




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
UnlockingCyberResilienceinIndustrialEnvironments:FivePrinciples
WHITEPAPER
NOVEMBER2023
Images:Midjourney,GettyImages
Contents
Executivesummary
3
Introduction
4
1GuidingprinciplesforcyberresilientOTenvironments
7
2ActionableapproachestoimplementingOTcybersecurity
8
principles
3MonitoringtheimplementationofOTcybersecurityprinciples11
4EnablinginnovationinOT
12
Conclusion
14
Contributors
15
Endnotes
17
Disclaimer
Thisdocumentispublishedbythe
WorldEconomicForumasacontribution
toaproject,insightareaorinteraction.
Thefindings,interpretationsand
conclusionsexpressedhereinarearesult
ofacollaborativeprocessfacilitatedand
endorsedbytheWorldEconomicForum
butwhoseresultsdonotnecessarily
representtheviewsoftheWorldEconomic
Forum,northeentiretyofitsMembers,
Partnersorotherstakeholders.
?2023WorldEconomicForum.Allrights
reserved.Nopartofthispublicationmay
bereproducedortransmittedinanyform
orbyanymeans,includingphotocopying
andrecording,orbyanyinformation
storageandretrievalsystem.
UnlockingCyberResilienceinIndustrialEnvironments:FivePrinciples2
November2023
UnlockingCyberResilience
inIndustrialEnvironments:
FivePrinciples
Executivesummary
Thedigitalizationandconnectednessofindustrialenvironmentsisopeningupbusinessopportunitiesandenhancingoperationalefficiency.Atthesametime,itexposesorganizationstocyberattacksthatcanoffsetthesegains.
Today’sindustrialenvironmentconsistsof
operationaltechnologies(OT)which,accordingtosomesources,arelargelyoutdated.1Theyhaveinteroperabilityandconnectivitylimitations,and
weakornosecuritymanagementcapabilitiesandprocedures.2
TheincreasedconvergenceofOTwiththetraditionalITenvironmentisleadingtoanincreaseininherentvulnerabilities,whicharedoublingeveryyear.3
TheOTenvironmentisfundamentalforensuringthecontinuationofindustrialoperationsthatkeepglobaleconomiesandinfrastructuresrunning.ToimproveOTenvironmentsecurity,theWorldEconomic
Forumincollaborationwithpartnersfromthe
electricity,manufacturing,andoilandgasindustries,hasdevelopedalistofguidingprinciples.Combinedwithasetofbestpractices,theseaimtohelpcyberleadersensureacyberresilientOTenvironmentforuninterruptedandefficientbusinessoperations.
Principle1:Performcomprehensiverisk
managementoftheOTenvironment.
Principle2:EnsureOTengineersandoperatorsofinstallationshaveresponsibilityforOTcybersecurity.
Principle3:Alignwithtoporganizational
leadership,strategicplanningteamsandthirdpartiestomakesecurity-by-designareality.
Principle4:MakecybersecuritystandardsandbestpracticescontractuallyenforceableonpartnersandvendorstobuildacybersecureOTenvironment.
Principle5:Runjointtabletopexercisestoensurepreparednessincaseofanactualincident.
Theseprinciplesandbestpracticescanhelp
organizationssafeguard,maintainandmonitor
theirindustrialOTenvironmentaswellasensure
businesscontinuity.WhilemanyorganizationsmayalreadyhavesomemeasuresinplacetoensureacyberresilientOTenvironment,sharedguidance
canhelpmanagecyberrisksattheecosystemleveltoincreasesystemicresilience.
UnlockingCyberResilienceinIndustrialEnvironments:FivePrinciples3
Since2021,themanufacturing
sectorhasbeen
themosttargeted,experiencing61%ofcyberattacks.Theoiland
gas(11%),
transportation
(10%)andutilities(10%)sectorshavebeennext.
Introduction
WhydoesOTcybersecurity
matter?
Theindustrialinfrastructureandoperations
landscapesareundergoingaprofound
transformationduetotechnologicalinnovation.Agrowingconvergenceofinformationtechnology(IT)andoperationaltechnology(OT)isdrivenbythe
rapidadoptionofcutting-edgetechnologieslike
bigdata,digitaltwinsandtheindustrialinternetofthings(IIoT).Thesetwodomainsareexpectedtobecomeincreasinglyintricateandinterconnectedovertime.Thisinexorableshiftisexemplified,in
part,bytheprojectedIIoTmarketgrowth,4whichisexpectedtosurgefromapproximately$85.5billionin2023tonearly$169.6billionby2028.
WhatisthedifferencebetweenITandOT?
Informationtechnologyreferstotechnologies
includingcomputersandnetworksthatstore,
processandtransmitinformation,whileoperationaltechnologyencompassesindustrialcontrolsystems(ICS)thatoperate,controlandmonitorindustrial
equipmentandprocesses.
ThegrowingsynergybetweenITandOT,commonly
referredtoasIT/OTconvergence,presents
numerousopportunitiesforindustrialorganizations.Theseincluderemotecontrol;real-timemonitoring;enhancedvisibilityofmachinery,plantsandassets;simplificationofanomalydetection;improved
operationalefficiencyandproductivity;andfasterdecision-makingprocesses.
However,thisnewfoundconnectivitybetweenOTdevicesandITnetworksalsoexpandsthecyber
risklandscape,introducingbothintentionaland
unintentionalcybersecuritythreats.Traditionally,theOTenvironmentremained“air-gapped,”meaningitwasnotconnectedtotheinternet,andexternalhardwareandremovablemedia(e.g.USBdrives)weretheprimarycybersecurityconcerns.Asthesetwoenvironmentsmerge,cybersecuritybreachescaninfiltratefromITtoOTthroughmeanssuchasinternetmalwareinfectionandunauthorizedaccessviamobiledevices.
Today,OTenvironments,inlargepart,relyonlegacytechnologiesbuilttoperformspecifictasksand
operatingonspecializedsoftwareandproprietary
protocols.Oftendesignedwithoutcybersecurity
inmind,manyoftheselegacysystemshavebeenproducedbynow-defunctmanufacturerswhose
softwareupdatesareinfrequentanddifficultto
implement,ultimatelyleavingthemexposedto
securitythreats.Infact,arecentstudybyMicrosoftfoundthat75%ofindustrialcontroldevicesare
unpatchedandfeaturehigh-severityvulnerabilities.5Otherthreatfactorsincludeimpropernetwork
segmentation–which,accordingtoDragos,
happenstobethecasefor50%oforganizations6–orpoorremote-accesspractices.
Maliciousactorsdonotshyawayfromexploiting
suchvulnerabilities.AreportbyMcKinseyshows
thatOTcybereventshaveincreasedby140%from2020to2021.7Ofthoseevents,35%sustained
physicaldamagewithanestimatedimpactof$140millionperincident.8Thatsaid,itisimportantto
notethatnotallindustriesareequallyimpacted
byOTattacks.Forinstance,since
2021
,9the
manufacturingsectorhasbeenthemosttargeted,experiencing61%ofcyberattacks.Theoiland
gas(11%),transportation(10%)andutilities(10%)sectorshavebeennext.
Organizationsinthemanufacturing,oiland
gas,andelectricityindustriesboredamages
amountingto$2.8milliononaveragein2021.10Inadditiontofinanciallosses(directlyfromthe
damageandfromrelateddowntime),dataand
intellectualpropertytheft,andreputationdamage,cybersecuritybreachesinOTenvironmentscanhaveconsequencessuchas:
–Damagetotheenvironment.
–Exposureofpeopleandpersonneltodangerousconditions.Gartnerpredictsthatby2025,
maliciousactorswillbeabletoweaponizetheOTenvironmenttocauseharmorlossoflife.11
–Reducedavailabilityandqualityofessential
goodsandservicesincludingenergy,healthcareandtransportation;thiscantriggerbehaviourssuchaspanic-buyingandstockpilingby
consumers.
–Legalandregulatoryviolationsresultinginfines,lawsuitsandregulatoryscrutiny.
–Implicationsfornationalsecurityandpublic
safety,giventhatOTisasignificantcomponentofcriticalinfrastructure,andanylevelof
cybersecurityriskcanbeconsideredcritical.
UnlockingCyberResilienceinIndustrialEnvironments:FivePrinciples4
FIGURE1Cyberincidentsintheoilandgasindustry
Stuxnet
Iran,2010
Firstdocumentedtargeted
cyberattackonindustrial
controlsystems(ICSs)to
exhibitphysicalconsequences
BlackEnergy
Ukraine,2015
Remoteintrusionsatthree
regionalelectricitydistributioncompaniescausedpower
outagesforapproximately225,000people
Industroyer2
Ukraine,2022
Version2ofthe2016
malwarecausedmultipledisruptionsofenergy
distributionand
transmissionoperations
Triton
SaudiArabia,2017
Deploymentofmaliciouscode
disabledsafetysystemsdesignedtopreventcatastrophicindustrialandphysicalaccidentsandcost$1trillion
SuncorEnergyCanada,2023
InJune2023,SuncorEnergy
sufferedacyberattack
impactingpaymentoperationsatPetro-CanadagasstationsacrossCanada.Customers
wereunabletousecreditcardrewardspointstocomplete
theirpurchases
2012
2016
2021
Today
2015
2017
2022
2023
2010
Shamoon
SaudiArabia,2012
WipermalwareaffectedseveralITmachinesthatdisruptedtheindustrialoilandgasoperations,withrecoverytakingmorethantwoweeks
Industroyer
Ukraine,2016
Malwarecreatedlargedisruptionsandpoweroutagesto20%ofKyivpopulation
Colonialpipeline
USA,2021
Ransomwarecrippledfuel
suppliesto50millionAmericansfor11days,costing$4.4millionandbranddamage
Europeanoilhubs
Europe,2022
CyberattackontheAmsterdam-Rotterdam-Antwerp(ARA)oil
hubsconsiderablydisruptedtheloadingandunloadingofre?nedproductcargoesacrossseveralEUcountries
FloridaWaterFacility
USA,2021
Malicioususeruppedthe
levelsofsodiumhydroxide
from100partspermillion
to11,100partspermillion,
impactingsafetyand
humanlives
.
–forinstance,whetherthesedevicesareobsoleteorsupported,theirvulnerabilitiesandwhattheyareconnectingto–bothintheITandOTenvironments.Organizationsshouldbeabletoinvestigatethe
systemsandprocessesineachzoneandproviderecommendedsecuritycontrols.
Supplychainandthird-partyrisk.
Astudyfoundthat40%ofOTcybersecurity
practitionersconsidersupplychain/thirdparty
accesstotheOTenvironmenttobeoneofthetopthreecybersecurityrisks.14Whereassuchconcernsmaybemotivatedbytheweakercybersecurity
practicesofthirdparties,OTcybersecuritycan
alsobecompromisedbydeliberatetamperingof
third-partyhardware,softwareorfirmware.Thiscanhappenduringthemanufacturing,distributionor
maintenanceprocesses.
Toensureastrongcybersecuritypostureacrossorganizationsandindustries,robustcybersecuritymeasuresmustbedevelopedandimplementedtoprotectbothITandOTenvironments.
Whataretheexisting
cybersecurityframeworksfortheOTenvironment?
OrganizationsarenotstartingfromscratchwhenitcomestoOTcybersecurity.Infact,anumberofcybersecurityframeworkshavealreadybeendevelopedfortheOTenvironment.
TheInternationalElectrotechnicalCommission(IEC)6244315isaninternationalseriesofstandardsthattacklecybersecurityforindustrialautomationand
controlsystems.TheNationalInstituteofStandards
Whatarethesourcesofrisks?
CybersecurityrisksintheOTenvironmentare
amplifiedbyseveraloverarchingissuesthatarenot
alwaystechnicalinnaturebutdependonfactors
suchascorporatecultureandgovernance.These
include:
Lackofemphasisoncyberissuesinoperations
andshortageofpersonnelforOTcybersecurity.
Humanerror–researchshowsthat79%ofOT
expertsconsiderhumanerrortobethegreatestrisk
forOTsystems.12Moreover,thecurrentonboarding
andtrainingofOTpersonneldonotsufficiently
ensurethattheyadoptappropriatepoliciesand
measuresforOTcybersecurity.
Uncleardelineationofprocessownershipand
prioritizationofrisks.
TheIT/OTconvergencehasblurredprocess
ownership,allowingfornocleardelineationof
responsibilitiesandobligationsbetweentheITand
OTteams.Inaddition,thetwoviewtheirpriorities
differently.FromtheITperspective,procedures
fordatasecurityandprivacyarecrucial,whereas
theOTteamplacesprimaryfocusonphysical
performanceandsafetyoffacilitiesandequipment.
Poordevice/assetvisibilityandrapid
introductionofnewassets.
Whilethecreationandmaintenanceofanasset
inventoryintheOTenvironmentisregardedasone
ofthetopsecuritycontrols,accordingtoDragos,13
asmanyas80%oforganizationslackedvisibilityof
theOTenvironmentin2022.Organizationsneedto
haveanoverviewofthedevicesintheirnetworks
UnlockingCyberResilienceinIndustrialEnvironments:FivePrinciples5
andTechnology(NIST)hasreleasedSP800-8216
–aguideonhowtoimprovethesecurityofOT
systems;whiletheEuropeanJointResearchCentrehasproposedaframeworkonIndustrialAutomationandControlsSystems(IACS)tosharepracticesonIACSproducts’cybersecuritycertifications.17
Otherexamplesofcybersecurityframeworks
applicabletotheOTenvironmentandbeyond
includetheNISTCybersecurityFramework18
aswellastheCybersecurityCapabilityMaturity
Model(C2M2).19Effortshavealsobeenmade
atthelocalleveltoenhanceOTcybersecurity.
Forinstance,SaudiArabiahasdevelopedthe
OperationalTechnologyCybersecurityControls.
Similarly,oilandgascompaniesontheNorwegiancontinentalshelffollowguidelinessuchasNOG
104,NOG110andNOG123,whileintheUS,theNorthAmericanElectricReliabilityCorporation’s
CriticalInfrastructureProtection(NERCCIP)andtheAmericanPetroleumIndustryPipelineSecuritystandardsareofrelevance.
WhilenumerousOTcybersecurityframeworks
areavailable,manyofthosereferencedhereare
extremelycomplicatedandrequirealotofeffort
toensureeffectiveimplementation,particularlyfor
third-partysuppliersandvendorsthatmaystruggletocomplyduetoresourcelimitations–humanor
financial.Thisobligatesindustrialorganizationsto
ensurethatthirdpartiesarecapableofapplyingandadheringtotheseframeworksandstandards.
NosilverbulletexistsforsuccessfulimplementationofOTcybersecurityframeworksandstandards.
Mostofthetime,industryplayersmustapplya
widerangeofframeworksandstandardstocoverdistinctpartsoftheirinfrastructure,suchaswaterpumpsandutilities.
Alotoftheabove-mentionedframeworksareveryfocusedontechnicalcontrols.Yet,OTgovernance,i.e.whoisresponsibleforcybersecurityinOTandhowitinterlockswithIT,remainsachallengefor
manyorganizations.
UnlockingCyberResilienceinIndustrialEnvironments:FivePrinciples6
1
GuidingprinciplesforcyberresilientOTenvironments
Theactiongroup“SecuringtheOTenvironment”conveningcyberleadersfromtheelectricity,
manufacturingandoilandgasindustriesaroundthetopicofOTcybersecurity,hasdeveloped
asetoffiveguidingprinciplestohelpindustrialorganizationsaddresscyberrisksandbuild
resilienceastheIT/OTconvergencecontinues.
Principle1
Principle2
Principle3
Principle4
Principle5
Perform
EnsureOTengineers
Alignwithtop
Makecybersecurity
Runjointtabletop
comprehensiverisk
andoperatorsof
organizational
standardsand
exercisestoensure
managementofthe
installationshave
leadership,strategic
bestpractices
preparednessincase
OTenvironment
responsibilityforOTcybersecurity
planningteamsand
thirdpartiestomake
security-by-designa
reality
contractually
enforceableon
partnersandvendors
tobuildacybersecure
OTenvironment
ofanactualincident
UnlockingCyberResilienceinIndustrialEnvironments:FivePrinciples7
2
Principle1
Principle2
ActionableapproachestoimplementingOT
cybersecurityprinciples
ToensurethesuccessfulimplementationoftheidentifiedOTcybersecurityprinciples,organizationsmustundertakeanumberofactionstotranslatetheoryintotangibleinstitutionalpractice.
PerformcomprehensiveriskmanagementoftheOTenvironment
Toincreaseoverallcybersecuritypreparednessandreducethepotentialandimpactofcyberattacks,
industrialorganizationsmusttakeacomprehensiveapproachtoriskmanagement.Thiscomprisesriskassessment–identificationofvulnerabilitiesand
gapsthatexposeanorganizationtoanattack,andofrisksthatcouldimpederecoveryandresilience–aswellasmitigationandmonitoringstrategies.Forriskmanagementtoberobustandcomplete,itisimportantthatorganizations:
–Identifyandclassifyassetsonthebasisontheircriticality,valueandsensitivitytotheorganization’soperations.
–Createaninventoryofthe“crownjewels”–thehighest-valueassetsintheirOTenvironment
which,ifcompromised,couldhaveamajor
impact.Oncethe“crownjewels”havebeen
identified,organizationsshouldidentifyhowtheyconnecttothenetwork,dataflows,etc.
–DetectsecurityvulnerabilitiesandthreatsacrossthemappedassetsandOTenvironment;
identifytheconsequencesthatcouldresultifthevulnerabilitiesareexploited(e.g.incaseofunauthorizedaccess,datatheft,equipment
damage,injuryandlossoflife,harmto
nationalsecurity,etc.);andprioritizemitigationaccordingly.
–Identifypotentialthreats(includingthreatevents,threatactors,etc.)thatcouldtargettheirOT
environment.
–EstablishanOTcybersecuritystrategyalignedwiththeoverallcybersecuritystrategy,outliningtheprevention,detectionandresponse
capabilities.Itshouldbereviewed,evaluated
andupdatedregularly.Organizationsshould
alsoconsiderdevelopingguidelinestoensure
effectiveadoptionandimplementationoftheOTcybersecuritystrategy.
EnsureOTengineersandinstallationoperatorshaveresponsibilityforOTcybersecurity
Researchshowsthat95%oforganizations20will
placetheresponsibilityforOTcybersecurityundertheChiefInformationSecurityOfficer(CISO)in
thenext12months.However,consideringthat
cybersecurityisasharedresponsibility,theITteamalonecannothavefullcontrolofOTcybersecurity;allstakeholders,atalllevelsoforganizational
management,needtodotheirpart.
Thismakesitimperativethatrolesand
responsibilitiesbeclearlydefinedandproperly
communicatedwithIT/OTpersonnel.Thatsaid,OTteamsdonotnecessarilyhavetheawareness
orknowhowtoproperlyinspectandsecureOTnetworks.InordertoshareresponsibilityforOTcybersecurity,OTpersonnelacrossindustrialorganizationsneedtounderstand:
–When,howandwhyasecuritybreachmightoccurintheOTenvironment.CommunicationsonsecurityawarenessshouldbecarriedoutcontinuouslyforallOTpersonnel.
–Whotocontactincaseofasecuritybreachorsuspiciousactivity,thatis,whotogethelpfromandwhotocollaboratewithforsupport.
UnlockingCyberResilienceinIndustrialEnvironments:FivePrinciples8
Principle3
DifferentthreatdetectiontechnologiesusedbyITandOTcoulddetectthreatsinthe
OTenvironment.Therefore,cooperation
andcommunicationbetweentheITandOT
departmentsisessentialtoensurethatallstaffhaveclearlyandpreciselydefinedrolesand
responsibilitiesforworkingtogetheronincidentresponseinOT.
–Thevulnerabilitiesandrisks(includinginheritedrisks)thateachconnecteddeviceintheOT
environmentbrings.
–TheroleoftheSecurityOperationsCentre
(SOC),CISOteam,etc.OTpersonnelshouldalsobuildarelationshipwiththeSOCand
CISOteamstoensuretransferofknowledgeonsecurityarchitectureandpolicies,includingontheprevention,detection,analysisand
responsetocybersecurityincidents.Among
theOTpersonnel,a“CyberChampion”shouldbeappointedineachfacilitywhocanhelpwithcyberissuesduringcrises.
Alignwithtoporganizationalleadership,strategicplanningteamsandthirdpartiestomakesecurity-by-designareality
MostoftheexistingOTwasnotdesignedwith
cybersecurityinmind.Security-by-designisa
processratherthanaone-time“bolt-on”effortandassuchshouldgobeyondintegrationofsecurityduringthedesignanddevelopmentphaseofaproduct/
service.Toenforceasecurity-by-designapproachintheOTenvironment,organizationsshould:
–Raisecybersecurityissuesandrisksto
corporatemanagementtoensurethatcritical
OTsystemsaresafeguardedfrompotentialrisksandvulnerabilitiesfromtheoutsetby:
–OrganizingexecutivebriefingstohighlighttheimpactofOTcyberrisksonbusinessoperations,financesandreputation.
–Developingandpresentingriskassessmentstocommunicatetheinterplaybetween
OTcybersecuritybreaches,operationaldowntimeandcompliancepenalties.
–Sharingcasestudiesillustratingreal-worldexamplesofcybersecurityincidentsintheOTenvironmentandtheconsequences
experiencedbyorganizationsthatwerecaughtoff-guard.
–EncouragingtheintegrationofOT
cybersecurityintotheoverallbusiness
strategytoensurecompetitiveadvantage
bydemonstratingcommitmenttoprotectingcriticalOTinfrastructure.Itcanultimately
helpfosteroverallresilienceacrossindustryecosystems.
UnlockingCyberResilienceinIndustrialEnvironments:FivePrinciples9
Principle4
Principle5
Contractuallybindandenforcesecurity
standardsonpartnersandvendorstobuildasecureOTenvironment
Third-partysuppliersandvendorsdifferinthewaytheyapproachcybersecurity.Nevertheless,they
havetoguaranteethesecurityoftheirproductorserviceandtakeresponsibilityforwhatisdelivered.TobuildasecureOTenvironmentandensure
successfulcollaborationwithandenforcementofsecuritystandardsbypartnersandvendors,industrialorganizationsshould:
–ConductthoroughduediligenceofbothITandOTcybersecurityposturebeforecollaboratingwithanythird-partyvendorsandsuppliers.Theassessmentshouldcoverhowacyberattackagainstathird-partyvendororsuppliercouldimpactoperations.
–Classifyandcategorizethirdpartiesaccordingtotheirlevelandtypeofrisk(compliance,
financial,reputation,etc.)beforetheycanaccessfacilities,networkandconfidentialinformation.
–Incorporatealistofbaselinesecurity
requirementsforthird-partyvendorsand
supplierswithaccesstofacilities,network
andconfidentialinformationwithinthesecurityframeworkmentionedinprinciple1.These
securityrequirementsshouldbemetbeforeformalizationofcollaboration.Examplesofsecurityrequirementsinclude:
–Implementationofsecuritylevels(SL)3and4ofIEC62443.
–ApplicationofadvancedcybersecuritystandardsforOTsoftwaredevelopment.
–Demonstrationofprovenhands-onexpertiseinhandlingcybersecurityevents.
–IncludeOTcybersecurityrequirementsin
contracts.OTcybersecurityrequirements
shouldcoverareassuchassecureremoteaccess,useofremovablemediadevices
totransferfiles,termsandconditionsfor
dataprotectionandprocessingofsensitiveinformationsharedbetweentheorganization
andthethirdparty,accident/incidentnotificationandreporting,etc.
–Continuouslyauditvendorandsuppliersecurityperformancetoensuretheyareadheringto
previouslyagreedsecuritycontrols.
–Incasethesecuritycontrolsarenotobserved,organizationsshoulddevelopanexitstrategythatincludesproperoversightoverthe
terminationofcollaborationwiththevendor,returnofassets,etc.
Runjointtabletopexercisestoensure
preparednessincaseofanactualincident
Atabletopexercisecannotalwaysperfectly
replicateeveryaspectofareal-lifescenarioor
incidentresponsesituation.Toensuremaximumpreparednessandamplifyitsbenefits,thetabletopexerciseshouldincludekeypersonnelandshouldhaveclearlydefinedandachievableobjectives.
Organizationsshouldtherefore:
–Usesecurityscenariosbasedonrealevents,andleverageandadaptexistingcrisis
managementprocedurestothecybercontext.
–EngagethecorrectstakeholdersthatgobeyondITandOTpersonnel.Exercisesshouldincludetheemergencypreparednessgroup,executiveleadershipandmanagement,technical
staff,thirdparties,legalcounselaswellas
psychologistswhocanevaluatetheresponsesandactionstakenbythesecurityincident
responseteam(SIRT).
–ClarifytherepresentationofOTcyber
competenceinincidentresponsetoensure
preparednesswhenathreateventoccursandexplorewhetheroperationscanberunintheOTenvironmentwithouttheIT.
–IncludeOTsitesacrossmultiplegeographiesandconsiderthelegalaspectsthatmayarise.
–Identifyweaknesses/gapsintheincident
responseandincludelessonslearnedinthepost-drillanalysisreports.
–Produceandcontinuouslyupdatethe
executives’playbookwithlessonslearnedfromsuchexercises.
UnlockingCyberResilienceinIndustrialEnvironments:FivePrinciples10
3
Monitoringthe
implementationof
OTcybersecurity
principles
ImplementationofOTcybersecurityprinciples
aloneisnotenough.Trackingtheirprogressandcontinuousassessmentofimpactiskeyinordertoensureeffectivenessoftheprinciplesandthatorganizationsareadaptingtothenewprocesses.TosuccessfullymonitortheimplementationofOTcybersecurityprinciples,organizationsshould:
–PerformregularauditstomonitorcompliancewiththeOTcybersecurityprinciples,includingassessmentsofcriticalthirdpartieswithaccesstotheOTenvironment.
–Conductreal-timemonitoringtodiscover,
identifyandassessdevicesandvulnerabilitieswithintheOTenvironment.The“now,nextandnever”approachcanhelporganizationsassessvulnerabilities.Gatheredinformationshouldbekeptinaregisterandreviewedperiodically.
–Developastrategicroadmapandprocessfor
reportingtothecorporateboardaboutprogressonOTcybersecurity.
–Senddata(e.g.IDSdata)regularlytothe
secur
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 長(zhǎng)春工業(yè)大學(xué)人文信息學(xué)院《BM安裝工程計(jì)量》2023-2024學(xué)年第二學(xué)期期末試卷
- 南昌理工學(xué)院《現(xiàn)代控制》2023-2024學(xué)年第二學(xué)期期末試卷
- 昆明幼兒師范高等專科學(xué)?!督鹑趯W(xué)前沿動(dòng)態(tài)》2023-2024學(xué)年第二學(xué)期期末試卷
- 信陽農(nóng)林學(xué)院《臺(tái)港暨海外華文文學(xué)研究》2023-2024學(xué)年第二學(xué)期期末試卷
- 西安體育學(xué)院《大數(shù)據(jù)機(jī)器學(xué)習(xí)》2023-2024學(xué)年第二學(xué)期期末試卷
- 濰坊工商職業(yè)學(xué)院《機(jī)器學(xué)習(xí)實(shí)驗(yàn)》2023-2024學(xué)年第二學(xué)期期末試卷
- 廣東信息工程職業(yè)學(xué)院《UML及形式化建?!?023-2024學(xué)年第二學(xué)期期末試卷
- 山西旅游職業(yè)學(xué)院《化工原理(Ⅰ)》2023-2024學(xué)年第二學(xué)期期末試卷
- 湘潭醫(yī)衛(wèi)職業(yè)技術(shù)學(xué)院《信號(hào)分析與處理》2023-2024學(xué)年第二學(xué)期期末試卷
- 麗水職業(yè)技術(shù)學(xué)院《詩歌導(dǎo)讀》2023-2024學(xué)年第二學(xué)期期末試卷
- 羅森便利店QSC標(biāo)準(zhǔn)課件講義
- 售后服務(wù)的流程圖
- 讀《讀懂孩子》讀書心得體會(huì)
- 《勞動(dòng)合同法》普法宣傳資料
- 二年級(jí)下冊(cè)科學(xué)教案-2.3科技產(chǎn)品體驗(yàn)會(huì) 大象版
- 退役軍人優(yōu)待證申領(lǐng)表
- Q∕SY 19001-2017 風(fēng)險(xiǎn)分類分級(jí)規(guī)范
- 勞務(wù)分包項(xiàng)目經(jīng)理崗位職責(zé)
- 幼兒繪本故事:奇怪的雨傘店
- 鋼琴基礎(chǔ)教程教案
- 糖基轉(zhuǎn)移酶和糖苷酶課件(PPT 111頁)
評(píng)論
0/150
提交評(píng)論