IC37 IEC62443 Flashcards
(97 cards)
Scope
Determine the parameters of what is included in the assessment how it is performed.
Scope include
- IDENTIFY Requirement
- Specify Devices
- Select Collection Method
- Document
Key Components of Scope
- System Description
- Asset Inventory
- Criticality Assessment.
- System Architecture Design.
- Document Data flow
- Network Diagram .
Cybersecurity Vulnerability Assessment
defines, identify, and classifies the security vulnerabilities in industrial control system and its related network infra
Cybersecurity Vulnerability Assessment is
-Critical step in evaluating cyber risk
- Evaluate the IACS design, implementation, configuration, operation and management.
- Determines the adequacy of security measures and identify security deficiencies
Benefits of Cybersecurity risk assessment
- determine what plants/processes need to address and what order.
- Definition of threats, vulnerabilities, and consequences so they can be mitigated. - this is very time consuming.
- Design and apply countermeasures to reduce risk.
- Prioritize mitigation activities and resources.
- Evaluate countermeasures of effectiveness versus cost and complexity.
Cyber Risk Assessment Process
- Identify System under consideration.
- Conduct high-level cyber risk assessment.
- Partition the SUC into zones and conduits.
- perform detailed cybersecurity risk assessment for each zone and conduit.
- Document security requirement assumption and constrains.
for each zone and conduit you will need to run
IEC 62443-3-3
Detailed risk assessment process, this is section 5 of the detailed risk assessment. just an FYI, this include:
- Identify Threats
- Identify Vulnerabilities
- Determine consequences and Impact.
- Determine Likelihood
- Calculate unmitigated Cyber risk
- Determine Security Level target.
- Consider Existing Countermeasures.
- Reevaluate likelihood and impact.
- Calculate residual risk
- All risk mitigated or below tolerable risk
- Document the results.
You need Documentation to prove what you did `
Documents in general should be
- Revised
- Amended
- Reviewed,
- Approved.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@22
Review for the Design Chapter
remember the 4 T of Managing risk
- Tolerate - risk organizations are willing to take.
- Transfer - insurance.
- Terminate - block the risk
- Treat. - reduce the lielihood
Five D’s of treating Risk.
- Deter
- Detect
- Delay
- Deny
- Defeat.
Remember firewalls
block unauthorized access of firewall. Network and Host firewalls.
IDS are either
NIDS or HID -
- pre-defined rules signatures
- Anomaly - behavior
Remote access
Huge Operational Benefits
High Risk.
with ease huge operation benefits and high risk….
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Monitoring and Management
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
identify component of asset inventory
identify system harden
Asset Inventory
Maintain a list of database of all IACS and SCADA hardware - physical and virtual.
Asset inventory done through
- Documentation and site survey. this could take long time if the company is around for a long time.
- tools also can be used.-
if you use automations tools ensure that
- they don’t impact system availability or integrity
- introduced security Vulnerability.
Hardware include all
servers, computers, workstations, smart phones., PLC, DCS, VFD, RTU, etc, serial routable devices.
you will need to have record of
- Asset ID
Device Type
Function
Network interfaces.
Network Addresses
Manufacture
Model
Serial Number
Operation system and version
Firmware Version,
Physical location
Notes.
Device system name
VM all details needs to be documents - do not forget about this.
- all software- application, databases, firmware, operation system, patch process.
anything with ethernet and serial communication. routable serial. modbus, serial, profibus
Asset inventory for Software is also important. this should include
operation systems.
applications.
database
firmware.
Asset inventory tools are are either:
NETWORK MANAGEMNET TOOLS
SOFTWARE ASSET MANAGEMENT SAM TOOLS
CONFIGURATION MANAGEMENT TOOLS
Network Management tools.
- SolarWinds, OPenNMS, Siemens SNM, MOXa
software asset management SAM tools
- IT Asset tool, Microsoft system center.
Configuration Management Tools.
- Rockwell Asset center
PAS integrity
MDT autosave
System Hardening
the process of security a system by reducing its attack surface. this include
- Remove unnecessary software —
-Remote user accounts. —
-Enforce strong access control - multifactor authentication is important - Disable or remove services. this is important
-Install security patches. patches are also important.
which device can be hardened
any configurable device can be hardened. such as operation ystem, database, applications. managed switches, routers, firewalls, modems., PLCm IED, VFD.