I N V E S T O R O P P O R T U N I T Y
NIST SP 800-82, ICS Security Auditing Framework
CyberDNA| Your Trusted
Partner in Security
NIST SP 800-82 Auditing Standard
• Planning/Policy/Procedures
• Administrative
• Configuration Management
• Audit & Accountability
• Development & Maintenance
• Physical & Environmental
• Access Control
• System & Information Integrity
• Network Architecture
• Communications
• Firewall
• Encryption
Planning/Policy/Procedures
• Corporate concern to ICS Cyber Security
• Management buy-in to security
• Corporate alignment to cover security
concern as one of the critical aspect
• Written procedure/policy within the
corporate to govern the security
compliance
• Business continuity implementation
• Secure interface and deployment of IT
into ICS
CyberDNA Pty Ltd
Administrative
• People awareness and knowledge
development
• Plan and preparedness for disaster &
emergency situation
• Third party security assurance:
• System, software/hardware, license,
people
• Security assessment and mitigation
controls
CyberDNA Pty Ltd
Configuration Management
• Management of Change process
• Inventory tools used for ICS inventory
management
• Access protection against ICS
configuration information and software
CyberDNA Pty Ltd
Audit and Accountability
• Periodic independent security audit for
compliance assessment
• Auditing and log management tools
• Network log
CyberDNA Pty Ltd
Development and Maintenance
• ICS maintenance program
• ICS testing facilities
• Secure software update and
implementation
• Services and ports review process
• Patch management
CyberDNA Pty Ltd
Physical and Environmental
• Single failure and redundancy
• Environmental control
• Electronic noise protection
• Power outage protection
• Cabling installation
CyberDNA Pty Ltd
Access Control
• Access management governance
Local and remote
Physical and logical
• Role-Based access control/least privilege
• Password management
Usage policy, strength, confidentiality
• Web server secure access (ICS access by
using web based platform services)
CyberDNA Pty Ltd
System and Information Integrity
• Data protection management on mobile
devices (laptop, PDA, USB, Hard disk,
DVD)
• DoS protection on ICS environment
• Antivirus and malware protection
• Data flow controls for system secure
segregation
• Ports and connection secure
management
• Real-time monitoring for network and
system problem
CyberDNA Pty Ltd
Network Architecture
• Security perimeter ICS vs Business
• Network security monitoring
• Protection from unauthorized
connection
• Secure ICS network design and
implementation
• Prohibition of using dual NICs
• DMZ/IDS management for each domain
• The use of IDS/IPS
• Patch update and anti virus security
server
CyberDNA Pty Ltd
*Photo from Nozomi Networks
Encryption
• Encryption being used
• Latency due to encryption
CyberDNA Pty Ltd

Nist 800 82 ICS Security Auditing Framework

  • 1.
    I N VE S T O R O P P O R T U N I T Y NIST SP 800-82, ICS Security Auditing Framework CyberDNA| Your Trusted Partner in Security
  • 3.
    NIST SP 800-82Auditing Standard • Planning/Policy/Procedures • Administrative • Configuration Management • Audit & Accountability • Development & Maintenance • Physical & Environmental • Access Control • System & Information Integrity • Network Architecture • Communications • Firewall • Encryption
  • 4.
    Planning/Policy/Procedures • Corporate concernto ICS Cyber Security • Management buy-in to security • Corporate alignment to cover security concern as one of the critical aspect • Written procedure/policy within the corporate to govern the security compliance • Business continuity implementation • Secure interface and deployment of IT into ICS CyberDNA Pty Ltd
  • 5.
    Administrative • People awarenessand knowledge development • Plan and preparedness for disaster & emergency situation • Third party security assurance: • System, software/hardware, license, people • Security assessment and mitigation controls CyberDNA Pty Ltd
  • 6.
    Configuration Management • Managementof Change process • Inventory tools used for ICS inventory management • Access protection against ICS configuration information and software CyberDNA Pty Ltd
  • 7.
    Audit and Accountability •Periodic independent security audit for compliance assessment • Auditing and log management tools • Network log CyberDNA Pty Ltd
  • 8.
    Development and Maintenance •ICS maintenance program • ICS testing facilities • Secure software update and implementation • Services and ports review process • Patch management CyberDNA Pty Ltd
  • 9.
    Physical and Environmental •Single failure and redundancy • Environmental control • Electronic noise protection • Power outage protection • Cabling installation CyberDNA Pty Ltd
  • 10.
    Access Control • Accessmanagement governance Local and remote Physical and logical • Role-Based access control/least privilege • Password management Usage policy, strength, confidentiality • Web server secure access (ICS access by using web based platform services) CyberDNA Pty Ltd
  • 11.
    System and InformationIntegrity • Data protection management on mobile devices (laptop, PDA, USB, Hard disk, DVD) • DoS protection on ICS environment • Antivirus and malware protection • Data flow controls for system secure segregation • Ports and connection secure management • Real-time monitoring for network and system problem CyberDNA Pty Ltd
  • 12.
    Network Architecture • Securityperimeter ICS vs Business • Network security monitoring • Protection from unauthorized connection • Secure ICS network design and implementation • Prohibition of using dual NICs • DMZ/IDS management for each domain • The use of IDS/IPS • Patch update and anti virus security server CyberDNA Pty Ltd *Photo from Nozomi Networks
  • 13.
    Encryption • Encryption beingused • Latency due to encryption CyberDNA Pty Ltd