Cyber Security of Industrial Control Systems:
|
|
|
- Amie Farmer
- 10 years ago
- Views:
Transcription
1 TECHNICAL STUDIES Cyber Security of Industrial Control Systems: How to get started? An overview of existing documents, standards, guidelines and best practices September 2014 CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 11 rue de Mogador Paris Tel : Fax : [email protected]
2 The French law of March 11, 1957, specifically Sections 2 and 3 of Article 41 on one hand, authorizes only "copies or reproductions strictly reserved for the private use of the copyist and not intended for a collective use" and, on the other hand, analysis and short quotations for the purpose of example and illustration ". Any representation or complete or partial reproduction, made without the approval of the author or the entitled parties or the legal successors is unlawful " (Section 1 of Article 40). This representation or reproduction with whatever process, would thus constitute a forgery punishable under Section 425 of the French Penal Code 2/24 CLUSIF 2014 Cybersecurity of industrial systems
3 Contents I. Introduction... 5 II. Definition, Constituents and Challenges... 6 III. Security Guidelines for ICS... 9 III.1. A rich and diverse literature III.2. Significant presence of different industries III.3. Multiple document profiles III.4. Documents for different readers profiles III.5. Must-read documents III.6. Improving consistency IV. The 5 Key Steps in Securing IIS IV.1. Stage 1: integrate the industrial nature of the business, and conduct an inventory of security issues IV.2. Stage 2: Educate the management board on the issue of vulnerabilities and related industrial risks IV.3. Stage 3: Design an industrial control system cybersecurity policy (I-ISSP) IV.4. Stage 4: Implement the I-ISSP at the operational level IV.5. Stage 5: Keep cyber risks under control V. Appendix V.1. Reviewed reference documents Cyber security of industrial systems CLUSIF /24
4 ACKNOWLEDGMENTS The CLUSIF wishes to recognize all those who have contributed to this document, especially: The heads of the workgroup: Gérôme BILLOIS Solucom Hervé SCHAUER HSC The contributors: Patrice BOCK ISA France, Sogeti France Jean CAIRE RATP Emmanuel DE LANGLE Solucom Loïc DIVAN Andra Cigéo Anthony DI PRIMA Solucom Loïc GUEZO Trend Micro Philippe JEANNIN RTE Thierry PERTUS Conix Orion RAGOZIN Éric SAVIGNAC Airbus Defence and Space The CLUSIF also thanks all members who have reviewed and edited this document. For any comment, please contact the CLUSIF at 4/24 CLUSIF 2014 Cybersecurity of industrial systems
5 I. Introduction This document is the outcome of a large-scale consolidation of feedbacks from contributors and of existing resources and literature, with the aim to support the information security community in charge of cyber security of industrial control systems. An overview of existing reference documents, along with explanatory notes, is made available to provide decision-making guidance to users willing to set up a cybersecurity framework, or identify appropriate resources to read. Based on this overview, this document also offers a staged, progressive approach in 5 key steps, to help those unfamiliar with industrial environments get a better grasp of this topic and help their respective organization adopt a continuous improvement approach. This resource is targeted primarily at CISO (Chief Information Security Officers) who are in charge of industrial control systems cyber security. Yet, any profile involved in the cyber security of industrial systems will benefit from this resource. Please note that the set of reference documents listed herein is a snapshot of existing supporting literature as of March 31, Cyber security of industrial systems CLUSIF /24
6 II. Definition, Constituents and Challenges Industrial Control Systems (ICS) or Industrial Automation and Controls Systems (IACS) is a broad concept that encompasses all digital systems that directly interact with the Physical World. This concept also includes contiguous areas such as BMS (Building Management Systems). Such systems are classified under 4 key categories of components as described in the CIM pyramid (Computer Integrated Manufacturing): Components that help interact with the physical world. These are sensors (temperature, open/close sensors, humidity, light ) and actuators (pumps, cylinders, valves, indicator lights ). They are often connected to each other over a specific network called a fieldbus. Proprietary protocols are commonplace, but the use of IP technologies is on the rise. Some smart models come with an IED (Intelligent Electronic Device). These components form the level 0 of the CIM pyramid. Industrial control components are those that manage the actuators with regards to information delivered by sensors and embedded software. Such components can be distributed (DCS: Distributed Control System) or autonomous; in the form of PLCs (Programmable Logical Controller) deployed at the local level, or RTUs (Remote Terminal Unit). Today, this difference tends to fade in the field. The next-generation components (PAC: Programmable Automation Controller) provide more features than traditional components and are connected through IP links to production control IT networks. This is the first level of the CIM pyramid. Process monitoring and control components constitute the level 2 of the pyramid. Through a Human-Machine Interface (HMI), those components provide visibility throughout the process, and manage the process according to instructions. Acronyms, such as SCADA (Supervisory Control And Data Acquisition) or MTU (Master Terminal Unit) are often used. These components are linked to the production management systems (level 3 of the pyramid) where they get their instructions. They often comprise traditional IT modules, such as servers and clients running operating systems like Windows. The three categories of components can be assembled, shared, or used distinctly, depending on the supported process and, together, they constitute the Industrial Information System. Industrial systems are increasingly leveraging IT features, and are linked to the Office Information Systems, the level 4 of the CIM pyramid. The scope of ICS has, therefore, expanded to include remote management (remote maintenance via the Internet or the MIS, for example). Consequently, IIS has become more exposed to cyber risks. 6/24 CLUSIF 2014 Cybersecurity of industrial systems
7 The CIM pyramid (source: Thierry Cornu) There are three main categories of ICS: Systems located at a specific site. This is the most common case, and refers to digital systems located at a specific physical site or just a short distance away (a few kilometers at the most). These systems are, for example, part of a production chain in the automobile, food, or pharmaceutical industries, and can also be found in an extraction and/or transformation infrastructure in the nuclear, gas and oil industries. It is quite common to have one or more industrial systems on site, thus defining a comprehensive infrastructure. These systems also include Building Management Systems, as well as safety processes that protect manufacturing environments. They are clearly identified and their location is known, while there is often a human presence nearby. Distributed systems. These systems are scattered throughout a country or region, and support different applications: transportation, utility networks, tracking of distributed systems on remote industrial sites (management of liquid levels in tanks ). These require telecommunication networks over long distances, often subcontracted to a third-party service provider. Note that there may be no staff available at such physical sites. In most cases, remote access is an essential requirement for performing daily tasks, such as maintenance. Stand-alone/mobile/embedded systems. There are different meanings ascribed to these terms. In this document, such systems are defined as systems with a smaller footprint of less than 10 meters. They include, for example, medical systems, such as Cyber security of industrial systems CLUSIF /24
8 scanners, MRIs (Magnetic Resonance Imaging), as well as pacemakers and such stand-alone healthcare systems. Systems from the transportation industry (vehicles, planes ) are also included in this category. Overall, these systems are usually part of a wider system. Those systems can of course be combined and made available in different formats. Regardless, this categorization scheme makes it possible to identify requirements in cyber security and limitations specific to the considered context. In the industrial environments, operational safety (system availability and integrity) is prioritized above privacy and tracking. Yet, this may be different for selected business processes, or determined by regulatory requirements. Industrial control systems have specific features that impact risk management and information security processes: Their lifespan is long, often spanning dozens of years between one generation of a product and the next. They are deployed in harsh environments (dust, humidity, electromagnetism, extremes of temperature, corrosion ). They can be deployed over an isolated and segregated information system, and this may add to the complex task of ensuring their security. Disruptions in service must be as few and far between as possible, and this requires serious planning efforts. An industrial process or equipment can be brought to a standstill due to physical limitations (i.e., the duration required to initiate an industrial process, or the timeframe necessary for safe intervention further to the disruption of a process). Note that cyber security tasks may conveniently be scheduled during planned maintenance shutdowns. Interventions on such systems may be conducted in environments with low accessibility and under certain conditions. This may require specific expertise and compliance with stringent physical safety guidelines. In most industries, IIS depends on their vendors. These vendors usually supply a turnkey system, with a maintenance contract running over several years, while evolutions and reversibility is limited, and sometimes not possible due to the specific features and proprietary technologies used. The configuration of the components that make the IIS must be certified by a supervisory authority, which may require undergoing certification after each modification. This can prove time consuming, and may bring the production process to a halt until the certification is granted. 8/24 CLUSIF 2014 Cybersecurity of industrial systems
9 III. Security Guidelines for ICS There are many security guidelines and standards related to IIS, and these multiple resources make it sometimes difficult to understand all aspects of this topic. Therefore, it seemed wise to build a landscape of reference documents and resources dealing with the issue, with the goal to identify most of the existing documents and spot the most relevant ones. This chapter provides the tools to identify the guidelines and reference documents that are of most value to those willing to initiate an IIS information security project. This subject will be covered in the final section. As highlighted in the news, IIS security is a priority for many organizations. More than 50 reference documents were identified by the workgroup; and 30 of them were picked as the most relevant publications. This selection was performed after readings and analysis performed by all workgroup members who shared their insights. These documents were read and screened once again, and a final selection of 20 publications was found to be the most relevant, legible and practical to use. Please refer to the Appendix for the list of all documents screened by the workgroup members. Cyber security of industrial systems CLUSIF /24
10 III.1. A rich and diverse literature The figure below outlines the documents that were eventually selected for reading, and these are classified according to their release date and their size. This illustration evidences the crop-full of content from multiple documents released over the past recent years, as well as the diversity of such publications when it comes to their volume: from a few pages to thousands of pages. Size Hundreds of pages NISTIR 7628 IEC NIST SP IEC IEC - IEC ISO/IEC TR Around 100 pages A few dozens of pages DoE - Cyber Security Procurement Language for Control Systems Version IAEA- Computer Security at Nuclear Facilities API - API 1164 Pipeline SCADA Security DHS - CSSP Recommended Practices NRC - Regulatory Guide 5.71 ENISA - Protecting industrial control systems NERC - Critical Infrastructure Protection Standards ENISA - Appropriate security measures for smart grids SANDIA - Prioritizing Equipment & Mitigation CPNI - Process Control and SCADA security ANSSI - Maîtriser la SSI pour les systèmes industriels ANSSI - Méthode de classification et mesures principales et détaillées NIST - Framework for Improving Critical Infrastructure Cybersecurity NRC - 10 CFR A few pages DoE - 21 steps for SCADA security Release date A rich and diverse literature III.2. Significant presence of different industries The documents studied deal with IIS security relevant to specific industries, while some of them are cross-industry. The screening of these resources made it possible to highlight several findings. Yet, it is interesting to note that resources are rather abundant for the energy industry, as many organizations, including international organizations, such as ISO and ENISA, as well as the US Department of Energy and the IAEA, have focused on this industry. Many other documents, such as the IEC standard for the nuclear sector, are still in the draft stage. There are very few documents specific to the healthcare and transportation industries, and such publications are rather old or fail to be comprehensive. Meanwhile, the documents that are specific to an industry may also consist of documents, most of which will be relevant to other industries, simply by adapting 10/24 CLUSIF 2014 Cybersecurity of industrial systems
11 selected concepts or switching to appropriate terminology. Therefore, the focus of a publication on a specific industry should not be seen as a limiting criterion, and there are no reasons to set the sole focus on documents that are industry-specific. Cross-industries Energy Nuclear IEC IEC ANSSI - Méthode de classification et mesures principales et détaillées ANSSI - Maîtriser la SSI pour les systèmes industriels ENISA - Protecting industrial control systems DHS - CSSP Recommended Practices CPNI - Process Control and SCADA security NIST SP NIST - Framework for Improving Critical Infrastructure Cybersecurity SANDIA - Prioritizing Equipment & Mitigation ISO/IEC TR NISTIR 7628 ENISA - Appropriate security measures for smart grids DoE - 21 steps for SCADA security DoE - Cyber Security Procurement Language for Control Systems Version API - API 1164 Pipeline SCADA Security NERC - Critical Infrastructure Protection Standards IEC - IEC IAEA- Computer Security at Nuclear Facilities NRC - Regulatory Guide 5.71 NRC - 10 CFR Origin of documents III.3. Multiple document profiles The documents released officially have different goals: some of them provide an overview of key concepts, while others are highly granular and far-reaching in the principles they cover. From General to Specialized DHS - CSSP Recommended Practices CPNI - Process Control and SCADA security SANDIA - Prioritizing Equipment & Mitigation ANSSI - Maîtriser la SSI pour les systèmes industriels ANSSI - Méthode de classification et mesures principales et détaillées NERC - Critical Infrastructure Protection Standards ENISA - Appropriate security measures for smart grids API - API 1164 Pipeline SCADA Security ISO/IEC TR NIST SP NISTIR 7628 IEC DoE - 21 steps for SCADA security NIST - Framework for Improving Critical Infrastructure Cybersecurity NRC - Regulatory Guide 5.71 IAEA- Computer Security at Nuclear Facilities NRC - 10 CFR DoE - Cyber Security Procurement Language for Control Systems ENISA - Protecting industrial control systems IEC IEC - IEC A diversity of document profiles Note that the IEC standard (formerly ISA 99) is a family of standards with a large scope of use: some guidelines are rather general, while others are Cyber security of industrial systems CLUSIF /24
12 precise, specific and focused. Many of those guidelines are still in the process of being defined or upgraded, which makes them rather difficult to comprehend. The documents are categorized as follows, depending on their level of precision and their targets: Structure of the IEC standard (December 2013 source: ISA France) III.4. Documents for different readers profiles Knowing that publications do not always target the same profile, it is interesting to identify those that are the most useful for each of such profiles dealing with IIS. Three key profiles (or fields) can be identified: Information Security (IS) linked to the Management Information System, the field of IIS, and the design, integration and maintenance field that may include vendors. Several observations have been noted: first, each field could draw benefit from using documents relating to other fields. Yet, selected guidelines are more targeted than others, as they relate for instance to protocol specification and, therefore, are more focused on the design, integration and maintenance fields (IEC 62351, for example). Others are more useful to the information security field, such as the ISO/IEC TR document that provides advice and visibility into the practices of the ISO standard, and how to adapt then to IIS. These documents will, therefore, be more relevant to people dealing with the Management Information Systems, as the differences to account for in this document are rather seldom. There are also publications that are very business oriented and more relevant to the IIS field (e.g., IEC 61508). Another noteworthy finding is that selected documents are not focused on a specific field, but aim at being open to all. This is the case of the IEC 12/24 CLUSIF 2014 Cybersecurity of industrial systems
13 62443 standard, which provides several documents that can be adapted to different reader profiles. ISS field ISO/IEC TR DHS - CSSP Recommended Practices ANSSI - Maîtriser la SSI pour les systèmes industriels ENISA - Protecting industrial control systems ENISA - Appropriate security measures for smart grids NIST SP NIST - Framework for Improving Critical Infrastructure Cybersecurity ANSSI - Méthode de classification et mesures principales et détaillées NISTIR 7628 DoE - Cyber Security Procurement Language for Control Systems IEC CPNI - Process Control and SCADA security SANDIA - Prioritizing Equipment & Mitigation DoE - 21 steps for SCADA security NRC - Regulatory Guide 5.71 API - API 1164 Pipeline SCADA Security IEC - IEC NRC - 10 CFR AIEA - La sécurité dans les installations nucléaires NERC - Critical Infrastructure Protection Standards IEC Design, integration, maintenance field IS field Documents targeting different populations III.5. Must-read documents The study made it possible to select documents that would be essential to readers, according to their needs. Three categories of documents identified can be outlined: Must-read to start: these are documents that anyone dealing with information system or information security should read. Information is provided in a simple and legible way, along with real-world examples to deal with issues around IIS. Such readings are imperative for a start, but they are high-level educational resources. Yet, they remain quite comprehensive and instructive for execution. The must-read for implementation: these are documents that help evaluate, guide and implement projects in details. The must-read for knowledge improvement: such documents help to further explore a specific topic or industry. Cyber security of industrial systems CLUSIF /24
14 The must-read for a good start ANSSI - Maîtriser la SSI pour les systèmes industriels NIST SP DHS - CSSP Recommended Practices The must-read for implementation ANSSI - Méthode de classification et mesures principales et détaillées ISO/IEC TR IEC IEC ENISA - Appropriate security measures for smart grids NIST - Framework for Improving Critical Infrastructure Cybersecurity The must-read for knowledge improvement NERC - Critical Infrastructure Protection Standards ENISA - Protecting industrial control systems NRC - 10 CFR IAEA- Computer Security at Nuclear Facilities SANDIA - Prioritizing NISTIR 7628 IEC Equipment & Mitigation IEC DoE - Cyber Security Procurement Language for Control Systems CPNI - Process Control and SCADA security API - API 1164 Pipeline SCADA Security NRC - Regulatory Guide 5.71 DoE - 21 steps for SCADA security The must-reads III.6. Improving consistency There are multiple existing guidelines, and there are others in the process of being drafted. Yet, our study does not help spot a specific set of guidelines that would be superior and preferred to others. The IEC standard holds a central position, and offers the only guidelines with an international and cross-industry scope; but the standard hosts a number of resources that are still in their design or review stage, and cannot easily be used in their current format. Two documents of this standard (the 2-1, under review as of May 2014), and the 3-3 (released version), can be considered to design a cyber security set of guidelines. Meanwhile, it is preferable to simplify such resources and extract the key ideas, rather than implement them as is. The pitfalls are well identified by the related standardization committee and improvements are expected in the upcoming years. A certain level of inconsistency is present because of the variety of guidelines: topics are sometimes described in different ways, while terminology is not consistent. This highlights the need to add more maturity on all subjects related to IIS security, in the same way as when the initial works on information security were published. Meanwhile, the representatives of the organizations in charge of such guidelines are aware of these limits, and we can expect standardization across those guidelines in the upcoming year. We can also note that business specific expectations are high in the industrial domain, and this explains why resources are so abundant and diversified. This is a key difference with regards to regular information security, which is usually implemented universally, across various industries. 14/24 CLUSIF 2014 Cybersecurity of industrial systems
15 IV. The 5 Key Steps in Securing IIS IV.1. Experience earned from the workgroup members in their daily practice, along with the analysis of the different guidelines and reference documents, have made it possible to outline key steps towards securing the industrial IS. Stage 1: integrate the industrial nature of the business, and conduct an inventory of security issues The implementation of a IIS-focused cyber security project requires precise knowledge of the company s industrial environment, so as to better evaluate the impact of cyber risks related to humans, the environment and operations, and to prioritize countermeasures. This first stage is twofold: 1. Define a representative sample of the facilities to be audited, based on the industrial business activities. A company may have one or more lines of business (chemicals, metal-working, mechanical, manufacturing ), depending on the type of products (final or intermediate goods). This sample can be defined in collaboration with safety managers, and/or production site managers. 2. Map the audit s scope, and assess the level of exposure to cyber risks. Once the sample is defined, an audit is necessary to assess the exposure to cyber risks in three areas: Technical environment: facilities may host a diversity of technologies that are, for some of them, obsolete, or not based on IT (e.g., analog and non-ip technologies). If dealing only with old technologies, exposure to cyber attacks may be quite limited. External interfaces (in particular, with the corporate IS) must be audited. Industrial safety: the safety status and the results of hazard analysis are required to assess the impact of cyber risk scenarios. Actually, safety processes (safety-oriented Programmable Logic Controller, wired security, Safety Instrumented Systems (SIS)), may be implemented to stop industrial processes in a safe way. Cyber security of industrial systems CLUSIF /24
16 When assessing the impact of cyber risks, safety measure may be taken into account to lower their impact. Meanwhile, this is feasible only if safety is provided through processes that are not automated, or by an autonomous industrial system (physically independent). Furthermore, note that safety mechanisms may be used against the facilities themselves through a denial of service (triggering of safety measures to disrupt the production process). Cyber security: a gap analysis may be carried out with regards to best practices in securing traditional IT 1, or industryfocused/specific 2 guidelines. During this stage, it is urgent to meet up with key stakeholders to educate them to the project, raise their awareness and earn their approval to carry on with the security project. Such stakeholders include: The Site Director: he/she will provide visibility into business risks, production goals and related requirements (e.g. the necessity for reduced maintenance downtime to achieve production targets). The Safety/Quality/Environment Manager, who can indicate requirements for controlling and tracking physical accesses to the site, as well as interventions on IT and business systems. He/she may also provide insights into the applicable regulations. The Risk Manager. Allow him/her to take into account the cyber risks, especially safety risks, in addition to organizational risks. It is important to identify the applicable regulations, as they may require the implementation of specific security measures (e.g., NERC, NRC and FDA). Industrial floor staff: Maintenance Manager, Industrial IT Manager, MIS Manager, Supervisors, Automation Technicians, Operators, etc. They can help identify existing 1 Using the ISO standard for example 2 ANSSI, IAEA, NIST, FDA 16/24 CLUSIF 2014 Cybersecurity of industrial systems
17 security measures, as well as the safety processes already implemented. IV.2. Stage 2: Educate the management board on the issue of vulnerabilities and related industrial risks Support from top executives is required for the success of the project. The security of industrial environment requires supporting the transformation process through investments and resources. Such investments are made by each industrial site, and these sites must mediate between production goals, cost containment and investments in cyber security. Top executives must, therefore, support the project to make it successful. Several topics must be covered by the executives: 1. Identify all impacts: human, environmental, operational, financial, reputation and non-compliance with regulations 3. The different risk profiles must be identified in order to prioritize the action plan, especially for organizations that deal with multiple industrial lines of business. Risk Managers must be part of the project to incorporate IIS risks, and build up a consistent approach to risk management across their organization. 2. Provide examples of ICS vulnerabilities through audits and penetration testing. 3. Design an actions plan that includes Quick Wins to reduce quickly the risk exposure. Here are a few actions that may be part of this plan: Appoint a sponsor among top executives; Appoint a manager in charge of ICS security (CIISO), as well as correspondents on sites; Design a cyber security framework; Design a formal strategic document to manage risk and circulate it internally (blueprint, guidelines, umbrella policy, etc.). 3 Failure to comply with selected requirements may bring production to a halt, with an adverse impact on relationship with customers or on the corporate share price. Cyber security of industrial systems CLUSIF /24
18 IV.3. Stage 3: Design an industrial control system cybersecurity policy (I- ISSP) Besides educating top executives to the security issues, it is wise to design a specific security policy. To encourage its acceptance and implementation at the operational level 4, it is strongly recommended to involve operational staff dealing with IIS. The validation of the document by the appropriate operational staff is a good way to have local staff treats it as critical document. This stage covers three key areas: 1. The setting up of a workgroup that includes the key operations profiles (operations and maintenance manager, automation technicians, ICS architects, etc.), in order to: List the difficulties in implementation: operations that require controllers to reboot, regulatory requirements, costly upgrade of obsolete machines Identify security measures and emphasize Quick Wins 5. Such measures must prove effective so that they can be implemented. 2. Structure the output of the workgroup by adopting an approach based on the levels of risks, similarly to what is performed by the IEC, the IAEA 6 or the ANSSI 7 (France). Security measures will then be allocated, based on their robustness or intrinsic efficiency, to each level of cyber risk. The higher the level of risk, the tighter the security measures, and the most urgent it is to separate the target zones from the Internet and office networks, using multiple layers of physical and logical security barriers. 3. Design implementation guidelines for the I-ISSP. These guidelines (directive, guide) will introduce an implementation methodology. Here are some of the topics that can be dealt with: Split the ICS into relevant areas (or sub-systems) that host one or many autonomous business processes; Evaluate the level, or class, of cyber security for each of those areas; Implement security measure in line with the level of cyber security. Obviously, these measures should be consistent with the level of 4 Please refer to the final section of this document for the resources that help implement this approach. 5 These are measures with a low technical, human and financial impact, and that does not require the process to be stopped. 6 ; International Agency for Atomic Energy 7 Resources are stated at the end of this document. 18/24 CLUSIF 2014 Cybersecurity of industrial systems
19 maturity of the organization, and the amount of investment scheduled. An idealist outlook may have a negative impact on motivation, while a minimal vision may not cover all risks. IV.4. Stage 4: Implement the I-ISSP at the operational level Once the framework is defined and support received from top management, an implementation plan must be drafted, approved by decision makers, and translated into accurate and operational measures, in compliance with the following advices: o Define a time frame of 2 to 3 years max. o Define the investment budget required to implement this strategy. o Adopt a project-focused methodology. o Get approval from the highest decision-making level, to ensure support from all stakeholders. This stage includes three key actions: 1. Define the functional cyber security chain, and set up a governing committee for this project It is essential to identify all stakeholders, centrally and on each site, before the project kicks off. A central governance body can be set up to manage all stakeholders, coordinate actions, encourage the sharing of experiences, and identify practices and solutions that could be standardized across all sites. For the project to be legitimate at the local level, it is advised to appoint a local security officer chosen from among the operations team and not the IT team (e.g. an Industrial IT Manager.) 2. Implement «Quick Wins» at the site level, within a short timeframe: less than 6 months (e.g. review of open flows, guidelines for using a USB dongle and other such mobile drives, education regarding security practices, change management, etc.). 3. Start the project by prioritizing critical sites. Critical sites should be identified according to two criteria: the risk profile of each company s business and the analysis of various criteria: human, environmental, operational, financial, reputation and regulatory compliance. Cyber security of industrial systems CLUSIF /24
20 IV.5. Stage 5: Keep cyber risks under control To manage cyber risks, governance is required to ensure a level of security in line with the evolution of the malware landscape. The implementation should leverage international standards that promote continuous improvement and a PDCA model (Plan Do Check Act). When industrial sites are run independently (budget, resources, etc.), it is suggested that governance is managed at the local level and linked to the local management information system. This helps customize the security policy to the specifics of each site and encourages acceptance at the local level. The key governance processes to implement are the following: o Manage cyber risks and ensure continuous monitoring to define the fundamentals of IIS security against cyber attacks, and to support vulnerabilities and emerging threats. This monitoring can be centralized. o Train/educate all staff members to increase their awareness on cyber risks, and as to their responsibility when it comes to containing such risks. o Make security an integral part of new and ongoing projects, to identify business projects with features that may increase exposure to cyber risks: mobility, smart sensors, remote maintenance, etc. Projects that are the most prone to risks may be considered on top priority. o Manage security incidents to detect and analyze such incidents, and implement appropriate remediation. o Audit and internal control to ensure compliance of the ICS with the I- ISSP. o Implement and manage appropriate plans of action, in line with the audit findings, or to block new threats and vulnerabilities as identified. o Conduct regular management reviews to assess the situation, fine-tune the project, or give new orientation to improve the containment of cyber risks. 20/24 CLUSIF 2014 Cybersecurity of industrial systems
21 V. Appendix V.1. Reviewed reference documents Reference documents Publisher Publication Pages A Framework for Aviation Cyber security AIAA Computer Security at Nuclear Facilities IAEA La sécurité des SII - Méthode de classification et mesures principales et détaillées ANSSI Maîtriser la SSI pour les systèmes industriels ANSSI API 1164, Pipeline SCADA Security API Securing Control and Communications Systems in Transit Environments - Part II : Defining a Security Zone Architecture for Rail Transit and Protecting Critical Zones Securing Control and Communications Systems in Transit Environments - Part 1 : Elements, Organization and Risk Assessment / Management Informationstechnik in Prozessüberwachung und - steuerung Good Practice Guide "Process Control and SCADA security" Cyber Security Assessments of Industrial Control Systems - A Good Practice Guide Introduction to NISTIR 7628 Guidelines for Smart Grid Cyber Security 21 Steps to Improve Cyber Security of SCADA Networks Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies APTA APTA BSI CPNI CPNI CSWG DoE DoH Can we learn from SCADA security incidents ENISA Window of exposure... a real problem for SCADA systems? - Recommendations for Europe on SCADA patching ENSIA Appropriate security measures for Smart Grids ENISA Protecting industrial control systems - Recommendations for Europe and member states ENISA Cyber security of industrial systems CLUSIF /24
22 IEC Security for industrial Automation and Control Systems IEC Technical specifications Power system management and associated information exchange technique Data and communications security IEC : Standard for Functional Safety of Electrical/Electronic/Programmable Electronic Safety- Related Systems TR IEC Power system control and associated communications - Data and communication security IEC IEC IEC IEC ISO/IEC TR ISO/IEC Cyber Security Procurement Language for Control Systems INL Critical Infrastructure Protection Standards NERC Framework for Improving Critical Infrastructure Cybersecurity NIST Guide to Industrial Control Systems (ICS) Security NIST Regulatory Guide 5.71 Cyber security programs for nuclear facilities Protection of digital computer and communication systems and networks Cybersecurity Through Real-Time Distributed Control Systems (RTDCS) Methodology for Prioritizing Cyber-vulnerable Critical Infrastructure Equipment and Mitigation Strategies Control System Devices : Architectures and supply Channels Overview Security Framework for control System Data classification and Protection NRC NRC OAK Ridge / DoE Sandia Sandia Sandia Framework for SCADA Security Policy Sandia Guide to CIP Cyber Vulnerability Assessment Sandia SCADA and Process Control Survey SANS Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks Process Control Domain Security Requirements for vendors US CERT WIB /24 CLUSIF 2014 Cybersecurity of industrial systems
23
24 L E S P R I T D E L É C H A N G E CLUB DE LA SÉCURITÉ DE L'INFORMATION FRANÇAIS 11 rue de Mogador Paris France Download all publications of the CLUSIF from
Help for the Developers of Control System Cyber Security Standards
INL/CON-07-13483 PREPRINT Help for the Developers of Control System Cyber Security Standards 54 th International Instrumentation Symposium Robert P. Evans May 2008 This is a preprint of a paper intended
ISACA rudens konference
ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial
CSMS. Cyber Security Management System. Conformity Assessment Scheme
CSMS Cyber Security Management System Conformity Assessment Scheme for the CSMS Certification Criteria IEC 62443-2-1:2010 Cyber Security Management Syste 1 Purpose of the CSMS Conformity Assessment Scheme
Industrial Cyber Security 101. Mike Spear
Industrial Cyber Security 101 Mike Spear Introduction Mike Spear Duluth, GA USA Global Operations Manager, Industrial Cyber Security [email protected] Responsible for the Global Delivery of Honeywell
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
SCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE
ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE JANUARY 2015 U.S. DEPARTMENT OF ENERGY OFFICE OF ELECTRICITY DELIVERY AND ENERGY RELIABILITY Energy Sector Cybersecurity Framework Implementation
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
A Concise Model to Evaluate Security of SCADA Systems based on Security Standards
A Concise Model to Evaluate Security of SCADA Systems based on Security Standards Nasser Aghajanzadeh School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran Alireza Keshavarz-Haddad
Cyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC)
Cyber Security Design Methodology for Nuclear Power Control & Protection Systems By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC) 1. INTRODUCTION In today s world, cyber security is one
Cyber Security and Privacy - Program 183
Program Program Overview Cyber/physical security and data privacy have become critical priorities for electric utilities. The evolving electric sector is increasingly dependent on information technology
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
NIST Cybersecurity Initiatives. ARC World Industry Forum 2014
NIST Cybersecurity Initiatives Keith Stouffer and Vicky Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL National Institute of Standards and Technology (NIST) NIST s mission
Roadmaps to Securing Industrial Control Systems
Roadmaps to Securing Industrial Control Systems Insert Photo Here Mark Heard Eastman Chemical Company Rockwell Automation Process Solutions User Group (PSUG) November 14-15, 2011 Chicago, IL McCormick
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
TECHNICAL SPECIFICATION
TECHNICAL SPECIFICATION IEC/TS 62443-1-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 1-1: Terminology, concepts and models INTERNATIONAL ELECTROTECHNICAL
White Paper. 7 Steps to ICS and SCADA Security. Tofino Security exida Consulting LLC. Contents. Authors. Version 1.0 Published February 16, 2012
Tofino Security exida Consulting LLC White Paper Version 1.0 Published February 16, 2012 Contents Executive Summary... 1 Step 1 Assess Existing Systems... 1 Step 2 Document Policies & Procedures... 3 Step
Ernie Hayden CISSP CEH GICSP Executive Consultant www.securicon.com
Ernie Hayden CISSP CEH GICSP Executive Consultant www.securicon.com V1 10-7-14 This Presentation is Proprietary to Securicon, Inc. Any use of this document without express written approval from Securicon
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Feature. SCADA Cybersecurity Framework
Feature Samir Malaviya, CISA, CGEIT, CSSA, works with the Global Consulting Practice-GRC practice of Tata Consultancy Services and has more than 17 years of experience in telecommunications, IT, and operation
Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper
Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice
NERC Cyber Security Compliance Consulting Services HCL Governance, Risk & Compliance Practice Overview The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to
Industrial Control Systems Security Guide
Industrial Control Systems Security Guide Keith Stouffer, Engineering Lab National Institute of Standards and Technology NIST SP 800-82, Rev 2 and ICS Cybersecurity Testbed Keith Stouffer Project Leader,
IEEE-Northwest Energy Systems Symposium (NWESS)
IEEE-Northwest Energy Systems Symposium (NWESS) Paul Skare Energy & Environment Directorate Cybersecurity Program Manager Philip Craig Jr National Security Directorate Sr. Cyber Research Engineer The Pacific
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
GE Intelligent Platforms. Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems
GE Intelligent Platforms Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems Meeting NERC Change Control Requirements for HMI/SCADA and Control Systems Overview There is a lot of
GOOD PRACTICE GUIDE PROCESS CONTROL AND SCADA SECURITY
GOOD PRACTICE GUIDE PROCESS CONTROL AND SCADA SECURITY GUIDE 5. MANAGE THIRD PARTY RISK This guide is designed to impart good practice for securing industrial control systems such as: process control,
Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.
Executive Summary Statement of Nadya Bartol Vice President, Industry Affairs and Cybersecurity Strategist Utilities Telecom Council Before the Subcommittee on Oversight and Subcommittee on Energy Committee
Considerations for Hybrid Communications Network Technology for Pipeline Monitoring
Considerations for Hybrid Communications Network Technology for Pipeline Monitoring Craig Held White Paper April 2012 Abstract The concept of automation (and its corresponding technologies) is a primary
SCADA Systems. Make the most of your energy. March 2012 / White paper. by Schneider Electric Telemetry & Remote SCADA Solutions
SCADA Systems March 2012 / White paper by Schneider Electric Telemetry & Remote SCADA Solutions Make the most of your energy Summary Executive Summary... p 2 Introduction... p 3 Field Instrumentation...
An Introduction to SCADA-ICS System Security. Document Number IG-101 Document Issue 0.1 Issue date 03 February 2015
An Introduction to SCADA-ICS System Security Document Number IG-101 Document Issue 0.1 Issue date 03 February 2015 Overview Supervisory Control And Data Acquisition (SCADA) for Industrial Control Systems
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
The Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
Rethinking Cyber Security for Industrial Control Systems (ICS)
Rethinking Cyber Security for Industrial Control Systems (ICS) Bob Mick VP Emerging Technologies ARC Advisory Group [email protected] 1 Rethinking Cyber Security We Now Have Years of Experience - Security
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment By Jerome Farquharson, Critical Infrastructure and Compliance Practice Manager, and Alexandra Wiesehan, Cyber Security Analyst,
Ecom Infotech. Page 1 of 6
Ecom Infotech Page 1 of 6 Page 2 of 6 IBM Q Radar SIEM Intelligence 1. Security Intelligence and Compliance Analytics Organizations are exposed to a greater volume and variety of threats and compliance
Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities
Industrial Cyber Security Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities WE HEAR ABOUT CYBER INCIDENTS EVERY DAY IN THE NEWS, BUT JUST HOW RELEVANT ARE THESE
MEHARI 2010. Overview. April 2010. Methods working group. Please post your questions and comments on the forum: http://mehari.
MEHARI 2010 Overview April 2010 Methods working group Please post your questions and comments on the forum: http://mehari.info/ CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30 rue Pierre Sémard, 75009
ICS CYBER SECURITY RKNEAL, INC. Protecting Industrial Control Systems: An Integrated Approach. Critical Infrastructure Protection
Critical Infrastructure Protection Technical White Paper ICS CYBER SECURITY Protecting Industrial Control Systems: An Integrated Approach The purpose of this white paper is to present a novel cyber security
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Industrial Control System Cyber Situational Awareness. Robert M. Lee* June 10 th, 2015
Industrial Control System Cyber Situational Awareness Robert M. Lee* June 10 th, 2015 Executive Summary Cyber situational awareness is the concept of understanding and visualizing the networked environment
Designing Compliant and Sustainable Security Programs 1 Introduction
Designing Compliant and Sustainable Security Programs 1 Introduction The subject of this White Paper addresses several methods that have been successfully employed by DYONYX to efficiently design, and
Process Control System Cyber Security Standards an Overview
INL/CON-06-01317 PREPRINT Process Control System Cyber Security Standards an Overview 52nd International Instrumentation Symposium Robert P. Evans May 2006 This is a preprint of a paper intended for publication
Securing Industrial Control Systems Secure. Vigilant. Resilient. May 2015
Securing Industrial Control Systems Secure. Vigilant. Resilient. May 2015 Cyber Security Securing industrial control systems: Don t be a victim of cyber-attacks Cyber security Just as the workplace is
Using ISA/IEC 62443 Standards to Improve Control System Security
Tofino Security White Paper Version 1.2 Published May 2014 Using ISA/IEC 62443 Standards to Improve Control System Security Contents 1. Executive Summary... 1 2. What s New in this Version... 1 3. Why
Cyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants
Cyber Security Considerations in the Development of I&C Systems for Nuclear Power Plants Jung-Woon Lee, Cheol-Kwon Lee, Jae-Gu Song, and Dong-Young Lee I&C and HF Research Division, Korea Atomic Energy
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government
Which cybersecurity standard is most relevant for a water utility?
Which cybersecurity standard is most relevant for a water utility? Don Dickinson 1 * 1 Don Dickinson, Phoenix Contact USA, 586 Fulling Mill Road, Middletown, Pennsylvania, USA, 17057 (*correspondence:
Appropriate security measures for smart grids
1 Appropriate security measures for smart grids Guidelines to assess the sophistication of security measures implementation [2012-12-06] 1 Copyright TenneT Appropriate security measures for smart grids
How To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends
Frost & Sullivan s Aerospace, Defence & Security Practice Global Industrial Cyber Security Trends Presented by Philipp Reuter Director Frost & Sullivan, Turkey 1 Worth over $ 50 Billion globally in 2014
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
Building Insecurity Lisa Kaiser
Building Insecurity Lisa Kaiser Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) Insecurity How do I Specify it Buy it Test it Deploy it Regret it Apologize for it Specifying Insecurity
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
Effective Use of Assessments for Cyber Security Risk Mitigation
White Paper Effective Use of Assessments for Cyber Security Risk Mitigation Executive Summary Managing risk related to cyber security vulnerabilities is a requirement for today s modern systems that use
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity
October 10, 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 RE: Experience with the Framework for Improving Critical Infrastructure
Safe Network Integration
UNIDIRECTIONAL SECURITY GATEWAYS Safe Network Integration Stronger than Firewalls Shaul Pescovsky, Sales Director Waterfall Security Solutions [email protected] Proprietary Information -- Copyright
Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, 75009 PARIS
MEHARI 2007 Overview Methods Commission Mehari is a trademark registered by the Clusif CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS 30, rue Pierre Semard, 75009 PARIS Tél.: +33 153 25 08 80 - Fax: +33
Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION
Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION ALBERTO AL HERNANDEZ, ARMY RESERVE OFFICER, SOFTWARE ENGINEER PH.D. CANDIDATE, SYSTEMS ENGINEERING PRESENTATION
Cyber Security for SCADA/ICS Networks
Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And
CERIAS Tech Report 2012-15 Mapping Water Sector Cyber-Security Vulnerabilities by James H. Graham, Jeffrey L. Hieb and J. Chris Foreman Center for
CERIAS Tech Report 2012-15 Mapping Water Sector Cyber-Security Vulnerabilities by James H. Graham, Jeffrey L. Hieb and J. Chris Foreman Center for Education and Research Information Assurance and Security
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
What Risk Managers need to know about ICS Cyber Security
What Risk Managers need to know about ICS Cyber Security EIM Risk Managers Conference February 18, 2014 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 [email protected] ICSs What are they
Guideline on Vulnerability and Patch Management
CMSGu2014-03 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Vulnerability and Patch Management National Computer Board
Risk Management in Practice A Guide for the Electric Sector
Risk Management in Practice A Guide for the Electric Sector Annabelle Lee Senior Technical Executive ICCS European Engagement Summit April 28, 2015 Before we continue let s get over our fears and myths
BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT
BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT Exelon Corporation Cybersecurity Supply Chain Risk Management INTERVIEWS Spencer Wilcox Managing Security Strategist and Special Assistant to the Chief
Avoiding the Top 5 Vulnerability Management Mistakes
WHITE PAPER Avoiding the Top 5 Vulnerability Management Mistakes The New Rules of Vulnerability Management Table of Contents Introduction 3 We ve entered an unprecedented era 3 Mistake 1: Disjointed Vulnerability
SCADA. The Heart of an Energy Management System. Presented by: Doug Van Slyke SCADA Specialist
SCADA The Heart of an Energy Management System Presented by: Doug Van Slyke SCADA Specialist What is SCADA/EMS? SCADA: Supervisory Control and Data Acquisition Retrieves data and alarms from remote sites
SIMPLIFYING THE PATCH MANAGEMENT PROCESS
SIMPLIFYING THE PATCH MANAGEMENT PROCESS www.icsupdate.com Monta Elkins Security Architect FoxGuard Solutions [email protected] SIMPLIFYING THE PATCH MANAGEMENT PROCESS 2 SIMPLIFYING THE PATCH
GOOD PRACTICE GUIDE PROCESS CONTROL AND SCADA SECURITY
GOOD PRACTICE GUIDE PROCESS CONTROL AND SCADA SECURITY This guide is designed to impart good practice for securing industrial control systems such as: process control, industrial automation, distributed
Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012
Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012 ATC Nuclear ATC-N serves the commercial nuclear utilities in the US and many foreign
Classification of Data Center Operations Technology (OT) Management Tools
Classification of Data Center Operations Technology (OT) Management Tools White Paper 104 Revision 0 by Kevin Brown Dennis Bouley > Executive summary Data centers today lack a formal system for classifying
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
GOOD PRACTICE GUIDE PROCESS CONTROL AND SCADA SECURITY
GOOD PRACTICE GUIDE PROCESS CONTROL AND SCADA SECURITY GUIDE 2. IMPLEMENT SECURE ARCHITECTURE This guide is designed to impart good practice for securing industrial control systems such as: process control,
TRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering
William Hery ([email protected]) Research Professor, Computer Science and Engineering NYU-Poly
William Hery ([email protected]) Research Professor, Computer Science and Engineering NYU-Poly Ramesh Karri ([email protected]) Associate Professor, Electrical and Computer Engineering NYU-Poly Why is cyber
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
Announcement of a new IAEA Co-ordinated Research Programme (CRP)
Announcement of a new IAEA Co-ordinated Research Programme (CRP) 1. Title of Co-ordinated Research Programme Design and engineering aspects of the robustness of digital instrumentation and control (I&C)
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
The Emergence of Security Business Intelligence: Risk
The Emergence of Security Business Intelligence: Risk Management through Deep Analytics & Automation Mike Curtis Vice President of Technology Strategy December, 2011 Introduction As an industry we are
Classification of Data Center Infrastructure Management (DCIM) Tools
Classification of Infrastructure Management (DCIM) Tools White Paper 104 Revision 3 by Kevin Brown Dennis Bouley > Executive summary Data centers today lack a formal system for classifying infrastructure
Waterfall for NERC-CIP Compliance
Waterfall for NERC-CIP Compliance Using Waterfall s Unidirectional Security Solution to Achieve True Security & NERC-CIP Compliance Date: Jul. 2009 The material in this document is proprietary to Waterfall
