IC37 IEC62443 Flashcards

1
Q

Scope

A

Determine the parameters of what is included in the assessment how it is performed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Scope include

A
  • IDENTIFY Requirement
  • Specify Devices
  • Select Collection Method
  • Document
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key Components of Scope

A
  • System Description
  • Asset Inventory
  • Criticality Assessment.
  • System Architecture Design.
  • Document Data flow
  • Network Diagram .
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cybersecurity Vulnerability Assessment

A

defines, identify, and classifies the security vulnerabilities in industrial control system and its related network infra

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cybersecurity Vulnerability Assessment is

A

-Critical step in evaluating cyber risk
- Evaluate the IACS design, implementation, configuration, operation and management.
- Determines the adequacy of security measures and identify security deficiencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Benefits of Cybersecurity risk assessment

A
  • determine what plants/processes need to address and what order.
  • Definition of threats, vulnerabilities, and consequences so they can be mitigated. - this is very time consuming.
  • Design and apply countermeasures to reduce risk.
  • Prioritize mitigation activities and resources.
  • Evaluate countermeasures of effectiveness versus cost and complexity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cyber Risk Assessment Process

A
  • Identify System under consideration.
  • Conduct high-level cyber risk assessment.
  • Partition the SUC into zones and conduits.
  • perform detailed cybersecurity risk assessment for each zone and conduit.
  • Document security requirement assumption and constrains.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

for each zone and conduit you will need to run

A

IEC 62443-3-3

Detailed risk assessment process, this is section 5 of the detailed risk assessment. just an FYI, this include:

  • Identify Threats
  • Identify Vulnerabilities
  • Determine consequences and Impact.
  • Determine Likelihood
  • Calculate unmitigated Cyber risk
  • Determine Security Level target.
  • Consider Existing Countermeasures.
  • Reevaluate likelihood and impact.
  • Calculate residual risk
  • All risk mitigated or below tolerable risk
  • Document the results.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You need Documentation to prove what you did `

A

Documents in general should be
- Revised
- Amended
- Reviewed,
- Approved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@22

A

Review for the Design Chapter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

remember the 4 T of Managing risk

A
  • Tolerate - risk organizations are willing to take.
  • Transfer - insurance.
  • Terminate - block the risk
  • Treat. - reduce the lielihood
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Five D’s of treating Risk.

A
  • Deter
  • Detect
  • Delay
  • Deny
  • Defeat.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Remember firewalls

A

block unauthorized access of firewall. Network and Host firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IDS are either

A

NIDS or HID -

  • pre-defined rules signatures
  • Anomaly - behavior
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Remote access

A

Huge Operational Benefits
High Risk.

with ease huge operation benefits and high risk….

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

Monitoring and Management

A

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

identify component of asset inventory
identify system harden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Asset Inventory

A

Maintain a list of database of all IACS and SCADA hardware - physical and virtual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Asset inventory done through

A
  • Documentation and site survey. this could take long time if the company is around for a long time.
  • tools also can be used.-
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

if you use automations tools ensure that

A
  • they don’t impact system availability or integrity
  • introduced security Vulnerability.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hardware include all

A

servers, computers, workstations, smart phones., PLC, DCS, VFD, RTU, etc, serial routable devices.

you will need to have record of
- Asset ID
Device Type
Function
Network interfaces.
Network Addresses
Manufacture
Model
Serial Number
Operation system and version
Firmware Version,
Physical location
Notes.
Device system name

VM all details needs to be documents - do not forget about this.

  • all software- application, databases, firmware, operation system, patch process.

anything with ethernet and serial communication. routable serial. modbus, serial, profibus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Asset inventory for Software is also important. this should include

A

operation systems.
applications.
database
firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Asset inventory tools are are either:

NETWORK MANAGEMNET TOOLS
SOFTWARE ASSET MANAGEMENT SAM TOOLS
CONFIGURATION MANAGEMENT TOOLS

A

Network Management tools.
- SolarWinds, OPenNMS, Siemens SNM, MOXa
software asset management SAM tools
- IT Asset tool, Microsoft system center.
Configuration Management Tools.
- Rockwell Asset center
PAS integrity
MDT autosave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

System Hardening

A

the process of security a system by reducing its attack surface. this include

  • Remove unnecessary software —
    -Remote user accounts. —
    -Enforce strong access control - multifactor authentication is important
  • Disable or remove services. this is important
    -Install security patches. patches are also important.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

which device can be hardened

A

any configurable device can be hardened. such as operation ystem, database, applications. managed switches, routers, firewalls, modems., PLCm IED, VFD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

operation system hardening - where to go? OS HARDEINING Very IMPORTANT

A
  • NIST SP 800-123
    Microsoft Security Guides
    CIS security Benchmarks.
    Disa STIGS,
    Automation suppliers

REMEMNER 800-123 IS OS HARDENING —

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Basic Step to secure operation system. OS

A
  • Patches and update the OS
  • Remove or disable services, application and network protocols.
    configure access controls.
    configure OS user authentication.
    install and configuration additional security control
    test the security of the OS, ‘

list of unnecessary softwares:
- Remove games.
- unused devicers.
- messaging services.
unused internet
software compliers
unused protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Device Hardening Guidance DEVICE HARDENING 800-82

A

NIST SP 800-82
Always look for vendors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

HARDENING DEVICES INCLUDE

A

PLCs
MOTOROS AND DRIVES
I?O
HMI
Sensors
IEDs
Flow Computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Hardening of devices are

A

-disable program changes.
-install vendor firmware update
-compare file hash
-shutdown unused network interface.
-default password
-enable logging
-disable unused protocols.
-restrict remote access.
- protectet with ICS
-disable services not used.
- restict remote access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Network Hardening NSA CISCO NIST
SANS
SECURITY CONFIGURATION CHECKLISTS

A

three functional planes of a network

  • Management - IOS - SSH SNMP
  • Control - EIGRP, BGP, OSPF
  • Data actual data/
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Network Hardening best practices

A

install firmware updates.
compare hash files
shutdown unused physical interfaces.
enable configuration access control
change and encrypt password
use snmp3
restict remote management
use secure protocols.
shutdown unused ervices.
enable logging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

ACCESS CONTROL

A

Policies, Procedures and technical controls that govern the use of system resources.

Access control ensure system only accessible to authorized users, programs, process and other systems.

ACCESS CONTROL ENFORCE the following:

separation of duties
least privilege
system notification.
previous login
concurrent session
session locking
unsuccessful login attempts
least privilege.
session termination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Access control involve

A

establishing.
activating
modifying
reviewing
disabling
removing accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Access control best practices

A
  • Develop access control policy to establish appropriate logical and physical rules
  • segregate data with high sensitivity.
    employ multiple authentication
  • make use of centralized identify
  • use organization units.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

use always multifactor authentications

A

something you know
something you have
something you are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

remote access

A

technology made it so easy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

VPN appliance is a network device enhanced with security features known as secure socket layer SSL.

A

A network using public telecommunication infrastructure such as internet and provide remote networks or computes with secure access to another network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

VPN security employs

A
  • IPSec Internet protocol security
    SSL\TLS transport layer security
    DTLS datagram transport layer
    MPPE microsoft point to point encyption
    SSTP secure socket tunneling protocol
    MPVPN
    SSH
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

firewall evelotion into all inclusive security products. NGFW-

A

firewall
VPN
content filtering
load balancing
vpn
antispam
data

40
Q

Type of VPNs

A

Site to site to vpn
VPN gateway.

41
Q

VPN best practise

A
  • require the use of corporate owned laptops
    -provide remote access users with secure bootable image
    -no vpn split should be allowed
    -change tcp port for something
    -monitor and log all remote access sessions.
  • encrypt all communications.
  • configure modems for maximum security
  • restirct remote connections to special machines.
42
Q

Secure Remote Access Examples

A

Read only access
One way Reporting
Limited data exchange
Employee and vendor remote maintenance and troubleshooting
Full remote operations.

43
Q

Antimalware Management

A

malware related incident are number one cause of cyber related production losses and upsets in process control systems.

Viruses can impact control systems. user mix deployment.

All major plc and DCS vendor support firewall.

44
Q

Always recommend using mix solutions

A

Antivirus scanning at the control system firewall
Automatic updating for non critical system or systems with approved update schemes.
Manual scheduled updates for more difficult system.

45
Q

Whitelisting

BENEFITS
Smaller and more efficient
Does not require sig-nature update
can ensure critical files and approved.
zero day protection.

ISSUES:
Agnostic to malware
can block software updates

A

Blacklisting

BENEFITS
Can define malicious software behavior

ISSUED:
Number of known bad signatures are large and growing.
Require frequent update.
False positive can block critical files.
no protection against zero day attack

46
Q

Whitelisting mean

A

Allow known Good

47
Q

blacklisting

A

blocking known bad

48
Q

Anti-Virus Management

A
49
Q

Application Control

A

Identify entitlement, privilege, or access based approval
Protect memory so application in memory cannot be changed.

50
Q

Change Control

A

Extend application control to include file integrity monitoring for non executable.

51
Q

ALWAYS KEEP Systems up to date because it is critical to protection

A
52
Q

Patching

A

patch should be analyized for each device.
Installed and verified on test system
backup should be done before patch is installed.
Document all changes.

53
Q

PATCH MANAGEMENT LIFECYCLE - it is continuous process

A
  • Information Gathering
  • Monitoring & Evaluation
  • Patch Testing
  • Patch Deployment
  • Verification and Reporting
54
Q

Patch Management Best Practice

A
  • Establish and Maintain inventory for all updatable electronic devices.
  • Determine regular schedule and what is available
  • Test deployment of patches in manner that reflect production environment
  • Schedule qualified patches for installation at next available opportunity
  • Update records at planned interval
  • periodically identify security vulnerabilities.
  • Implement paches or equivalent counter measures.
55
Q

PLC Backup and Configuration Management - (BACKUP AN Recovery)

A

Restoration Time - how much time required- is redundancy required.
Backup Interval - how often the backup should run
Backup Management - how many duplicates required in case of damage.
Media Storage - keep media and license keys in safe area,
Responsible party - what department is responsible
Review and Update plan - review and update BCP when system change.

56
Q

System backup best practices

A

check for redundancy real time? near realtrimen?
data center? hot warm, cold?
point- in time snapshot automated or manual?

maintain version control.
automate the backup
protect backups.

57
Q

System backup types?

A

Redundant systems.
= physical or virtual
= Pcs
= Hardware/software
= Network

Point in time snapshots.
= pc code, apps, image, partitions, files, and config.
= PLc code, apps, and config
= Data base
= network devices. config

58
Q

`Backup and Recovery best practices

A

Establish backup and restore policies.
Document procedures and ensure they are repeatable.
All devices with configuration should be backed up
Backup are performed automatiacally on staggered schedule
Onsite and offisite storage of backup
Periodic testing of backup
periodic trsting of restore.

59
Q

Change Management

A

the objective of change management is to minimalize RISK to safety and downtime by ensuring that request for change are
recorded,
evaluated,
autherized.
prioritized,
planned,,
tested,
implemented,
documented and
reviewed.
in controlled and consistent manner.

Remember that Vulnrability and Patch Management must also follow the same change management process.

ISA 62443-2-1 secrion 4.3 and 4.3.2

60
Q

Typial IACS changed that require management of change

A
  • Changes to equipment and system on ICS architecture diagram
    Change of IT equipment and other services.
    Any changes.
61
Q

Change requests conftain inforamtion required in assessing the goals and cot wnd risk associated with change

A

Descirption of the change
benefit of applying the change
cost and risk of not applying the change
cost associated with the change
risk assessment of the change
priority of the change.

62
Q

change in industrial facilities and processes is

A

Critical to safety.

Remember that change has to be done by MULTI-DISCIPLIONARY TEAM….

63
Q

Change Management priority examples

A
  • IMMEDIATE - Life is at risk, significant los of revenue - Imediate action is required.
  • HIGH - Severely affecting safety systems or impacting the ability of production.
  • MEDIUM - no server impact but things will need to be fixed prior the next schedule.
  • LOW Changes can be taken care of in the next schedule.
64
Q

Information and Document Management Best Practices

A
  • Lifecycle document management process should be eveloped.
    information classification is required.
    Control system information such as design information
65
Q

physical security

A

protection of personnel, hardware, program, networks and data from physical circumstances and events.

66
Q

Asset inventory tools are

A

Network Management Tools
Management Tools known as SAM
Configuration Management tools

67
Q

Three function planes of data are

A

Management,
Control
Data

68
Q

System Hardening

A

System hardening is the process of securing a system by reducing its attack serfuce.

69
Q

Access Control

A

is the policies, procedures, technical controls that govern the use of system resources to ensure the system can be accessed by authorized user, program and othe sysyems.

70
Q

Detection tools @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

A

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

71
Q

What does security monitoring and detection entail???

A

detecting abnormal activity.
Network inrusion detection
Host intrusion detection
Monitoring logs
Periodic testing and auditing.

72
Q

Detection techniques??

A

Signature against black list
Behavior against beh avior
Anomaly again knowing good. white list

73
Q

diffferences

A

best solution for zero day exploit is BEHAVIOR
Best solution for known exploit is Signature
Best solution for insider threat? Anomaly.

74
Q

Anomaly detection include

A
  • DATA HOARDING
  • GEO Graphic location
  • time versus data
    -service traffic.
  • host data loss
75
Q

User Observation for Abnormal System Behavior

A

anything that can trigger changes such as?

CPU usage
protocol blocked
patch changes
system shutdown
lockedout account
logs and clear logs.

76
Q

Cababilities of host inrusion systems are ?

A

Log analysis
policy enforcment
event colleration
Alerting
rootkit detection
integrity checking

77
Q

LIDS are

A

log based Intrusion detection system
LIDS

LIDS is normally part of the SIEM

78
Q

All intrusion detection system needs the following

A

Testing / Auditing / Adjustment as part of CSMS

testing should be established by policy
audit by third party tester
adjust based on new threats.

IMPORTANT————-

79
Q

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@2

A

this chapter will be talking about
- incident response lifecycle.
- aspect of incident response planning
- incident management.
incident prevention
- four phases of forensic
three C of incident Analysis.

80
Q

Incident response lifecycle include?

A

1- PLANNING
2- INCIDENT PREVENTION
3- DETECTION
4- CONTAINMENT
5- REMEDIATION
6- RECOVERY and RESTORATION
7- POST INCIDENT Analysis and forensic.

81
Q

1 - PHASE ONE IS PLANNING

A

in this phase we assemble CYBER SECURITY INSIDENT RESPONSE TEAM CSIRT the team consist of engineers. managers.

in this phase we need to have clear written operation procedure. and response checklist.

82
Q

2- INCIDENT PREVNTION techniques….

A

IACS asset management
system hardening
access control
remote access
malware prevention
system backups
change management
information & documentation
physical security

and you will need vendor interaction.

83
Q

Incident Analysis 3C’s

A

Calm - dont panic
Cool intense discussion
Collected. list and think critcally.

84
Q

INCIDENT MANAGEMENT include

A

Detection
Response tools
Categorization
Containment
Remediation
Recovery and restoration.

important

85
Q

3- INCIDENET DETECTION

A

how to detect the incident
Automated detection tools
Reporting
Detection by observing traffic, CPU, USAGE

86
Q

4- INCIDENT CONTAINMENET

A

How to contain an incident.

isolate the system?
remove the effected device
remove?
protect?

this should be documented.

87
Q

5- REMEDIATION

A

fix the source of the problem
close unauthorized path
remove malware.

etc.

in this phase you may want to work with the asset owner and data owner.

88
Q

6- Recovery and Restoration

A

Establish contingency plans
patch and maintain all bakcup systems.
verify failover systems.
establish plan to run segmenet in isolation.
test backups.
establish and run acceptance test.

this also include defining procedure to provide for the tests and declare the IACS fully operational.

89
Q

7- Once you are done there is another phase called…. POST INCICENT ANALYSIS and FORENSIC

A

the idea of this phase is to gain understanding of how it happen and how why.

90
Q

forensic process is as follow: CEAR

A

Collection
Examination
Analysis
Reporting

91
Q

1 - Collection phase

A

time is important
secure senstive date
preserver the scene
protect the evidence

92
Q

2- Examination

A

Establish check list
identify the key people and personeen.
identify normal and abnormal operating.
identify requirement
identify remote access.
identify any protections.
conduct interview
operation personnel can give you alot of insight.

93
Q

3- Analysis.

A

conduct packet analyzer, network analyzer, and packet sniffer.

check cabling and wiring as well!

know how identify any alarms. HMI alarm view alarms.

windows event logs can also be configured.

94
Q
  • Reporting
A

preserve forensic data

keep detailed notes and report and dont rely on memory
detected computers.

95
Q

INCIDENT REPONSE PLANNING INCLUDES::::

A

overview goals and objective.
incident description
incident detection.
incident notification
incident analysis
response action.
communication
forensics.

96
Q

Incident response plan include

A

incident analysis
incident descirption
fornsic.

97
Q

Network Hardening best practices

A

install firmware updates.
compare hash files
shutdown unused physical interfaces.
enable configuration access control
change and encrypt password
use snmp3
restict remote management
use secure protocols.
shutdown unused ervices.
enable logging.