Performing a Cybersecurity Risk Assessment on an IACS or SIS. Marco Ayala, aesolutions John Cusimano, aesolutions
|
|
|
- Basil Harrell
- 9 years ago
- Views:
Transcription
1 Performing a Cybersecurity Risk Assessment on an IACS or SIS Marco Ayala, aesolutions John Cusimano, aesolutions
2 Abstract Assessing cybersecurity risk is generally considered to be one of the first and most fundamental steps in any solid IACS cybersecurity management program. ISA (now ISA ) published in 2009 includes requirements that organizations perform both high-level and detailed cybersecurity risk assessments on all identified IACSs. These requirements were reinforced in 2014 by the NIST Cybersecurity Framework that also specifies cybersecurity risk assessments and directly references the ISA requirements. While both of these documents require risk assessments neither provide information regarding "how" to perform such an assessment. Guidance on how to perform IACS cybersecurity risk assessments is now available in the recently developed ISA , "Security Risk Assessment and System Design This presentation will provide an overview of the standard and demonstrate the IACS cybersecurity risk assessment process through a chemical industry example.
3 Updates to Require a Security Risk Assessment
4 Updates to Require a Security Risk Assessment
5 NIST Cybersecurity Framework Start with Risk Assessment
6 NIST CSF Mapping to ISA NIST CSF ISA 62443
7 NIST CFS Mapping to ISA IDENTIFY (ID) IDENTIFY (ID)
8 Risk Assessment Requirements from ISA Select a risk assessment methodology Conduct a high-level risk assessment Identify the industrial automation and control systems Develop simple network diagrams Prioritize systems Perform a detailed vulnerability assessment Identify a detailed risk assessment methodology Identify the reassessment frequency and triggering criteria Conduct risk assessments throughout the lifecycle of the IACS Document the risk assessment
9 ISA provide guidance on how to perform IACS cybersecurity risk assessments Note: was balloted in Oct It did not receive the necessary 2/3 majority to pass. The authoring committee is processing comments and will reissue tor ballot in 2016.
10 ISA Table of Contents
11 Primary Workflow Start Initial System Architecture Diagrams and Inventory Identify System Under Consideration (SUC) (Section 4.1) Updated System Architecture Diagrams and Inventory Existing PHAs and other relevant risk assessments and Corporate Risk Matrix with Security Level Targets Conduct a High-Level Cybersecurity Risk Assessment (Section 4.2) Initial Security Level Target for SuC Standards and best practices, supplier guidelines, criticality assessments, functional specifications, etc. Partition the SUC into Zones & Conduits (Section 4.3) Initial Zone and Conduit Diagram LEGEND: Perform Detailed Cybersecurity Risk Assessment of Each Zone & Conduit (Section 5.0) Residual Cybersecurity Risk and Security Level Targets for each Zone & Conduit Company policies, regulations, tolerable risk guidelines, etc. Document Security Requirements, Assumptions and Constraints (Section 4.4) Cybersecurity Requirements Specification (CRS)
12 Establishing Zones and Conduits Requirements Description Definition of System-under- Consideration (SuC) Perform high-level risk assessment Establishment of Zones and Conduits Requirement The organization shall clearly define the System-under-Consideration (SuC) including clear definition of the boundary and all access points to the SuC. The organization shall perform a high-level cybersecurity risk assessment of the SuC (per ISA : 2009 Clause ) to identify the worst-case unmitigated risk that the SuC presents to the organization. The organization shall establish zones and conduits by grouping IACS and related assets based upon the results of the high-level cybersecurity risk assessment. Grouping may also be based on criteria such as criticality of assets, operational function, physical or logical location, required access (i.e. least privilege principals) or responsible organization.
13 Description Separation of Business and Control System Zones Separation of Safety Instrumented System (SIS) Zones Separation of temporarily connected devices Separation of Wireless Communications Separation of Devices Connected Via Untrusted Networks Requirement IACS assets shall be grouped into zones that are separate from business or enterprise system assets. SIS assets should be grouped into zones that are separate from zones with non-sis assets. Devices that are permitted to make temporary connections to the SuC should be grouped into a separate zone(s) from IACS assets. Wireless communications should be in one or more zones that are separated from wired communications. Devices that are permitted to make connections to the SuC via untrusted networks (e.g. remote access) should be grouped into a separate zone(s).
14 Description Zone and Conduit Drawings Documentation of Zone and Conduit Characteristics Requirement The organization shall produce a drawing or a set of drawings that illustrates the zone and conduit partitioning of the entire SuC. All IACS assets in the SuC must be assigned to a zone or a conduit. The following items shall be documented for each defined zone and conduit: Name and/or unique identifier Logical boundary Physical boundary, if applicable List of all access points and associated boundary devices List of data flows associated with each access point Connected zones or conduits List of assets and associated consequences Applicable security requirements Security Level Target Applicable security policies Assumptions and external dependencies
15 Description Cybersecurity requirements specification (CRS) Requirement A CRS shall be created to document mandatory security functions of the SuC based on the outcome of the detailed risk assessment as well as general security requirements based upon company or site specific policies, standards and relevant regulations. SuC Description A high level description and depiction of the System under Consideration shall be included in the CRS. At a minimum, the CRS shall include the name, a high-level description of the function and the intended usage of the SuC as well as a description of the equipment or process under control. An illustration of the SuC and the associated dataflows and process flows should be included.
16 Description Operating Environment Assumptions Threat Landscape Mandatory Security Functions Tolerable Risk Regulatory Requirements Requirement The CRS shall identify and document the physical and logical environment in which the SuC is located or planned to be located. The CRS shall include a description of the threat landscape that impacts the SuC. The description shall include the source(s) of threat intelligence and include both current and emerging threats. Security functions and features that implement the organizational security policies shall be included in the security requirements specification. The organization s tolerable risk for the SuC shall be included in the security requirements specification. Any relevant cybersecurity regulatory requirements with which the SuC must comply shall be included in the security requirements specification.
17 Detailed Cyber Risk Assessment Process Start Consider Existing Countermeasures (Section 5.7) List of Countermeasures Historical data and other threat information sources Identify Threats (Section 5.1) List of threats [updated] List of Countermeasures Re-evaluate Likelihood and Impact (Section 5.8) Updated likelihood and impact assessment Vulnerability assessment, prior audits, vulnerability databases, etc. Identify Vulnerabilities (Section 5.2) List of vulnerabilities Updated likelihood, impact and Corporate Risk Matrix Calculate Residual Cybersecurity Risk (Section 5.9) Residual Cybersecurity Risk Existing PHAs, other risk assessments Determine Consequences & Impact (Section 5.3) Assessment of impact All Risks Mitigated or Below Tolerable Risk (Section 5.10) No Apply Additional Security Countermeasures (Section 5.11) Updated List of Countermeausures Yes Lists of threats and vulnerabilities Determine Likelihood (Section 5.4) Assessment of likelihood Document Results (Section 5.12) Detailed Risk Assessment Report Likelihood, Impact, Corporate Risk Matrix Calculate Unmitigated Cybersecurity Risk (Section 5.5) Assessment of unmitigated cybersecurity risk Source: ISA Draft 5 Edit 2 Corporate Risk Matrix with Tolerable Risk Determine Security Level Target (Section 5.6) Security Level Target
18 Start Historical data and other threat information sources Identify Threats (Section 5.1) List of threats Vulnerability assessment, prior audits, vulnerability databases, etc. Identify Vulnerabilities (Section 5.2) List of vulnerabilities Existing PHAs, other risk assessments Determine Consequences & Impact (Section 5.3) Assessment of impact Lists of threats and vulnerabilities Determine Likelihood (Section 5.4) Assessment of likelihood Likelihood, Impact, Corporate Risk Calculate Unmitigated Assessment of unmitigated
19 Existing PHAs, other risk assessments Determine Consequences & Impact (Section 5.3) Assessment of impact Lists of threats and vulnerabilities Determine Likelihood (Section 5.4) Assessment of likelihood Likelihood, Impact, Corporate Risk Matrix Calculate Unmitigated Cybersecurity Risk (Section 5.5) Assessment of unmitigated cybersecurity risk Corporate Risk Matrix with Tolerable Risk Determine Security Level Target (Section 5.6) Security Level Target
20 Consider Existing Countermeasures (Section 5.7) List of Countermeasures [updated] List of Countermeasures Re-evaluate Likelihood and Impact (Section 5.8) Updated likelihood and impact assessment Updated likelihood, impact and Corporate Risk Matrix Calculate Residual Cybersecurity Risk (Section 5.9) Residual Cybersecurity Risk All Risks Mitigated or Below Tolerable Risk (Section 5.10) No Apply Additional Security Countermeasures (Section 5.11) Updated List of Countermeausures Yes Document Results (Section 5.12) Detailed Risk Assessment Report
21 Ethylene Oxide Example
22 Example HAZOP Deviation Causes Consequences Safeguards Motor failure Possible explosion SIS, Rupture disks, Loss of agitation with false due to unmixed Pressure relief valves indication oxides High Temperature High Flow Loss of circulation Loss of cooling water Meter error resulting in excess oxide flow Pump failure with false indication Possible explosion due to runaway reaction Possible explosion due to runaway reaction Possible explosion due to unmixed oxides SIS, Rupture disks, Pressure relief valves SIS, Rupture disks, Pressure relief valves SIS, Rupture disks, Pressure relief valves
23 Example System Architecture Diagram Corporate Data Center Historian ERP WAN Eng Laptop Plant Staff Laptops Control Room Printer Operator 1 Operator 2 Operator 3 Eng Workstation Router Equipment Room Tag Server A Tag Server B Batch Tank Farm / Loading & Unloading BPCS SIS
24 Partition the System into Zones and Conduits Corporate Data Center ENTERPRIZE ZONE Historian ERP PROCESS CONTROL ZONE WAN PLANT BUSINESS ZONE Eng Laptop Plant Staff Laptops Control Room Printer Operator 1 Operator 2 Operator 3 Eng Workstation Router Equipment Room Tag Server A Tag Server B Batch SIS ZONE Tank Farm / Loading & Unloading BPCS SIS
25 Example Risk Matrix Safety Environment Financial Reputation Chance Frequency g Virtually improbable and unrealistic Event could occur at some time greater than 100 years 1 Improbable Conceivably possible, but very unlikely to occur Event could occur at some time within 10 to 100 years 2 Rare Likelihood Unusual but possible Quite possible or not unusual Has occurred Has occurred or is expected or is expected to occur within to occur within 5 to 10 years 1 to 5 years 3 Unlikely 4 Possible g Likely to occur Event expected to occur more than once per year 5 Likely Medical Treatment, Minor Health Effects, First Aid Case, or Less No off site impact Potential equipment or asset damage or financial loss < $100K USD No harm or slight client concern 1 Trivial Medical Treatment with Restricted Duty or Medium Health Effects One odor or noise complaint from event Potential equipment or asset damage or financial loss $100K to $ 1M Minor harm to the Company's public reputation; or client concern 2 Minor Impact Serious illness or injury resulting in days away from work [LTI]; or a permanent partial Disability On-site or off-site environmental release to soil/ground or multiple odor or noise complaints from event Potential equipment or asset damage or financial loss $1M to $10M Harm to the Company's reputation limited to the local area via local public media reports or local industry news; significant client concern 3 Moderate Illness or injury resulting in one fatality; or permanent full disability Illness or injury resulting in multiple (2+) fatalities. On-site or off-site environmental release to surface water Major off-site impact (vapor cloud explosion, fire, major toxic gas release, major offsite environmental release, wildllife kill) Potential equipment or asset damage or financial loss $10M to $100M Potential equipment or asset damage or financial loss >$100M Harm to the Company's reputation extends to the region through regional or national public media outlets or national industry or financial news; multiple significant client concerns Harm to the Company's reputation extends internationally through public media outlets or negative publicity in international industry or financial news; global client concerns 4 Major 5 Critical
26 Example ICS Cyber Risk Assessment Worksheet Zone Process Control Zone Threat Source Authorized personnel Threat Scenario Threat Action Inserts USB into Operator Station with general malware Inserts USB into Operator Station with targeted malware Plugs laptop infected with general malware into the Control LAN Plugs laptop infected with targeted malware into the Control LAN Engineer remotes into the EWS from the Plant Business Zone using VNC and makes changes without knowledge of current process conditions Unauthorized person uses the VNC credentials to gain access to EWS Vulnerabilities * OS Computers are in the Control Room * USB Ports are not blocked or disabled * Autorun not disabled * No antivirus * OS Computers are in the Control Room * USB Ports are not blocked or disabled * Autorun not disabled * No antivirus * Unused ports on Control LAN switch are enabled * No policy governing use of laptops * No antivirus on Tag and Batch servers * Lack of segmentation allows for propogation * Unused ports on Control LAN switch are enabled * No policy governing use of laptops * No antivirus on Tag and Batch servers * Lack of segmentation allows for propogation * By default VNC credentials are in "clear text" * VNC file transfer capabilities * EWS is dual-homed * No lock-out on VNC Consequence Consequence Description * Denial of service on operator station that spreads to all OS on PCN * All OS and Servers need to be rebuilt * hours downtime * Rework batch * Supply chain impact * Loss of control with potential compromise of the safety of the process * Runaway reaction leading to explosion * Denial of service on operator station that spreads to all OS on PCN * All OS and Servers need to be rebuilt * hours downtime * Rework batch * Supply chain impact * Loss of control with potential compromise of the safety of the process * Runaway reaction leading to explosion * Possible process upset or modification leading to loss of batch * Loss of control with potential compromise of the safety of the process * Runaway reaction leading to explosion Impact S E F R Max UTL Risk SL-T Countermeasures MTL Risk * Policies and procedures * Policies and procedures * Laptops are running a supported OS, are patched and running antivirus 4 12 * Laptops are running a supported OS, are patched and running antivirus Recommendations ATL Risk * Disable unused USB ports (e.g. GPO, registry, SEP, etc.) * Relocate OS computers to the server room and KVM to Control Room * Segment the Tag & Batch servers and EWS from the PCN and Control LAN (e.g. eliminate all dual-homed computers) 2 6 * Install and maintain Antivirus * Stricter enforcement of policies * Upgrade OS and application software to supported version * Disable unused USB ports (e.g. GPO, registry, SEP, etc.) * Relocate OS computers to the server room and KVM to Control Room * Segment the Tag & Batch servers and EWS from the PCN and Control LAN (e.g. eliminate all dual-homed computers) * Install and maintain Antivirus Stricter enforcement of policies 1 5 * Develop policies to prohibit use of laptops on Control LAN * Block unused ports on Control LAN switch * Segment the Tag & Batch servers and EWS from the PCN and Control LAN (e.g. eliminate all dual-homed computers) * Install and maintain Antivirus 1 3 * Develop policies to prohibit use of laptops on Control LAN * Block unused ports on Control LAN switch * Segment the Tag & Batch servers and EWS from the PCN and Control LAN (e.g. eliminate all dual-homed computers) * Install and maintain Antivirus * Develop and enforce MoC process * Eliminate VNC * Develop and enforce MoC process * Eliminate VNC #VALUE! #VALUE! 1 2 5
27 Cybersecurity Strategy Considerations Assemble Core Team Internal Cross functional (IT, Operations, Engineering, HSE, Corp Security) External Partner Experience, Reputation External benchmarks, Independent view Core focus, proven work process Standards based approach ISA 99.02/ IEC 62443, NIST Develop an as-built model of the entire system Phased Approach (High Level Assessment first) Cross training opportunity/ common language(e.g. field trip) Document deliverables Sustainable processes and systems
28 Conclusion With Good Risk Information You Can Determine what plants/processes need to be addressed first Intelligently design and apply countermeasures (e.g. network segmentation, access controls, hardening, detection, etc.) to reduce risk Prioritize activities and resources Evaluate countermeasures based upon their effectiveness of versus their cost/complexity
Designing an Effective Risk Matrix
Designing an Effective Risk Matrix HENRY OZOG INTRODUCTION Risk assessment is an effective means of identifying process safety risks and determining the most cost-effective means to reduce risk. Many organizations
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Industrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Does Aligning Cyber Security and Process Safety Reduce Risk?
Does Aligning Cyber Security and Process Safety Reduce Risk? How can we align them to protect Operational Integrity? Schneider Electric September 15, 2015 Hosted by Greg Hale, Founder & Editor of Industrial
Cybersecurity Training
Standards Certification Education & Training Publishing Conferences & Exhibits Cybersecurity Training Safeguarding industrial automation and control systems www.isa.org/cybetrn Expert-led training with
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Information Technology Risk Management
Find What Matters Information Technology Risk Management Control What Counts The Cyber-Security Discussion Series for Federal Government security experts... by Carson Associates your bridge to better IT
WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
United States Department of Agriculture Marketing and Regulatory Programs Grain Inspection, Packers and Stockyards Administration Directive GIPSA 3140.5 11/30/06 WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
State of Oregon. State of Oregon 1
State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Seven Strategies to Defend ICSs
INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
Top 20 Critical Security Controls
Top 20 Critical Security Controls July 2015 Contents Compliance Guide 01 02 03 04 Introduction 1 How Rapid7 Can Help 2 Rapid7 Solutions for the Critical Controls 3 About Rapid7 11 01 INTRODUCTION The Need
CMS Information Security Risk Assessment (RA) Methodology
DEPARTMENT OF HEALTH & HUMAN SERVICES Centers for Medicare & Medicaid Services 7500 Security Boulevard, Mail Stop N2-14-26 Baltimore, Maryland 21244-1850 CENTERS FOR MEDICARE & MEDICAID SERVICES (CMS)
Security in the smart grid
Security in the smart grid Security in the smart grid It s hard to avoid news reports about the smart grid, and one of the media s favorite topics is security, cyber security in particular. It s understandable
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Security Controls in Service Management
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Security
CYBER SECURITY RISK ANALYSIS FOR PROCESS CONTROL SYSTEMS USING RINGS OF PROTECTION ANALYSIS (ROPA)
YBER SEURITY RISK ANALYSIS FOR PROESS ONTROL SYSTEMS USING RINGS OF PROTETION ANALYSIS (ROPA) by Paul Baybutt Primatech Inc. [email protected] 614-841-9800 www.primatech.com A version of this paper appeared
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
TeleTrusT Bundesverband IT-Sicherheit e.v.
TeleTrusT Bundesverband IT-Sicherheit e.v. TeleTrusT-Workshop "Industrial Security" 2015 München, 11.06.2015 Einführung Industrial Security anhand des IEC 62443; Bedrohungslage für Betreiber von ICS (Industrial
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Business Continuity Management Standard for IT Systems This standard is applicable to all VCU School of Medicine
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
White Paper. 7 Steps to ICS and SCADA Security. Tofino Security exida Consulting LLC. Contents. Authors. Version 1.0 Published February 16, 2012
Tofino Security exida Consulting LLC White Paper Version 1.0 Published February 16, 2012 Contents Executive Summary... 1 Step 1 Assess Existing Systems... 1 Step 2 Document Policies & Procedures... 3 Step
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.
Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m. Topics: Explain why it is important for firms of all sizes to address cybersecurity risk. Demonstrate awareness
Network Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
Industrial Control Systems Security Guide
Industrial Control Systems Security Guide Keith Stouffer, Engineering Lab National Institute of Standards and Technology NIST SP 800-82, Rev 2 and ICS Cybersecurity Testbed Keith Stouffer Project Leader,
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
On-Site Risk Management Audit Checklist for Program Level 3 Process
On-Site Risk Management Audit Checklist for Program Level 3 Process Auditor name: Date: I. Facility Information: Facility name: Facility location: County: Contact name: RMP Facility I.D. Phone Number:
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
R 143 CYBERSECURITY RECOMMENDATION FOR MEDIA VENDORS SYSTEMS, SOFTWARE & SERVICES
R 143 CYBERSECURITY RECOMMENDATION FOR MEDIA VENDORS SYSTEMS, SOFTWARE & SERVICES RECOMMENDATION Geneva April 2016 R 143 Cybersecurity Rec. for media vendors systems, software & services Cybersecurity
DeltaV System Cyber-Security
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
Security Risk Assessment
Security Risk Assessment Applied Risk Management July 2002 What is Risk? Risk is: Something that creates a hazard A cost of doing business Risk can never be eliminated, merely reduced to an acceptable
Dr. György Kálmán [email protected]
COMMUNICATION AND SECURITY IN CURRENT INDUSTRIAL AUTOMATION Dr. György Kálmán [email protected] Agenda Connected systems historical overview Current trends, concepts, pre and post Stuxnet Risks and threats
Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities
Industrial Cyber Security Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities WE HEAR ABOUT CYBER INCIDENTS EVERY DAY IN THE NEWS, BUT JUST HOW RELEVANT ARE THESE
Cyber Security for SCADA/ICS Networks
Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Sample Vulnerability Management Policy
Sample Internal Procedures and Policy Guidelines February 2015 Document Control Title: Document Control Number: 1.0.0 Initial Release: Last Updated: February 2015, Manager IT Security February 2015, Director
MEDICAL DEVICE Cybersecurity.
MEDICAL DEVICE Cybersecurity. 2 MEDICAL DEVICE CYBERSECURITY Introduction Wireless technology and the software in medical devices have greatly increased healthcare providers abilities to efficiently and
SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013
SOFTWARE ASSET MANAGEMENT Continuous Monitoring September 16, 2013 Tim McBride National Cybersecurity Center of Excellence [email protected] David Waltermire Information Technology Laboratory [email protected]
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
Revision History Revision Date 3.0 14.02.10. Changes Initial version published to http://www.isasecure.org
SDLA-312 ISA Security Compliance Institute Security Development Lifecycle Assurance - Security Development Lifecycle Assessment v3.0 Lifecycle Phases Number Phase Name Description PH1 Security Management
PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR
PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR AUTHOR: UDIT PATHAK SENIOR SECURITY ANALYST [email protected] Public Network Intelligence India 1 Contents 1. Background... 3 2. PCI Compliance
VULNERABILITY MANAGEMENT AND RESEARCH PENETRATION TESTING OVERVIEW
VULNERABILITY MANAGEMENT AND RESEARCH PENETRATION TESTING OVERVIEW Len Kleinman Director ATO Trusted Access Australian Taxation Office Session ID: DAS-W01 Session Classification: General Interest What
MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance
MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
HIPAA: Compliance Essentials
HIPAA: Compliance Essentials Presented by: Health Security Solutions August 15, 2014 What is HIPAA?? HIPAA is Law that governs a person s ability to qualify immediately for health coverage when they change
Using ISA/IEC 62443 Standards to Improve Control System Security
Tofino Security White Paper Version 1.2 Published May 2014 Using ISA/IEC 62443 Standards to Improve Control System Security Contents 1. Executive Summary... 1 2. What s New in this Version... 1 3. Why
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
Taking Information Security Risk Management Beyond Smoke & Mirrors
Taking Information Security Risk Management Beyond Smoke & Mirrors Evan Wheeler Omgeo Session ID: GRC-107 Insert presenter logo here on slide master. See hidden slide 4 for directions Session Classification:
Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises
Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis
Information Technology
Information Technology Information Technology Session Structure Board of director actions Significant and emerging IT risks Practical questions Resources Compensating Controls at the Directorate Level
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
Redesigning automation network security
White Paper WP152006EN Redesigning automation network security Presented at Power and Energy Automation Conference (PEAC), Spokane, WA, March 2014 Jacques Benoit Eaton s Cooper Power Systems Abstract The
A Systems Approach to HVAC Contractor Security
LLNL-JRNL-653695 A Systems Approach to HVAC Contractor Security K. M. Masica April 24, 2014 A Systems Approach to HVAC Contractor Security Disclaimer This document was prepared as an account of work sponsored
Basic Fundamentals Of Safety Instrumented Systems
September 2005 DVC6000 SIS Training Course 1 Basic Fundamentals Of Safety Instrumented Systems Overview Definitions of basic terms Basics of safety and layers of protection Basics of Safety Instrumented
Remote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Nessus Agents. October 2015
Nessus Agents October 2015 Table of Contents Introduction... 3 What Are Nessus Agents?... 3 Scanning... 4 Results... 6 Conclusion... 6 About Tenable Network Security... 6 2 Introduction Today s changing
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Decrease your HMI/SCADA risk
Decrease your HMI/SCADA risk Key steps to minimize unplanned downtime and protect your organization. Are you running your plant operations with serious risk? Most industrial applications lack recommended
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
PCN Cyber-security Considerations for Manufacturers. Based on Chevron Phillips Chemical Company PCN Architecture Design and Philosophy
PCN Cyber-security Considerations for Manufacturers Based on Chevron Phillips Chemical Company PCN Architecture Design and Philosophy Contents CPChem PCN Philosophy and Policy Remote Access Considerations
Document ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments
CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples The
Alarm Management Standards Are You Taking Them Seriously?
Alarm Management Standards Are You Taking Them Seriously? Executive Summary EEMUA Publication 191 ALARM SYSTEMS - A Guide to Design, Management, and Procurement was first released in 1999 and is well acknowledged
HAZARDOUS MATERIALS MANAGEMENT ISSUE 2
CONTENTS PAGE 1 AIM 2 2 APPLICATION 2 3 DEFINITIONS 2 4 REASON FOR INCLUSION 2 5 REQUIREMENTS 3 6 PLANT AND EQUIPMENT REQUIREMENTS 3 7 SYSTEM AND PROCEDURAL REQUIREMENTS 5 8 PEOPLE REQUIREMENTS 7 APPENDIX
a Post-Stuxnet World The Future of Critical Infrastructure Security Eric Byres, P.Eng.
SCADA and CIP Security in a Post-Stuxnet World The Future of Critical Infrastructure Security Eric Byres, P.Eng. CTO, Byres Security Inc. What is Stuxnet? The Stuxnet Worm July, 2010: Stuxnet worm was
Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord
Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord Implementation of Cyber Security for Yara Glomfjord Speaker profile Olav Mo ABB
S a f e t y & s e c u r i t y a l i g n m e n t b e n e f i t s f o r h i g h e r o p e r a t i o n a l i n t e g r i t y R A H U L G U P TA
Unraveling the Jargon Between Functional Safety & Cyber Security Related to Industrial Control Systems ( ICS) S a f e t y & s e c u r i t y a l i g n m e n t b e n e f i t s f o r h i g h e r o p e r a
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Industrial Cyber Security Risk Industrial Attacks Continue to Increase in Frequency & Sophistication Today, industrial organizations
