58873 av-magazine-format-standard av-magazine-type-post av-magazine-entry-5 av-magazine-entry-small av-magazine-no-thumb'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class=\"av-magazine-content-wrap\"><header class=\"entry-content-header\" aria-label=\"Post: La direttiva NIS 2 non \u00e8 stata spiegata: Tutto quello che c&#039;\u00e8 da sapere sulla direttiva NIS 2\"><time class='av-magazine-time updated'  itemprop=\"datePublished\" datetime=\"2024-06-05T10:55:43+01:00\" >5 Giugno 2024<\/time><h3 class='av-magazine-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.wallix.com\/it\/risorse\/whitepaper-it\/nis-2-directive-unpacked\/' title='Link a: La direttiva NIS 2 non \u00e8 stata spiegata: Tutto quello che c&#8217;\u00e8 da sapere sulla direttiva NIS 2'>La direttiva NIS 2 non \u00e8 stata spiegata: Tutto quello che c&#8217;\u00e8 da sapere sulla direttiva NIS 2<\/a><\/h3><\/header><\/div><footer class=\"entry-footer\"><\/footer><\/article><\/div><\/div><\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 --><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":38042,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[1646,1642,1752,1790],"tags":[],"class_list":["post-61774","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-audit-compliance-it","category-blogpost","category-industria","category-privileged-access-management-it"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sicurezza SCADA e Privileged Access Management (PAM) - WALLIX<\/title>\n<meta name=\"description\" content=\"PAM emerges as a critical element of a SCADA security strategy, as this is an important and complex issue. Read the blog for more info!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.wallix.com\/it\/blogpost\/scada-security-and-privileged-access-management-pam\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sicurezza SCADA e Privileged Access Management (PAM) - WALLIX\" \/>\n<meta property=\"og:description\" content=\"PAM emerges as a critical element of a SCADA security strategy, as this is an important and complex issue. Read the blog for more info!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.wallix.com\/it\/blogpost\/scada-security-and-privileged-access-management-pam\/\" \/>\n<meta property=\"og:site_name\" content=\"WALLIX\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-28T09:22:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T09:14:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/12\/AdobeStock_614759545-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WALLIX\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:site\" content=\"@wallixcom\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"WALLIX\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/scada-security-and-privileged-access-management-pam\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/scada-security-and-privileged-access-management-pam\\\/\"},\"author\":{\"name\":\"WALLIX\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\"},\"headline\":\"Sicurezza SCADA e Privileged Access Management (PAM)\",\"datePublished\":\"2024-08-28T09:22:07+00:00\",\"dateModified\":\"2025-11-18T09:14:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/scada-security-and-privileged-access-management-pam\\\/\"},\"wordCount\":2717,\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/scada-security-and-privileged-access-management-pam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/AdobeStock_614759545-scaled.jpeg\",\"articleSection\":[\"AUDIT &amp; COMPLIANCE\",\"BLOGPOST\",\"INDUSTRIA\",\"PRIVILEGED ACCESS MANAGEMENT\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/scada-security-and-privileged-access-management-pam\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/scada-security-and-privileged-access-management-pam\\\/\",\"name\":\"Sicurezza SCADA e Privileged Access Management (PAM) - WALLIX\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/scada-security-and-privileged-access-management-pam\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/scada-security-and-privileged-access-management-pam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/AdobeStock_614759545-scaled.jpeg\",\"datePublished\":\"2024-08-28T09:22:07+00:00\",\"dateModified\":\"2025-11-18T09:14:03+00:00\",\"description\":\"PAM emerges as a critical element of a SCADA security strategy, as this is an important and complex issue. Read the blog for more info!\",\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/scada-security-and-privileged-access-management-pam\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/blogpost\\\/scada-security-and-privileged-access-management-pam\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/AdobeStock_614759545-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/AdobeStock_614759545-scaled.jpeg\",\"width\":2560,\"height\":1440,\"caption\":\"Cyber security concept ,computer network and communication,System administrator working in laptop for develop software of data protection from hacker to protect the critical information and reduce the vulnerability in their network\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/\",\"name\":\"WALLIX\",\"description\":\"CYBERSECURITY SIMPLIFIED\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#organization\",\"name\":\"WALLIX\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"contentUrl\":\"https:\\\/\\\/www.wallix.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/LOGO_WALLIX_2024_blackorange.png\",\"width\":3108,\"height\":827,\"caption\":\"WALLIX\"},\"image\":{\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/wallixcom\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wallix\\\/\",\"https:\\\/\\\/www.youtube.com\\\/wallix\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/#\\\/schema\\\/person\\\/8b1daa830716a62cdf5631aa0e211abd\",\"name\":\"WALLIX\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g\",\"caption\":\"WALLIX\"},\"url\":\"https:\\\/\\\/www.wallix.com\\\/it\\\/author\\\/alex\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sicurezza SCADA e Privileged Access Management (PAM) - WALLIX","description":"PAM emerges as a critical element of a SCADA security strategy, as this is an important and complex issue. Read the blog for more info!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.wallix.com\/it\/blogpost\/scada-security-and-privileged-access-management-pam\/","og_locale":"it_IT","og_type":"article","og_title":"Sicurezza SCADA e Privileged Access Management (PAM) - WALLIX","og_description":"PAM emerges as a critical element of a SCADA security strategy, as this is an important and complex issue. Read the blog for more info!","og_url":"https:\/\/www.wallix.com\/it\/blogpost\/scada-security-and-privileged-access-management-pam\/","og_site_name":"WALLIX","article_published_time":"2024-08-28T09:22:07+00:00","article_modified_time":"2025-11-18T09:14:03+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/12\/AdobeStock_614759545-scaled.jpeg","type":"image\/jpeg"}],"author":"WALLIX","twitter_card":"summary_large_image","twitter_creator":"@wallixcom","twitter_site":"@wallixcom","twitter_misc":{"Scritto da":"WALLIX","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.wallix.com\/it\/blogpost\/scada-security-and-privileged-access-management-pam\/#article","isPartOf":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/scada-security-and-privileged-access-management-pam\/"},"author":{"name":"WALLIX","@id":"https:\/\/www.wallix.com\/it\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd"},"headline":"Sicurezza SCADA e Privileged Access Management (PAM)","datePublished":"2024-08-28T09:22:07+00:00","dateModified":"2025-11-18T09:14:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/scada-security-and-privileged-access-management-pam\/"},"wordCount":2717,"publisher":{"@id":"https:\/\/www.wallix.com\/it\/#organization"},"image":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/scada-security-and-privileged-access-management-pam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/12\/AdobeStock_614759545-scaled.jpeg","articleSection":["AUDIT &amp; COMPLIANCE","BLOGPOST","INDUSTRIA","PRIVILEGED ACCESS MANAGEMENT"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.wallix.com\/it\/blogpost\/scada-security-and-privileged-access-management-pam\/","url":"https:\/\/www.wallix.com\/it\/blogpost\/scada-security-and-privileged-access-management-pam\/","name":"Sicurezza SCADA e Privileged Access Management (PAM) - WALLIX","isPartOf":{"@id":"https:\/\/www.wallix.com\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/scada-security-and-privileged-access-management-pam\/#primaryimage"},"image":{"@id":"https:\/\/www.wallix.com\/it\/blogpost\/scada-security-and-privileged-access-management-pam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/12\/AdobeStock_614759545-scaled.jpeg","datePublished":"2024-08-28T09:22:07+00:00","dateModified":"2025-11-18T09:14:03+00:00","description":"PAM emerges as a critical element of a SCADA security strategy, as this is an important and complex issue. Read the blog for more info!","inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.wallix.com\/it\/blogpost\/scada-security-and-privileged-access-management-pam\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.wallix.com\/it\/blogpost\/scada-security-and-privileged-access-management-pam\/#primaryimage","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/12\/AdobeStock_614759545-scaled.jpeg","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2023\/12\/AdobeStock_614759545-scaled.jpeg","width":2560,"height":1440,"caption":"Cyber security concept ,computer network and communication,System administrator working in laptop for develop software of data protection from hacker to protect the critical information and reduce the vulnerability in their network"},{"@type":"WebSite","@id":"https:\/\/www.wallix.com\/it\/#website","url":"https:\/\/www.wallix.com\/it\/","name":"WALLIX","description":"CYBERSECURITY SIMPLIFIED","publisher":{"@id":"https:\/\/www.wallix.com\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.wallix.com\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.wallix.com\/it\/#organization","name":"WALLIX","url":"https:\/\/www.wallix.com\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.wallix.com\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","contentUrl":"https:\/\/www.wallix.com\/wp-content\/uploads\/2024\/03\/LOGO_WALLIX_2024_blackorange.png","width":3108,"height":827,"caption":"WALLIX"},"image":{"@id":"https:\/\/www.wallix.com\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/wallixcom","https:\/\/www.linkedin.com\/company\/wallix\/","https:\/\/www.youtube.com\/wallix"]},{"@type":"Person","@id":"https:\/\/www.wallix.com\/it\/#\/schema\/person\/8b1daa830716a62cdf5631aa0e211abd","name":"WALLIX","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8bf1123a19c4364709de2f7c8c881ed5f2bb750cac73f782f39aea052e526546?s=96&d=mm&r=g","caption":"WALLIX"},"url":"https:\/\/www.wallix.com\/it\/author\/alex\/"}]}},"_links":{"self":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts\/61774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/comments?post=61774"}],"version-history":[{"count":9,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts\/61774\/revisions"}],"predecessor-version":[{"id":80642,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/posts\/61774\/revisions\/80642"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/media\/38042"}],"wp:attachment":[{"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/media?parent=61774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/categories?post=61774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wallix.com\/it\/wp-json\/wp\/v2\/tags?post=61774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}