BSD City, ID
+ (62) 889 1 366 366
fedco@fedco.co.id

ICS Cyber Security Assurance

Why ICS Cyber Security Assurance is URGENT and IMPORTANT?

Industrial Control System Cyber Security concerns have been increased on this decade due to the increase of cyber risks and attacks that have been targeted to ICS environment. The risk of cyber attack source can be from internal and/or external. The external source of attack now becoming higher and higher and it brings the new situation on how to defend the ICS environment.

The Reasons Why

  • The computerized Industrial Control System environment with open protocol and open platform
  • The integration between Industrial Control System and Corporate Network
  • Heritage risk from the common IT infrastructure that being adopted in Industrial Control System
  • Lack of awareness of ICS Cyber Security if compared to IT security environment
  • Threat and vulnerability vs. Risk -> Safety, business and environment consequences

Industrial Control System Cyber Security Concern

The cyber security concerns in Industrial Control System is not covering about the virus and malware but it is beyond that level. The concept of ICS Cyber Security should be seen as the integrated aspects that consist of management systems that are related to it, they are Access Management, Asset Management, Data Management, Emergency Response Management, Network Management, and Risk Management.

It is a complex concern that requires all of the related entities within the organization to take part, from management to the technician, since the ICS Cyber Security is not just a one-man show activities but it is teamwork and work as a team approach.

Alt Text

Industrial Control System Security Challenges

Lack of awareness of the cyber security criticality in ICS environment

People thinking of ICS has no relation with IT stuff, no need to deploy cyber security in ICS environment

Lack of capable professionals that has the ability to cover Industrial Control engineering and Information Technology disciplines to deal with the Cyber Security Management and Compliance in ICS

Business-driven is not seeing the critical requirement of having cyber security assurance for their ICS environment

Standards/policy/procedures/manuals not in place or inadequate

The organizational culture that still lacks cyber security compliance, the security culture should be developed from the security practice and behavior at the personal level. It also requires governance from the systemic framework

The Core Activities of ICS Security Assurance

Phase I

The core activities of ICS Cyber Security Assurance Project is covering three main segments that integrated each other. The first step is called “Asset Management”. This stage is dealing with Asset Inventory Management including Asset Verification & Validation, gap finding, and final documentation of Asset Management Documentation as the reference for the next stage.

Phase II

The next stage is Risk Management, with the core activity on this stage is called Risk Assessment Workshop. The RA workshop is required to map the risk profile of the current ICS environment into the risk matrix, assess the existing risk, strategize the prevention and mitigation, introduce the controls action, and come up with risk level (with the optimum effort to put the risk into the ALARP condition). The Controls Catalog documentation is the final report on this stage that will be used as the reference for the next stage.

Phase III

The last stage is called the ICS Security Assessment. This assessment can use the NIST SP 800-82 as the main standard with the additional standard such as ISA 99, IEC 62443, API STD 1164, ISO 27001, and some other standards or company standards if available. The final result from this stage is the Security Profile and detailed compliance against the audited object compare to the standard. The report will cover the overall compliance status, the most critical segments to be taken action, the dashboard for stewardship and executive summary review, and the detailed result covering the gap details and the reason (including the strategic action items as per integrated with the Controls Catalog).

ICS Security Assurance Lifecycle

Alt Text

The Core Activities

Alt Text

ICS Security Assurance Milestone Video

Let's Us Do The Hardest Part

We provide an Integrated ICS Cyber Security solution that covers the Core Activities of the ICS Cyber Security Assurance milestone. We also provide full ICS Cyber Security Audit and Assessment (by using either Maturity Assessment or Non-Intrusive Testing or Vulnerability and Penetration Testing or combination approach).

Engage Now and Secure Your ICS Environment

Please contact us for any further inquiry regarding the ICS Cyber Security Assurance services