Classification Method and Key Measures
|
|
|
- Roland Manning
- 10 years ago
- Views:
Transcription
1 . Classification Method and Key Measures Cybersecurity for Industrial Control Systems
2
3 Table of Contents. 1 Introduction Context Scope Structure of the Set of Documents Terminology 6 2 Cybersecurity Classes and Associated Measures Cybersecurity Classes for Industrial Control Systems Measures Security Aproval 19 3 Classification Method Context Security Criteria Scales Primary Assets Supporting assets Determining the Class 37 A Simplified Case Studies 39 A.1 Water supply plant 39 A.2 Manufacturing industry 40 A.3 Continuous process industry 40 A.4 Railway switch automation 42 Acronyms 45 Glossary 47 Bibliography 55 Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 3
4
5 Section 1. Introduction 1.1 Context This document is based on the findings of the working group on Industrial Control System cybersecurity, directed by the French Network and Information Security Agency, the ANSSI 12. Composed of actors in the field of automated industrial process control systems and specialists in IT 3 Security, the group has undertaken to draft a set of measures to improve the cybersecurity of ICS 4. These documents will be used to define the methods for applying the measures set out within the framework of French law No of 18 December 2013, known as the Military programming law (LPM 5 ). The objective is to subject all new critical ICSs to an approval process, thus ensuring that their cybersecurity level is acceptable given the current threat status and its potential developments. The document is intended for all actors (e.g. responsible entities, project managers, buyers, manufacturers, integrators, prime contractors) concerned with the design, implementation, operation and maintenance of ICSs. 1 Agence nationale de la sécurité des systèmes d information. 2 The working group is composed of the following companies and organisations: Actemium, Airbus Defence and Space, Arkoon-Netasq, A.R.C. Informatique, Atos Worldgrid, Hirschmann, Cassidian Cybersecurity, CEA, CLUSIF, DCNS, DGA Maîtrise de l information, Euro systems, EXERA, GDF SUEZ, Gimélec, INERIS, Itris Automation Square, Lexsi, Schneider Electric, Siemens, Sogeti, RATP, Solucom, Thales, Total. 3 Information Technology. 4 Industrial Control System. 5 Loi de programmation militaire. Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 5
6 1.2 Scope The working group did not focus on any specific business sector. Therefore, the contents of this document are intended to apply to all sectors. Some sectors have special characteristics that have not been detailed or considered in this document. In some cases, it may be necessary to establish a sector-specific version of this document, in collaboration with the coordinating ministries, in order to clarify how to apply techniques and to take specific constraints into account. All of the measures presented have been designed for new ICSs. It is quite possible that these measures cannot be directly applied to existing ICSs; therefore, an exhaustive impact evaluation should be carried out before any implementation. Situations may arise (e.g. compatibility issues with existing ICSs, business-specific constraints) in which certain measures cannot be applied without adapting them. These special cases should be the object of specific studies and the resulting measures should be submitted to the cyberdefence authority for approval. As this work focused exclusively on cybersecurity for ICSs, the definition of organisations overall IT security strategy is not concerned by this framework. It is therefore up to each responsible entity to integrate their ICSs and their specific constraints into their IT Security Policy. Please refer to the guide [6] for more information on this subject. 1.3 Structure of the Set of Documents The production of the working group is divided into two documents. This document constitutes the basis and contains fundamental elements. Cybersecurity classes and key measures are presented in section 2 and the classification method is presented in section 3. The Measures Guide [10] contains all the precise technical and organisational measures to be implemented according to the classes identified. 1.4 Terminology In all documents, the term Industrial Control System (ICS) designates a set of human and material resources designed to control or operate technical installations (consisting of a set of sensors and actuators). Naturally, this covers the control-command systems that we find in many sectors (e.g. energy, transport, water supply, industry), as well as Building Management Systems (BMS). 6. Cybersecurity for Industrial Control Systems Classification Method and Key Measures
7 Management Information Systems (MIS) are not within the scope of this document. Solely their interfaces with ICSs are discussed. For more information about the distinction between these systems, please refer to the ANSSI guide [8]. The term cybersecurity will be used in this document to avoid confusion with the term security which, in the industrial context, could have meanings besides the security of information systems (e.g. the security of assets or individuals). Throughout the remainder of this document, the responsible entity is the natural or legal person that has legal responsibility for the implementation of cybersecurity measures for the ICS in question. It is not always the same person or organisation, depending on the circumstances. Additionally, please note that terminology can vary in different sectors of activity. Technical terms used in this document are defined in the glossary. In particular, terms relating to information system security are based on the ISO standards series [5] and IGI 1300, a French government standard on classified information [3]. Warning Recommendations and directives contained in this document are provided as-is and are adapted to known threats at the time the document was published. In view of the diversity of ICSs,. there can be no guarantee that this information can be used without adapting it to the target systems. The responsible entity should undertake a preliminary analysis before implementing any of the proposed measures. Note ANSSI publications are available on its website: Comments on this guide may be sent to [email protected]. Important This document is a courtesy translation of the guide Cybersécurité des systèmes industriels : Méthode de classification. et mesures principales. In case of divergence, the French version prevails. Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 7
8
9 Section 2. Cybersecurity Classes and Associated Measures This section presents the cybersecurity classes and the applicable measures (technical and organisational) for each one. Some measures are simply recommendations; others are directives. 2.1 Cybersecurity Classes for Industrial Control Systems Some sources propose four or five levels of ICS classification. It is noted that the first levels of these classifications are quite often concerned with safety and contribute little from a cybersecurity point of view. It is assumed that safety issues have already been taken into account; they are not the subject of this document. Note Risks due to human negligence are considered as dependability issues, while risks due to malicious acts fall in the domain. of cybersecurity. Nevertheless, cybersecurity measures can address certain negligence-related risks. We therefore propose a simple division of ICSs into three classes, corresponding to their sensitivity. This classification can be applied to an entire site, to a specific portion, or to an ICS distributed over several sites. Details will be provided in the description of the scope, in section It is up to each responsible entity to define the precise scope of the ICS concerned. Important Cybersecurity levels are defined in terms. of consequences for the Nation, rather than consequences for responsible entities. Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 9
10 Each class systematically includes the measures of the class below it. Below is a brief description of the three cybersecurity classes for ICSs. Class 1: ICSs for which the risk or impact of an attack is low. The measures recommended for this class must be able to be applied in complete autonomy. This class mainly corresponds to rules provided in the ANSSI Healthy Network Guide [9]. Class 2: ICSs for which the risk or impact of an attack is significant. There is no state control over this class of ICS, but in the event of inspection or incident, the responsible entity must be able to provide evidence that adequate measures have been implemented. Class 3: ICSs for which the risk or impact of an attack is critical. In this class, the obligations are heightened and the conformity of ICSs is verified by the state authority or an accredited body. Cybersecurity classes are estimated using the detailed methodology in section 3. The next section describes the structural measures that must be applied according to the three classes. The exhaustive list of measures is found in the Measures Guide [10]. For each measure presented in the remainder of this section, the relevant sections of the guide are indicated. Important All functional or technical modifications to ICSs must trigger a review of the cybersecurity level. Indeed, such modifications. may have repercussions on the class that was previously estimated. For an example, please refer to the case study in Appendix A Measures Roles and Responsabilities Roles and responsibilities regarding cybersecurity must be clearly established. Class 1: A chain of responsibility for cybersecurity should be implemented, covering all ICSs. 10. Cybersecurity for Industrial Control Systems Classification Method and Key Measures
11 Class 2: A chain of responsibility for cybersecurity shall be implemented, covering all ICSs. Class 3: A chain of responsibility for cybersecurity shall be implemented, covering all ICSs. The identity and contact details of the person in charge of this chain shall be communicated to the cyberdefence authority. The corresponding detailed measures are found in section of the Measures Guide [10] Risk Analysis Risk analysis is the core of organisational measures. It is the starting point for any cybersecurity strategy and many other measures are directly based on it. Class 1: ICSs should be subject to a risk analysis for cybersecurity, even if it is succinct. Class 2: ICSs shall be subject to a risk analysis using a method chosen by the responsible entity. Class 3: ICSs shall be subject to a detailed risk analysis using a method chosen by the responsible entity. The risk analysis shall be reviewed regularly, at least once a year. It should be carried out in collaboration with a certified service provider. The corresponding detailed measures are found in section of the Measures Guide [10] Inventory A complete inventory of the ICS is an key component of a good cybersecurity policy as it provides detailed understanding of the system and its environment. For example, it allows rapid assessment of the impact of a vulnerability discovered in a product or measurement of the scope of a compromise access. Inventories of ICSs also permit faster incident resolution. For a brief explanation of inventories, please see Appendix A of the Measures Guide [10]. Class 1: Physical, logical and application inventories of the ICS should be prepared. Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 11
12 Class 2: Physical, logical and application inventories of the ICS shall be prepared. The inventories shall be reviewed regularly (frequency to be determined by the responsible entity) and at minimum each time the ICS is modified. Class 3: Physical, logical and application inventories of the ICS shall be prepared. The inventories shall be reviewed regularly and at least once a year. The corresponding detailed measures are found in section of the Measures Guide [10] User Training, Control and Certification Training for users who work on an ICS is indispensable in ensuring the system cybersecurity. This training should include awareness of the risks inherent in information and communication technologies, as well as presentation of the ICS security policy. It should be formalised and approved by the responsible entity. In the remainder of this document, we consider that personnel are certified if they have received specific training regarding their role in the ICS concerned and in awareness of IT security. This training must be officially recorded by the ICS s responsible entity. Personnel are considered to be controlled if they have been explicitly authorised to intervene and if their actions can be tracked. Class 1: All users should be certified. Class 2: All users shall be certified. Class 3: All users shall be certified and controlled. Cybersecurity training for this certification shall be carried out by certified providers. The corresponding detailed measures are found in section of the Measures Guide [10]. 12. Cybersecurity for Industrial Control Systems Classification Method and Key Measures
13 2.2.5 Audits Audits prior to the entry into service, during SAT 1 and FAT 2, and then regularly during the life cycle, allow the ICS s actual cybersecurity level to be verified. The audit should cover both technical and organisational aspects in order to verify the proper application of the measures listed in this document and in the Measures Guide [10]. Intrusion tests should also be carried out. The audit process should include suppliers (e.g. manufacturers, integrators). Class 1: Regular audits should be implemented. These audits may be internal. Class 2: Regular audits shall be implemented. These audits should be performed by external service providers. Class 3: Regular audits shall be implemented and must be carried out at least once a year. These audits should be carried out by independent, certified service providers. The corresponding detailed measures are found in section of the Measures Guide [10] Monitoring Process A monitoring process allows the organisation to keep up to date on threats and vulnerabilities. The sophistication of the monitoring process varies according to the cybersecurity class. Class 1: A process should be implemented to monitor the vulnerabilities of the products in use, in order to update them in case of flaws. Class 2: A monitoring process shall be implemented to: keep up to date on vulnerabilities identified in the products and technologies used in the ICSs; keep up to date on developments in protection mechanisms. Class 3: A monitoring process shall be implemented to: keep up to date on developments regarding threats; 1 Site Acceptance Test. 2 Factory Acceptance Test. Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 13
14 keep up to date on vulnerabilities identified in the products and technologies used in the ICSs; keep up to date on developments in attack techniques; keep up to date on developments in protection mechanisms. The corresponding detailed measures are found in section of the Measures Guide [10] Business Resumption Plan and Business Continuity Plan A BRP 3 and a BCP 4 can guarantee resumption or continuity of service following a loss, whatever its origin. These plans sometimes already exist in response to other losses. They should address all incident scenarios causing interruption or degradation of the service being provided, as identified in the cybersecurity risk analysis. For more details, please refer to the guide published by the Secretariat-General for National Defence and Security (SGDSN 5 ) [2]. Class 1: A BCP or BRP, however succinct, should be implemented. Class 2: A BCP or BRP shall be implemented. Its effectiveness shall be tested regularly. Class 3: A BCP or BRP shall be implemented. This plan shall address all incident scenarios that cause an interruption of the service provided and have a serious impact. Its effectiveness shall be tested regularly and at least once a year. A BCP, with a scope broader than cybersecurity, may be requested by the coordinating ministries. The corresponding detailed measures are found in section of the Measures Guide [10] Emergency Modes Clearly, measures to improve cybersecurity must not reduce an ICS s safety level. It may be necessary to establish streamlined emergency procedures that enable rapid response to an industrial incident. 3 Business Recovery Plan. 4 Business Continuity Plan. 5 Secrétariat général de la Défense et de la Sécurité nationale. 14. Cybersecurity for Industrial Control Systems Classification Method and Key Measures
15 The following analogy illustrates this point. In case of a fire in a building, doors with access control open automatically. Personnel do not need to use their badge during the evacuation. This is an emergency mode. Class 1: Emergency modes should be established and closely governed so that they do not constitute an exploitable vulnerability. They should be reflected in the risk analysis and associated procedures should be set out in the ICS security policy. In particular, the traceability of operations should be preserved. Class 2: There are no additional measures for this class. Class 3: Emergency modes shall be implemented and closely governed so that they do not constitute an additional system vulnerability. They shall be reflected in the risk analysis; associated procedures shall be set out in the ICS security policy. In particular, the traceability of operations shall be preserved. The corresponding detailed measures are found in section of the Measures Guide [10] Alert and Crisis Management Process An alert and crisis management process helps establish procedures for responding to incident scenarios identified by the risk analysis. Class 1: An alert process (even minimal) should be implemented. Class 2: A crisis management process should be implemented. It should be regularly tested to verify its effectiveness. Class 3: An alert and crisis management process shall be defined. It shall be regularly tested, at least once a year, to verify its effectiveness. The operational chain of responsibility shall be communicated to the cyberdefence authority. The corresponding detailed measures are found in section of the Measures Guide [10] Network Segmentation and Segregation Interconnections are a significant source of vulnerabilities. Risks must be carefully evaluated before interconnecting two networks. Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 15
16 Networks should be segmented to the greatest extent possible. In particular, one must be vigilant concerning interconnections between an ICS and a public network (telephone, Internet), between an ICS and a corporate network, or between ICSs of different cybersecurity classes. Class 1: The following are recommendations regarding different types of interconnection. ICSs: Partitions using firewalls should be established between class 1 ICSs. Certified devices should be used for the interconnection. Management Information Systems: The ICS shall be partitioned from the corporate network using a firewall. Certified devices should be used for the interconnection. Public network: ICSs should not be exposed on the Internet unless it is imperatively justified. Where appropriate, measures should be taken to ensure that they are only accessible to authorised personnel. The risks associated with such a solution should be clearly identified. Class 2: The following are recommendations regarding different types of interconnection. ICSs: ICSs: Partitions using firewalls should be established between class 2 ICSs. Certified devices should be used for the interconnection. The interconnection of a class 2 ICS and a class 1 ICS should be unidirectional towards the class 1 system. Certified devices should be used for the interconnection. Mangement Information Systems: Interconnection should be unidirectional from the ICS towards the corportate network. Otherwise, all data streams towards the class 2 ICS should be clearly defined and limited. Associated risks should be identified and evaluated. The interconnection shall be implemented using cybersecurity devices such as a firewall, which should be certified. Public network: ICSs should not be exposed on the Internet unless it is imperatively justified by an operational requirement. Where appropriate, they should not be exposed without protection and the risks associated with such a solution should be clearly identified. The interconnection should be unidirectional towards the public network. Certified devices should be used for the interconnection. Class 3: The following are recommendations regarding different types of interconnection. 16. Cybersecurity for Industrial Control Systems Classification Method and Key Measures
17 ICSs: Partitions using firewalls shall be established between class 3 ICSs. It is strongly recommended to implement the interconnection using certified devices. The interconnection of a class 3 ICS with an ICS of a lower class shall be unidirectional towards the latter. The unidirectionality shall be guaranteed physically (e.g. with a data diode). Certified devices should be used for the interconnection. Management Information Systems: The interconnection shall be unidirectional towards the corporate network. The unidirectionality shall be guaranteed physically (e.g. with a data diode). Certified devices should be used for the interconnection. Public network: A class 3 ICS shall not be connected to a public network. Note An infrastructure with dedicated resources leased from a telecommunications operator (such as a MPLS network) is not considered a public network when resources are logically partitioned from other traffic and the operator provides service guarantees.. Note that this type of solution does not necessarily guarantee data stream confidentiality or integrity and does not in any case exempt the responsible entity from implementing appropriate measures (such as a VPN) to ensure the authenticity, integrity and confidentiality of data streams. The corresponding detailed measures are found in section of the Measures Guide [10] Remote Diagnosis, Remote Maintenance ans Remote Management Class 1: Clear procedures should be defined and means of protection should be implemented to govern remote diagnosis, remote maintenance and remote management operations. Certified products should be used for remote diagnosis, remote maintenance and remote management operations. Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 17
18 Class 2: Remote maintenance and remote management operations are strongly discouraged. Where appropriate, the devices used should ensure the authenticity and integrity of communications. These devices should be certified. Class 3: Remote maintenance and remote management operations shall not be authorised. Remote diagnosis operations may be carried out using devices that physically guarantees the impossibility of interacting with the class 3 network. Certified products should be used. Note When imperatively justified by operational requirements, remote maintenance and remote management may be authorised for class 3 ICSs. However, in this case, these operations. should be performed from a site that is also class 3 and which should be included in the risk analysis of the ICS. In particular, the measures in section concerning interconnection shall apply. The corresponding detailed measures are found in section of the Measures Guide [10] Surveillance and Intrusion Detection Methods The implementation of surveillance and intrusion detection methods increases visibility within the ICS in question and reduces the response time in the event of attack, allowing its consequences to be limited. Class 1: A management system should be implemented for the event logs of the various devices in the network. An event management policy should be defined. Class 2: Intrusion detection methods should be implemented on the perimeter of ICSs and at points identified as critical, in particular including: interconnections with the Internet (including remote maintenance); interconnections with the corporate network; specific points of connection to the outside (e.g. industrial Wi-Fi); PLC networks deemed sensitive. 18. Cybersecurity for Industrial Control Systems Classification Method and Key Measures
19 The detection methods used should be certified. Class 3: Intrusion detection methods shall be implemented on the perimeter of ICSs and at points identified as critical, in particular including: interconnections of remote management devices; interconnections between corporate networks and ICSs; specific points of connection to the outside (e.g. industrial Wi-Fi); secure data exchange stations and decontamination stations; the backbone network for industrial supervision work stations (SCADA); PLC networks considered sensitive. The detection methods used should be certified. Note The deployment of means of detection. also implies the implementation of centralisation tools and analysis tools to process the collected events. The corresponding detailed measures are found in section 4.4 of the Measures Guide [10]. 2.3 Security Aproval Approval is the process of verifying the cybersecurity level when a new ICS is placed in service. The approval file must address all measures listed in this document. The approval process essentially consists of verifying that the risk analysis for the ICS was performed correctly, that the measures it specifies have been implemented and that the residual risks are acceptable. During approval, the cyberdefence authority gives prior authorisation for entry into service and the responsible entity accepts the residual risks. Class 1: It is recommended to address the risks identified in the risk analysis, reducing residual risk to a level the responsible entity considers acceptable. Class 2: The responsible entity shall obtain approval for ICSs. The approval, in this case, is based on a declarative principle. Class 3: ICSs shall be approved and require authorisation prior to entry into service. Approval shall be carried out by an external certified organisation. Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 19
20 Note To avoid the proliferation of procedures,. cybersecurity approval can be integrated into the approval procedures that already exist in certain sectors. 20. Cybersecurity for Industrial Control Systems Classification Method and Key Measures
21 Section 3. Classification Method 3.1 Context This section describes the classification method for ICSs. Cybersecurity classes are determined according to a level of impact and a level of likelihood. The method is based on terms and concepts found in risk analysis methods (e.g. EBIOS 1 [7]) without constituting a comprehensive risk analysis. Figure 3.1 provides a flowchart for the method. Impacts can be easily estimated using tables. However, estimating likelihoods requires several intermediate steps. Connectivity Section Fonctionnalities Section Exposure Section Users Section Attackers Section Impacts Section Likelihood Section Classification. Section Figure 3.1: Diagram of the classification method Perimeter The perimeter must be defined so that it contains all the critical installations of a site or infrastructure (e.g. networks, transport, electricity). Conversely, it is possible to divide a site into multiple ICSs that potentially have different levels of criticality. 1 Expression des besoins et identification des objectifs de sécurité. Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 21
22 If the decision is made to divide an infrastructure into several ICSs, an overall risk analysis should be conducted to verify that all threats have been considered, including those that may result from the infrastructure being viewed as a whole. Dependability analyses, which have often already been performed by responsible entities, can serve as a basis. Such analyses already define the division of systems and the processes they support. Example The perimeter must be defined consistently with respect to the risk and the architecture of the systems being analysed. Therefore, it may be consistent to carry out an analysis of the technical management plant of a road tunnel (e.g.. ventilation, lighting, fire prevention) independently of the rest of the systems present along the road (e.g. road signs, emergency telephones). Nevertheless, in order for this separation to be possible and consistent, the boundary between the two systems must be clearly identifiable. Otherwise, an overall analysis must be conducted. The method can be applied iteratively: First, it is applied to an entire infrastructure or site to identify the highest cybersecurity class that must be addressed. Then, once the functional mapping has been established, the method can be applied to smaller subsets. These subsets are sometimes called zones in the literature. Important Given the potential impact of certain measures presented above, it is important to precisely determine the perimeter in question. The greater the precision of the perimeter of the ICS,. the more applicable measures will be limited to the absolute minimum necessary. For example, a poorly defined perimeter could lead to the imposition of class 3 measures for a class 2 ICS. 22. Cybersecurity for Industrial Control Systems Classification Method and Key Measures
23 Example A Seveso upper-tier establishment will be class 3 overall. By refining how ICSs are divided, it will undoubtedly become. clear only the protection systems for assets and individuals must be categorised as class 3. The production systems are most likely class 1 or Security Criteria We will only use the two principal security criteria most often encountered in ICS, in view of their close connection with dependability: availability and integrity. Note In certain sectors, it is possible to add other security criteria such as confidentiality, traceability or imputability,. but these are not considered in this study. 3.3 Scales Several scales are needed to measure the impact and likelihood of an attack Consequences To express levels of consequences, a scale of 1 to 5 was chosen: insignificant, minor, moderate, major and catastrophic. The level of consequences reflects an assessment of various impacts: human, environmental and economic. Detailed examples are provided in the following three tables; they should be adapted and refined for each sector. For example, Article L of the French Defence Code defines additional criteria for sectors of vital importance. Article L of the French Environmental Code also specifies certain impacts. Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 23
24 im- Human pacts Level Designation Description of the consequences 1 Insignificant Accident reported, no sick leave or medical treatment. 2 Minor Accident reported, with sick leave or medical treatment. 3 Moderate Permanent disability. 4 Major A death. 5 Catastrophic Multiple deaths. Environmental impacts Level Designation Description of the consequences 1 Insignificant Limited and temporary discharge in excess of a standard with no legal requirement to report it to the authorities. 2 Minor Discharge in excess of a standard with legal requirement to report it to the authorities but no consequences for the environment. 3 Moderate Moderate, limited pollution of the site. 4 Major Significant pollution or pollution outside the site. Evacuation of persons. 5 Catastrophic Major pollution with long-term environmental consequences outside the site. 24. Cybersecurity for Industrial Control Systems Classification Method and Key Measures
25 Impacts from interruption of the service provided Level Designation Description of the consequences 1 Insignificant Serious impacts on 1,000 people. 2 Minor Serious impacts on 10,000 people. Disruption of the local economy. 3 Moderate Serious impacts on 100,000 people. Disruption of the regional economy. Temporary loss of major infrastructure. 4 Major Serious impacts on 1,000,000 people. Disruption of the national economy. Temporary loss of a critical infrastructure. Permanent loss of a major infrastructure. 5 Catastrophic Serious impacts on 10,000,000 people. Permanent loss of a critical infrastructure. Note The impacts depend very heavily on the sector concerned. This is why the tables may need to be re-evaluated for. specific sectors. Additional criteria specific to a sector or an organisation may be included Likelihood Likelihood can be determined using the method described in section Because of the difficulty in estimating the frequency of occurrence of an attack, this scale is not quantitative. Likelihood Level Designation 1 Very low 2 Low 3 Moderate 4 Strong Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 25
26 3.3.3 Attackerʼs Level This table is needed to evaluate likelihood. We propose to classify attackers levels as follows. Attacker Level Designation Description/Examples 1 Nontargeted Virus, robots... 2 Hobbyist Individuals with very limited means, not necessarily intending to cause harm. 3 Isolated Individual or organisation with limited Attacker means, but with a certain de- termination (e.g. terminated employee). 4 Private Organisation Organisation with substantial means (e.g. terrorism, unfair 5 State Organisation business practices). Organisation with unlimited means and very strong determination. Since ICSs have a very long lifetime, it seems unlikely that no determined individual with limited means would want to attack the ICS during that period. We therefore propose to set the attacker s level no lower than 3. The attacker s level should also be re-evaluated according to sector of activity. It may also be specifically specific a given organisation, but only to provide a more severe assessment than the norm for the sector. 3.4 Primary Assets According to the definition from the EBIOS method, primary assets are the data and processes deemed important for the organisation. In this case, the primary assets are processes handled by the ICS whose alteration could result in damage to individuals, the environment or social order. The analysis of those processes (sometimes called functions or services) has often already taken place, in order to establish the dependability risk analysis, financial risk analysis, etc. 26. Cybersecurity for Industrial Control Systems Classification Method and Key Measures
27 Example For a road tunnel, primary assets include air-recycling functions, lighting management and management of rescue. and fire protection systems. An attack on any of these functions may have an impact on users safety or the smooth flow of traffic in the tunnel. 3.5 Supporting assets Supporting assets are the components and subsystems of the system under study. Example For a road tunnel, supporting assets include. user work stations, PLCs, servers, sensors, detectors (opacimeters, anemometers, CO meters), video cameras Typical Architectures The attack surface of an ICS is largely a function of its architecture. To simply assess the architecture-related risks, we propose to evaluate an ICS based on two scales: its level of functionality and its external connectivity. ICS Functionalities The classification regarding the functionality level essentially corresponds to the layers commonly used in the model for CIM 2, which are as follows: CIM 0 non-communicating sensors and actuators; CIM 1 PLCs and analysers; CIM 2 SCADA 3 ; CIM 3 MES 4 ; CIM 4 ERP 5. 2 Computer Integrated Manufacturing. 3 Supervisory Control And Data Acquisition. 4 Manufacturing Execution System. 5 Enterprise Resource Planning. Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 27
28 Note that an ICS containing only CIM 0 elements is unlikely to exist. Therefore, that level has not been retained in the classification. Moreover, it appears that there are no more vulnerabilities involved in CIM 4 than CIM 3. These two levels are therefore considered jointly. Note It was decided to concentrate special attention on programming consoles and engineering stations, which provide. significant additional tools to an attacker. Their permanent presence in the ICS is sufficient to justify a maximum level. This yields the following levels of functionality, shown in Figure 3.2. Functionality 1: Minimal Systems. This category contains the ICS solely containing elements classified CIM 0 and 1 (control-command systems) excluding programming consoles, namely: sensors/actuators; remote I/O; PLCs; HMIs; embedded systems; analysers. Functionality 2: Complex systems. This category concerns ICSs containing only CIM 0, CIM 1 and CIM 2 elements (control-command systems and SCADA) excluding programming consoles and engineering workstations. Thus, we add to the previous category: SCADA; historian; local databases. Functionality 3: Very complex systems. This category contains all ICSs that do not fall into the first two categories. In particular, it contains all ICSs with permanently-connected programming consoles or engineering stations, systems that are connected to an MES, and ICSs with centralised historian databases. 28. Cybersecurity for Industrial Control Systems Classification Method and Key Measures
29 Historian Database MES Remote SCADA CIM 3 CIM 2 SCADA Engineering workstation Database Historian CIM 1 Programming console HMI PLC Analyzer CIM 0 Actuator Sensor Remote I/O. Actuator Sensor.. Features 1.. Features 2.. Features 3 Figure 3.2: Levels of functionality. Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 29
30 Note DCS a have native elements (e.g. engineering stations) that can be optional in other systems. Except in special cases,. a DCS will be considered as level 3. a Distributed Control System (SNCC). Note Historians have been divided into two different levels of functionality. Local historians are closely associated with the. SCADA and sometimes integrated with it; the duration of data retention is short. A centralised historian may contain data from multiple SCADAs and the retention time is longer. Connectivity of an ICS Connectivity 1: Isolated ICS. This category applies to all production networks that are completely closed. Connectivity 2: ICS connected to an MIS. This category applies to all production networks that are connected to the corporate MIS, but without permitting operations from outside the MIS. Connectivity 3: ICS using wireless technology. This category contains all ICSs using wireless technology. Connectivity 4: Distributed ICS with private infrastructure or permitting operations from outside. This category is for distributed systems where the different sites communicate with each other via a private infrastructure. This may be completely private or leased from a telecommunications operator. This category also concerns all ICSs that permit operations from outside the site or from a management network (e.g. remote maintenance, remote management). Connectivity 5: Distributed ICS with public infrastructure. This category is like the preceding one, except that a public infrastructure is used (e.g. a telecommunications operator). A typical example is a water distribution infrastructure. 30. Cybersecurity for Industrial Control Systems Classification Method and Key Measures
31 The categories described above are summarised in the following diagrams. Figure 3.3 shows an ICS with connectivity 1. The ICS is completely disconnected and is located on a single closed site. In this category, the attack surface is limited but not zero. Despite everything, entry vectors do exist, due to removable media, maintenance operators machines or internal malicious acts. Protected area Production unit. Internet.. Connectivity 1.. Connectivity 2.. Connectivity 3.. Connectivity 4.. Connectivity 5. Figure 3.3: ICSs with connectivity 1. In Figure 3.4, the ICS is connectivity 2; it is still on a single closed site, but is now connected to a management network. We make no specific assumptions about the management network, which can be connected to a public network such as the Internet or even distributed across multiple sites. In this category, the attack surface includes everything foreseen in category 1, with the addition of attacks from the MIS. In Figure 3.5, the ICS is connectivity 3 and uses wireless technology. In this category, the attack surface includes all the vulnerabilities inherent in wireless systems. In particular, there can be availability attacks, which are difficult to guard against. Figure 3.6 represents an ICS with connectivity 4 with the same nomenclature as before. The two key points are the use of a private communication infrastructure and the presence of remote maintenance systems. Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 31
32 Protected area Corporate network Internet Production unit... Connectivity 1.. Connectivity 2.. Connectivity 3.. Connectivity 4.. Connectivity 5. Figure 3.4: ICSs with connectivity 2. A private network infrastructure is any network entirely under the control of the ICS s responsible entity, as well as any system provided by a telecommunications operator with a share of resources dedicated to the ICS in question, and which does not simply allow outside entities to interfere with the system. Infrastructure such as private APN 6 or VPN 7 of type MPLS 8 falls into this category. In all cases, protective measures shall be taken to ensure the integrity and confidentiality of such a network. However, vulnerabilities are lower than for a public infrastructure. In this category, the attack surface includes all preceding cases, in addition to new potential vulnerabilities related to the presence of an infrastructure that is very difficult or even impossible to monitor and control in its entirety, in particular from the perspective of physical access. All vulnerabilities related to remote maintenance are also present. 6 Access Point Name. 7 Virtual Private Network. 8 Multiprotocol Label Switching. 32. Cybersecurity for Industrial Control Systems Classification Method and Key Measures
33 Protected area Corporate network Internet Production unit. Wireless.. Connectivity 1.. Connectivity 2.. Connectivity 3.. Connectivity 4.. Connectivity 5. Figure 3.5: ICSs with connectivity 3. Finally, Figure 3.7 shows an ICS with connectivity 5. In this case, connectivity between the various elements of the ICS is provided by a public infrastructure such as the Internet or the telephone network. In particular, an attacker can easily reach various access points of the ICS. This obliges the implementation of additional protective measures. Moreover, no resources are dedicated to the ICS, which can become a collateral victim of abnormally high network utilisation. Exposure of the ICS The exposure of the ICS is a combination of its levels of functionality and connectivity. We have defined five levels of exposure ranging from 1 (least exposed) to 5 (most exposed). The exposure level is obtained from the following table. Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 33
34 Internet Remote maintenance Remote SCADA Corporate network Private infrastructure (Ex: MPLS) Production unit 1 Production unit 2... Connectivity 1.. Connectivity 2.. Connectivity 3.. Connectivity 4.. Connectivity 5. Figure 3.6: ICSs with connectivity 4. F3 Exposure Exposure Exposure Exposure Exposure F2 Exposure Exposure Exposure Exposure Exposure F1 Exposure Exposure Exposure Exposure Exposure Funct./Conn. C1 C2 C3 C4 C5 34. Cybersecurity for Industrial Control Systems Classification Method and Key Measures
35 Corporate network Remote SCADA PLC Public infrastructure. (Ex: Phone network, Internet) PLC Hub Remote maintenance PLC.. Connectivity 1.. Connectivity 2.. Connectivity 3.. Connectivity 4.. Connectivity 5. Figure 3.7: ICSs with connectivity 5. The levels of functionality and connectivity do not vary independently. some boxes in the preceding table may not correspond to any real ICS. Therefore, Note Many other factors could have been considered in the analysis, but were left out for simplicity. Among these are the. size of the ICS (the number of devices involved) and the heterogeneity of the devices used. These factors must be considered in a comprehensive risk analysis. Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 35
36 3.5.2 Accessibility of the ICS Personnel working on an ICS are an important vulnerability vector. We have chosen to classify users into two categories. Legitimate users are all individuals with the right to interact with the ICS in a controlled manner. These users may be the operators who ensure the proper operation of the system on a daily basis, as well as the personnel responsible for its maintenance and development. Illegitimate users are all those persons who may interact with the ICS without being controlled, whether this interaction is voluntary or not. Note The training and awareness raising referred to for certified personnel do not necessarily have to be carried out by a training organisation; it can be internal training.. However, this training should be clearly defined by the responsible entity, which should also ensure that users have taken part. Users 1 : authorised, certified and controlled All authorised users are certified and controlled. An unauthorised intervention is not possible. Users 2 : authorised and certified All authorised users are certified but one or more possible operations are not tracked. An unauthorised intervention is not possible. Users 3 : authorised There are no special requirements concerning authorised users, but an unauthorised intervention is not possible. Users 4 : unauthorised This category includes all ICSs for which an unauthorised intervention is possible. 36. Cybersecurity for Industrial Control Systems Classification Method and Key Measures
37 Example An ICS is in category 1 if all devices are protected by a system with strict access control, logical access to devices is protected by authentication and users actions are logged. However, an ICS where devices are protected. by access control, but certain devices do not require authentication, is in category 2. An ICS where devices are unprotected or poorly protected, and therefore accessible to the public or personnel not concerned with system operation (e.g. uncertified cleaning staff) is in category Determining the Class Estimating Impact We recall that for each primary asset, the security criteria taken into account are integrity and availability. Based on the established list of primary assets, the responsible entity can enumerate the feared events and estimate their impact according to the scales found in section 3.3. The feared event with the most serious impact is used to determine the class of the ICS. Example The loss of availability of a tunnel s ventilation system may give rise to a human impact of 3, an environmental impact of 1 and an impact from service interruption (the tunnel is closed to traffic) of 1. The loss of integrity of that system does not give rise to more serious impacts. Therefore, the consequences are considered to be level 3. In contrast, the loss of availability for. a toxic waste treatment system in a factory gives rise to a human impact of 1, an environmental impact of 2 and an impact from service interruption of 1, while the loss of integrity of that system has a human impact of 4, an environmental impact of 3, and an impact from service interruption of 1. Therefore, the consequences are considered to be level 4. Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 37
38 3.6.2 Estimating Likelihood The calculation of likelihood is based on the exposure calculated in The Users and Attacker scales are then used as aggravating factors to calculate the likelihood using the following formula: A + U 2 L = E + 2 where L is the likelihood, E the exposure, U the users and A the level of the attacker. The mathematical operator. means to round up to an integer Classification Feared events and threat scenarios give rise to risks. These are placed in the following table, which allows us to determine the class of an ICS. As explained above, the most serious impact (human, environmental or service interruption) is used. 5+ Class 2 Class 2 Class 3 Class 3 4 Class 2 Class 2 Class 2 Class 3 3 Class 1 Class 2 Class 2 Class 2 2 Class 1 Class 1 Class 2 Class 2 1 Class 1 Class 1 Class 1 Class 1 Impact/Likelihood Cybersecurity for Industrial Control Systems Classification Method and Key Measures
39 Annex A. Simplified Case Studies The following examples illustrate how to apply this method of ICS classification for different sectors of activity. The results given here shall in no way forecast the classification of similar real systems. A.1 Water supply plant The plant under consideration is a remotely managed ICS handling the water supply of an urban area with 500,000 inhabitants. The ICS is geographically distributed over several sites (reservoirs, booster stations, pumps). Remote sites communicate with the central site via PSTN 1 lines or GPRS 2 connections. The ICS is composed of numerous remote management devices (RTU 3 ) and supervision work stations (SCADA). Technicians can connect to the system from their remote location if problems occur. Therefore, the functionality level is 2 and the connectivity level is 5. According to the table provided, the exposure level is 5. There are few users. In theory, only authorised users can access the ICS. In addition, each site has an access control system and video surveillance. The level of users is therefore 3. Regarding attackers, it seems unlikely that foreign powers or commercial competitors would want to attack the system because the company does not do business on an international level. The level of the attacker is therefore 3. The impact is limited to an interruption of the water supply for several hours. According to the table of service interruptions, this corresponds to a moderate impact. Therefore, the consequences are level 3. The maximum impact is 3. Using the formula provided, we obtain a likelihood of 7. According to the classification table, the ICS is in class 2. 1 Public Switched Telephone Network 2 General Packet Radio Service. 3 Remote Terminal Unit. Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 39
40 A.2 Manufacturing industry The site under study is a household appliance assembly line for a company essentially doing business on a national level. As background, the company has already faced a security incident where an employee on the night shift introduced a USB key containing a virus on a supervisory work station. The production line was stopped for three days. The ICS is limited to a single site. It includes an MES and permanently-connected engineering stations. Technicians and operators use tablets and wireless scanners to scan bar codes. Therefore, the functionality level is 3 and the connectivity level is 3. According to the table provided, the exposure level is 3. Users are numerous, but, in theory, only authorised personnel can access machines. The level of users is therefore 3. Regarding attackers, it seems unlikely that foreign powers or commercial competitors would want to attack the system because the company does not do business on an international level. The level of the attacker is therefore 3. Impacts are limited to lost production, which can be inconvenient for the company but will have little impact on the local economy. We propose considering the impact as level 1. Using the formula provided, we obtain a likelihood of 5. According to the classification table, the ICS is in class 1. A.3 Continuous process industry The ICS under study is a production plant for toxic chemicals. The site is covered by the Seveso Directive. The worst scenarios are: introduction of malware into the ICS; an intrusion into the ICS. This malicious action may be carried out by an individual on site, remotely via the MIS or via a compromised work station on the ICS. 40. Cybersecurity for Industrial Control Systems Classification Method and Key Measures
41 The scenario results in either the loss of one or more operator HMIs (e.g. black or frozen screens, erroneous information displayed) or commands being sent with the intention of causing malfunction. This incident would be detected by one of the following: a control operator; alarm signals (e.g. threshold exceeded); the securing of the units concerned by the Safety Instrumented System (completely isolated from the control system) in response to detection of abnormal operating conditions or manual operator action. This would result in downtime for some units, typically lasting one to three days, in order to diagnose the problem and restore configurations. The system could operate temporarily in degraded mode until the problem is fully corrected. There is no human impact resulting from this scenario. The environmental impact is estimated at 2. The impact on the service provided can range from 1 to 3 depending on the time elapsed before return to service. The impact is chosen to be level 3. The ICS has centralised historians, engineering stations or programming consoles that are permanently connected. The industrial networks are connected to the site s MIS. Wireless networks are not yet deployed on the industrial perimeter. The functionality level is therefore estimated to be 3; the connectivity level is estimated to be 2. Using the table provided, the exposure is therefore level 3. As this site is covered by the Seveso Directive, users are all are certified and controlled, and the corresponding level is 1. This sensitive industrial site is likely to attract the attention of hacktivists, so the attacker level is 4. Using the formula provided, the level of likelihood is 5. Combined with the impact of level 3, we consider this ICS to be class 2. Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 41
42 Note If the Safety Instrumented System (for assets and individuals) were not isolated from the production unit control system, we could envision a virus or takeover of the ICS that disrupts the safety functions.. In that case, rather than just service interruptions, major human impact could potentially result (level 4). According to the table, the ICS would then be in class 3. A.4 Railway switch automation In a railway transport network, a computerised railway switch control system allows management of track assignments and remote control of switches and signalling devices. The system is composed of the following elements: a computerised interlock module (i.e. a PLC) connected to the switches on the railway tracks (i.e. an actuator). The module contains configurable routing maps that are formally validated in advance; configuration work stations on a private network dedicated to the transport system. Devices in this network is located in private physical locations, and is therefore protected against undesired access. The configuration work stations are used for diagnostics and to configure routing maps; a maintenance work station, outside the network, that is physically connected to the module to set up a new map when necessary. This connection is used only on specific occasions. We can immediately identify two feared events: an accident, if the control system implements an invalid map and sends dangerous commands to the switches; loss of service for the line (or at least a portion of it), if the control system stops working or sets up restrictive routing configurations. The impact is therefore level 5, since a dangerous system malfunction could cause an accident with multiple fatalities. 42. Cybersecurity for Industrial Control Systems Classification Method and Key Measures
43 In view of the devices, the functionality is level 2. The telecommunications network used by the control system is distributed but private. Therefore, the connectivity is level 4. The exposure level is thus 4. Users using the control system are certified maintainers. Their interventions are controlled in accordance with the requirements for dependability. Therefore, the user level is 1. We choose a maximum threat level because the system can cause fatal accidents and is therefore likely to attract the attention of malicious individuals. Additionally, the scenario of causing a train derailment is regularly cited in cyberattack scenarios. The attacker level is therefore 5. In conclusion, the likelihood is greater than 4 and the system is class 3. Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 43
44
45 Acronyms. ANSSI Agence nationale de la sécurité des systèmes d information APN Access Point Name BCP Business Continuity Plan BMS Building Management System BRP Business Recovery Plan CIM Computer Integrated Manufacturing DCS Distributed Control System (SNCC) EBIOS Expression des besoins et identification des objectifs de sécurité , 26 ERP Enterprise Resource Planning FAT Factory Acceptance Test GPRS General Packet Radio Service ICS Industrial Control System , 6, 9, 39 IT Information Technology , 6 LPM Loi de programmation militaire MES Manufacturing Execution System MIS Management Information System MPLS Multiprotocol Label Switching , 32 PLC Programmable Logic Controller , 28 PSTN Public Switched Telephone Network RTU Remote Terminal Unit SAT Site Acceptance Test SCADA Supervisory Control And Data Acquisition , 27, 39 SGDSN Secrétariat général de la Défense et de la Sécurité nationale VPN Virtual Private Network Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 45
46
47 Glossary. Asset Any resource that has value to the organisation and is necessary to achieve its objectives [4]. In particular, we distinguish between primary assets and supporting assets. French: bien , 27 Primary Asset Data or process deemed important for the organisation. We can assess its sensitivity but not its vulnerabilities. French: bien essentiel Supporting Asset Asset that provides support for primary assets. Typical examples are information systems, organisations and premises. We can assess its vulnerabilities but not its sensitivity. Examples: systems integrator, production unit, automation engineer, Ethernet network, operating system. French: bien support. 27 Attack An attempt to compromise an information system, carried out with a malicious objective. The intention may be to steal data (e.g. military, diplomatic or industrial secrets, personal banking data) or to destroy, damage or alter the normal operation of information systems (including ICSs). French: Attaque , 14, 23, 28 Attack Surface All vulnerable resources of a system, exposed to attacks from external sources of threats via various interfaces between the system and its environment. French: Surface d attaque , 31, 32 Availability Property allowing the expected service to be performed in the desired time and in conformity with the expected conditions of use. French: disponibilité , 37 Building Management System Building Management System ICS that manages all technical installations in a building (e.g. electricity, climate control, ventilation, elevators, access control, video surveillance). French: Gestion technique de bâtiment Compromise Access Compromise Access, certain or probable, to data or protected media by one or more unauthorised individuals [3]. French: compromission. For an information system, see Intrusion Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 47
48 Confidentiality Private aspect of data or of a process, to which access is restricted solely to certain individuals in view of requirements of the service, or to authorised entities or processes [3]. French: Condentialité , 23, 32 Consequences Quantification of the severity of a risk or feared event. Examples: See 3.3. French: Gravité Control Control Means of addressing a data security risk. A control s nature and the level of detail of its description can be highly variable. French: Mesure de sécurité Control-Command System Automated system that handles the operation and protection of an industrial process. Control-command systems are frequently composed of sensors, actuators and PLCs. French: Système de contrôle-commande Controller Programmable Logic Controller. French: Automate programmable industriel , 27 Cyberdefence All technical and non-technical measures allowing a State to defend information systems deemed essential. French: cyberdéfense Cyberdefence authority Cyberdefence authority National authority responsible for the defence of information systems. In the framework of guidelines established by the Prime Minister, it sets down measures that the State implements to respond to crises affecting or threatening the security of information systems for public authorities and operators of vital importance [1]. French: autorité de cyberdéfense , 11, 15, 19 Cybersecurity A desired condition for an information system, allowing it to withstand events of malicious origin that are likely to compromise the availability, integrity or confidentiality of data stored, processed or transferred or the services provided by the system. French: cybersécurité Data Diode Data diode Partitioning device designed to allow the circulation of information in a single direction. The unidirectionality is ensured using physical techniques. French: diode Decontamination station Decontamination station Work station allowing verification that removable media is virus-free before it is used on the plant. French: Station blanche or station de dépollution Cybersecurity for Industrial Control Systems Classification Method and Key Measures
49 Dependability The study of a system s failures and faults in order to ensure its ability to accomplish its functions, under defined conditions and for a given period of time. In particular, dependability addresses the properties of Reliability, Availability, Maintainability and Safety (RAMS). In this context, dependability concerns people and assets. Failure Modes, Effects and Criticality Analysis (FMECA) is a methodology frequently used in this domain. French: Sûreté de fonctionnement Engineering Station Computer devices with software packages for configuring, designing, programming, or administrating industrial devices such as PLCs and SCADAs. This device is connected to the industrial network and made available to different teams (e.g. maintenance, engineering, support). French: Station d ingénierie Feared Event Feared event Generic scenario representing a situation feared by the organisation. It is expressed by a conjuncture of threats likely to be the cause of the event, a primary asset, a security criterion, the sensitivity concerned and the potential impacts. Example: a malevolent individual (e.g. journalist, competitor) manages to obtain the organisation s estimated budget, deemed confidential, and publishes the information in the media. French: Événement redouté , 38 Firewall Firewall Device that implements the partitioning policy between multiple networks by filtering the data streams between them. French: Pare-feu Flaw Vulnerability in a computer system that allows an attacker to compromise its normal operation, confidentiality or the integrity of the data it contains. French: Faille Historian Database containing logs of alarms and process values collected by the supervision software (SCADA). These historians are often local or centralised. French: Historique Centralised Historian Historian centralising data from multiple supervisor consoles (SCADA). Data retention time is often long, but with a coarser granularity than in the local historian. Management can use this historian for data analysis, statistics, etc. concerning the entire production unit. French: Historique centralisé Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 49
50 Local Historian Historian located near the industrial devices for which it records data. Data retention time is often limited, but with a very fine granularity. This historian allows operators to perform detailed analyses when production incidents occur. French: Historique local Human-Machine Interface Human Machine Interface allowing an intervener to interact with and control the operation of an ICS. French: Pupitre Impact Direct or indirect consequences on the organisation and/or its environment of not addressing sensitivities. Examples: On the organisation s activity; on individuals safety; financial, legal, image or environmental issues. French: Impact , 23, 25, 37, 38 Imputability Ability to attribute legal responsibility for an action to a natural or legal person. French: Imputabilité Information Security Risk Scenario, with an associated level, representing the conjuncture of a feared event and one or more threat scenarios. Its level corresponds to an estimate of its consequences and likelihood. French: Risque Information System Set of human and material resources designed to develop, process, store, transfer, display or delete information [3]. French: système d information Distributed Information System Distributed information system Information system or ICS interconnecting multiple sites. A system falls into this category when it is not possible to set up a closed perimeter with access control around the entire system. This applies in particular to the cables and optical fibres for the network supporting the system. French: Système d information distribué Industrial Control System Set of human and material resources designed to control or operate a group of sensors and actuators. French: Système automatisé de contrôle des procédés industriels (Système industriel) Management Information System Information system including services and applications designed for management purposes (e.g. office applications, human resources, customer service). French: Système d information de gestion Integrity Property of protecting the accuracy and completeness of assets. French: Intégrité , 23, 32, Cybersecurity for Industrial Control Systems Classification Method and Key Measures
51 Intrusion Takeover, certain or probable, of an information system or one of its components by one or more unauthorised individuals. French: Intrusion , 19 Intrustion Test Security test for an information system generally consisting of simulating the behaviour of a malicious individual or programme. French: Test d intrusion Likelihood Estimate of the possibility that a threat scenario or a risk will occur. It represents the estimated level of possibility. Example: See section 3.3. French: Vraisemblance , 23, 25, 26, 38 Programming Console Work station containing tools that allow programming, configuring and administering an industrial PLC. French: console de programmation Remote Diagnosis Remote diagnosis The action of remotely (implying from outside the information systems of the responsible entity) carrying out diagnostics on a technical plant. This does not include modifying configurations (read-only). French: Télédiagnostic , 18 Remote Maintenance The action of remotely (implying from outside the information systems of the responsible entity) carrying out maintenance tasks on a technical plant. In particular, this implies being able to modify configurations or programmes (read/write). French: Télémaintenance , 18 Remote Management The action of remotely (implying from outside the information systems of the responsible entity) taking control of geographically distributed technical plant (read/write). French: Télégestion , 18 Responsible Entity Natural or legal person that has legal responsibility for the implementation of appropriate cybersecurity measures for the system concerned. French: Entité responsable Secure data exchange station Secure data exchange station Secure device allowing data exchange with removable media. It is usually a dedicated work station implementing security mechanisms to limit the potential spread of viruses, verify the authenticity of data, etc. French: Sas Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 51
52 Security Aproval Declaration by the approval authority, in light of the approval file, that the information system in question is considered capable of fulfilling its objectives in conformity with the security objectives that were set, and that the residual security risks are accepted and controlled. The security approval remains valid as long as the information system operates under the conditions approved by that authority. French: Homologation de sécurité Security Criterion Characteristic of a primary asset allowing assessment of its various sensitivities. Examples: availability, integrity, confidentiality, traceability. French: critère de sécurité Security Incident One or more undesirable or unexpected events related to information security, with a high probability of compromising the operations linked to the organisation s activity and endangering data security. French: incident de sécurité [5] , 11, 14, 15 Sensitivity A precise and unambiguous definition of the level of a primary asset s operational requirements for a given security criterion (e.g. availability, confidentiality, integrity). Examples: must be available during the day, must be known to the project group. French: besoin de sécurité Threat Potential cause of an undesirable incident, which may harm a system or organisation [5]. Examples: Theft of media or documents, corruption of software, passive listening. French: Menace , 7, 13, 22 Threat Scenario Scenario, with an associated level, describing methods of attack. It represents the conjuncture of the sources likely to be the cause of threats, a supporting asset, a security criterion, threats and the exploitable vulnerabilities that make it possible. Its level corresponds to the estimate of its likelihood. Examples: Theft of media or documents because of the ease of entry into offices; corruption of software due to users naivety. French: Scénario de menace , 15, 38 Traceability Property allowing identification of the source of a primary asset and reconstruction of its path from its production through to its use. French: Traçabilité , 23 User User Any person who intervenes on an information system. This includes personnel responsible for operation of the system but also integrators and maintenance personnel. French: Intervenant , Cybersecurity for Industrial Control Systems Classification Method and Key Measures
53 Certified User Certified user Any user on an information system who received specific training regarding his role for the installation concerned and awareness of information system security. The training must have been officially recorded by the system s responsible entity. French: Intervenant habilité , 36 Vulnerability Characteristic of a supporting asset that can constitute a weakness or flaw concerning information system security. Examples: credulity of personnel, ease of entering a site, possibility to create or modify system commands. French: Vulnérabilité , 13 15, 28, 32 Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 53
54
55 Bibliography. [1] Décret n février [2] Secrétariat de la Défense et de la Sécurité nationale. Guide pour réaliser un plan de continuité d activité. June [3] Secrétariat général de la défense nationale. Instruction générale interministérielle sur la protection du secret de la défense nationale. August [4] ISO. ISO27001: Information Security Management System (ISMS) standard [5] ISO. ISO27000: Information security management systems Overview and vocabulary [6] Agence nationale de la sécurité des systèmes d information. Guide d élaboration de politiques de sécurité des systèmes d information [7] Agence nationale de la sécurité des systèmes d information. EBIOS Expression des besoins et identification des objets de sécurité [8] Agence nationale de la sécurité des systèmes d information. Maîtriser la ssi pour les systèmes industriels. June [9] Agence nationale de la sécurité des systèmes d information. 40 essential measures for a healthy network. January [10] Agence nationale de la sécurité des systèmes d information. Cybersecurity for industrial control systems: Detailed Measures Cybersecurity for Industrial Control Systems Classification Method and Key Measures. 55
56
57
58
59 This cybersecurity guide for Industrial Control Systems was produced by the French Network and Security Agency (ANSSI / Agence nationale de la sécurité des systèmes d information) with the help of the following companies and organisations: Actemium, Airbus Defence and Space, Arkoon-Netasq, A.R.C. Informatique, Atos Worldgrid, Hirschmann, Cassidian Cybersecurity, CEA, CLUSIF, DCNS, DGA Maîtrise de l information, Euro system, EXERA, GDF SUEZ, Gimélec, INERIS, Itris Automation Square, Lexsi, Schneider Electric, Siemens, Sogeti, RATP,
60 Solucom, Thales, Total.
61 About ANSSI The French Network and Security Agency (ANSSI / Agence nationale de la sécurité des systèmes d information) was created 7 July 2009 as an agency with national jurisdiction ( service à compétence nationale ). By Decree No of 7 July 2009 as amended by Decree No of 11 February 2011, the agency has responsibility at national level concerning the defence and security of information systems. It is attached to the Secretariat-General for National Defence and Security (Secrétaire général de la défense et de la sécurité nationale) under the authority of the Prime Minister. To learn more about ANSSI and its activities, please visit Version January 2014 Licence «information publique librement réutilisable» (LIP V ). Agence nationale de la sécurité des systèmes dʼinformation ANSSI - 51 boulevard de la Tour-Maubourg PARIS 07 SP FRANCE Websites: and communication [at] ssi.gouv.fr
Detailed Measures. Cybersecurity for Industrial Control Systems
. Detailed Measures Cybersecurity for Industrial Control Systems Table of Contents. 1 Introduction 7 1.1 Context 7 1.2 Scope 7 1.3 Structure of the set of documents 8 1.4 Note to the reader 8 2 Cybersecurity
Protection profile of an industrial switch
Version 1.0 short-term GTCSI July 13, 2015 Preface In the whole document, the acronym ToE (Target of Evaluation) designates the component being evaluated. Text in red differs from the mid-term version
Protection profile of an industrial firewall
Version 1.0 short-term GTCSI July 13, 2015 Preface In the whole document, the acronym ToE (Target of Evaluation) designates the component being evaluated. Text in red differs from the mid-term version
AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005
AUDITOR GENERAL S REPORT Protection of Critical Infrastructure Control Systems Report 5 August 2005 Serving the Public Interest Serving the Public Interest THE SPEAKER LEGISLATIVE ASSEMBLY THE PRESIDENT
Securing Industrial Control Systems Secure. Vigilant. Resilient. May 2015
Securing Industrial Control Systems Secure. Vigilant. Resilient. May 2015 Cyber Security Securing industrial control systems: Don t be a victim of cyber-attacks Cyber security Just as the workplace is
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION
Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION ALBERTO AL HERNANDEZ, ARMY RESERVE OFFICER, SOFTWARE ENGINEER PH.D. CANDIDATE, SYSTEMS ENGINEERING PRESENTATION
Prime Minister. The French Networks and Information Security Agency Agence nationale de la sécurité des systèmes d information
Prime Minister The French Networks and Information Security Agency Agence nationale de la sécurité des systèmes d information Security incident detection service providers Prestataires de détection des
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment By Jerome Farquharson, Critical Infrastructure and Compliance Practice Manager, and Alexandra Wiesehan, Cyber Security Analyst,
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
CPNI VIEWPOINT CYBER SECURITY ASSESSMENTS OF INDUSTRIAL CONTROL SYSTEMS
CPNI VIEWPOINT CYBER SECURITY ASSESSMENTS OF INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Cyber Security Assessments of Industrial Control Systems Good Practice
Remote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
Security for. Industrial. Automation. Considering the PROFINET Security Guideline
Security for Industrial Considering the PROFINET Security Guideline Automation Industrial IT Security 2 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
The University of Iowa. Enterprise Information Technology Disaster Plan. Version 3.1
Version 3.1 November 22, 2004 TABLE OF CONTENTS PART 1: DISASTER RECOVERY EXPECTATIONS... 3 OVERVIEW...3 EXPECTATIONS PRIOR TO AN INCIDENT OCCURRENCE...3 EXPECTATIONS PRIOR TO A DISASTER OCCURRENCE...4
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Verve Security Center
Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
EA-ISP-012-Network Management Policy
Technology & Information Services EA-ISP-012-Network Management Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 01/04/2015 Document Security Level: PUBLIC Document Version: 1.00 Document Ref:
Using ISA/IEC 62443 Standards to Improve Control System Security
Tofino Security White Paper Version 1.2 Published May 2014 Using ISA/IEC 62443 Standards to Improve Control System Security Contents 1. Executive Summary... 1 2. What s New in this Version... 1 3. Why
Intelligent. Buildings: Understanding and managing the security risks
Version 2 IET Sector Insights Intelligent Buildings: Understanding and managing the security risks More efficient and cost-effective use of the built environment is increasingly being driven by economic
Polish Financial Supervision Authority. Guidelines
Polish Financial Supervision Authority Guidelines on the Management of Information Technology and ICT Environment Security for Insurance and Reinsurance Undertakings Warsaw, 16 December 2014 Table of Contents
RC-17. Alejandro V. Nader National Regulatory Authority Montevideo - Uruguay
RC-17 Radiation Protection in Waste Management and Disposal Implementing the Joint Convention on the Safety of Spent Fuel Management and on the Safety of Radioactive Waste Management Alejandro V. Nader
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
How Secure is Your SCADA System?
How Secure is Your SCADA System? Charles Drobny GlobaLogix, Inc. Houston, TX, USA Our Industry is a Target 40% of cyber attacks on Critical Infrastructure targets are aimed at the Energy Industry The potential
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
Company Management System. Business Continuity in SIA
Company Management System Business Continuity in SIA Document code: Classification: Company Project/Service Year Document No. Version Public INDEX 1. INTRODUCTION... 3 2. SIA S BUSINESS CONTINUITY MANAGEMENT
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
Safeguarding Your Plant Automation Programs with Change Management
Safeguarding Your Plant Automation Programs with Change Management By Gary Gillespie M.S. Mechanical Engineering B.S. Mining Engineering 1 Introduction... 3 Change Management and the Plant... 3 Impact
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
Understanding Sage CRM Cloud
Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
ISACA rudens konference
ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES
MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
8/27/2015. Brad Schuette IT Manager City of Punta Gorda [email protected] (941) 575-3354. Don t Wait Another Day
Brad Schuette IT Manager City of Punta Gorda [email protected] (941) 575-3354 2015 FRWA Annual Conference Don t Wait Another Day 1 SCADA Subsystems Management Physical Connectivity Configuration Mgmt.
Announcement of a new IAEA Co-ordinated Research Programme (CRP)
Announcement of a new IAEA Co-ordinated Research Programme (CRP) 1. Title of Co-ordinated Research Programme Design and engineering aspects of the robustness of digital instrumentation and control (I&C)
Information Security Assessment and Testing Services RFQ # 28873 Questions and Answers September 8, 2014
QUESTIONS ANSWERS Q1 How many locations and can all locations be tested from a A1 5 locations and not all tests can be performed from a central location? central location. Q2 Connection type between location
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
TECHNICAL SPECIFICATION
TECHNICAL SPECIFICATION IEC/TS 62443-1-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 1-1: Terminology, concepts and models INTERNATIONAL ELECTROTECHNICAL
Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com
Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests
QUICK REFERENCE GUIDE MOBILE HUMAN MACHINE INTERFACE (HMI): INNOVATION THAT EMPOWERS THE MOBILE OPERATOR
MOBILE HUMAN MACHINE INTERFACE (HMI): INNOVATION THAT EMPOWERS THE MOBILE OPERATOR Mobile operators are critical to ensuring the overall efficiency and uptime of the production line and play a critical
Cybersecurity for Industrial Control Systems
Cybersecurity for Industrial Control Systems Cybersecurity for Industrial Control Systems 1 Table of Contents 1. Context and issues surrounding industrial control system cybersecurity...9 1.1. Industrial
Funktionale Sicherheit IEC 61508 & IEC 62443
Funktionale Sicherheit IEC 61508 & IEC 62443 Seite 1 PROFIsafe trifft New York PROFIsafe Senior Safety Expert Siemens AG, DF FA AS E&C-PRM3 [email protected] Seite 2 Roosevelt Island Picture
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
John Essner, CISO Office of Information Technology State of New Jersey
John Essner, CISO Office of Information Technology State of New Jersey http://csrc.nist.gov/publications/nistpubs/800-144/sp800-144.pdf Governance Compliance Trust Architecture Identity and Access Management
Management Standards for Information Security Measures for the Central Government Computer Systems
Management Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 1.1 General...
Guideline on Vulnerability and Patch Management
CMSGu2014-03 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Vulnerability and Patch Management National Computer Board
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Enterprise Cybersecurity: Building an Effective Defense
Enterprise Cybersecurity: Building an Effective Defense Chris Williams Oct 29, 2015 14 Leidos 0224 1135 About the Presenter Chris Williams is an Enterprise Cybersecurity Architect at Leidos, Inc. He has
Dr. György Kálmán [email protected]
COMMUNICATION AND SECURITY IN CURRENT INDUSTRIAL AUTOMATION Dr. György Kálmán [email protected] Agenda Connected systems historical overview Current trends, concepts, pre and post Stuxnet Risks and threats
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
University of Aberdeen Information Security Policy
University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
Introduction. Industry Changes
Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric Challenges What challenges are there for Cyber Security in Industrial
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Recommended Practice: Configuring and Managing Remote Access
OPC & Security Agenda
OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
Music Recording Studio Security Program Security Assessment Version 1.1
Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
Recommendations for companies planning to use Cloud computing services
Recommendations for companies planning to use Cloud computing services From a legal standpoint, CNIL finds that Cloud computing raises a number of difficulties with regard to compliance with the legislation
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
The evolution of data connectivity
Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity
Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi etieghi@visionautomation.
Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems Enzo M. Tieghi [email protected] Security IT & Control System Security: where are we?
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids
CPSR-SG 2016: Joint International Workshop on Cyber-Physical Security and Resilience in Smart Grids, 12th April 2016, Vienna Security for smart Electricity GRIDs Including Threat Actor Capability and Motivation
Cyber Security for SCADA/ICS Networks
Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
