ISA IC33 Flashcards
Security Life Cycle include?
Access,
Develop & implement,
and Maintain Phase
Security Life Cycle is.
Continuous steps to minimize risk.
IC33 focus on the Access Phase. Access Phase include?
1- High Level Cybersecurity assessment
2- Allocation of IACS assets to Security Zones and Conduits
3- Detailed Cyber Risk Assessment
IC33 Access phase focuses are found in?
ISA/IEC62443-3-2
IC34 is related to the Develop & Implement phase which include?
4- Cyber Security Requirement Specification (CRS) ISA 62443-3-2
5- Design and Engineering of Cybersecurity Countermeasures ISA 62443-3-3
6- Installation, Commissioning, and Validation of Cyber security Countermeasures
- It also includes Design and Develop other means of Risk Reduction
IC34 Develop and Develop phase works with
ISA 62443-3-2 and ISA 62443-3-3
IC37 is the Maintain Phase which includes…
7- Cybersecurity maintenance, monitoring, and management of change ISA 62443-2-1
8- Cyber security response and Recovery ISA 62443-2-1
IC37 works with?
ISA/IEC62443-2-1
ISA 62443-2-1 also used for the the what?
- Cybersecurity management system for policies, procedures, training & Awareness.
- Periodic Cybersecurity Audits.
Before running any assessment you must define what?
The Scope of the project must be defined first.
Scope
Determine the parameters on what is included in the assessment and how it is performed.
Scope include?
1- Identify Requirement
2- Specify Devices.
3- Select Collection Method
4- Document
The Documents in the scope is to help identify
1- constrains
2- deliverables
3- assumptions
4- boundaries
Key Component of project scope include
1- system architecture diagram
2- Network Diagram
3- asset Inventory
4- Criticality assessment
ISA 62443 Reference Model include
- Level 0 Process
- Level 1 Safety/Protection and Basic Control
- Level 2 Supervisory Control
- Level 3 Operations Management
- Level 4 Enterprise Systems
Network Diagram should illustrate
- How the network logically and physically constructed.
- ## Port assignment, VLANS, device types.
Asset Inventory should be done for all component such as software, hardware, and network this can be done by means of
- Documentations
- Tools such as automated tools.
- Using Site Surveys.
Automated tools should always be tested
this is important to ensure no security vulnerability are introduced in the network.
Cyber Criticality Assessment
Is the measure of the negative impact, should information are not available, not reliable, or compromised . it will always refer to the AIC and how each one of them is effected.
CHAPTER 2
Cybersecurity vulnerability assessment
RISK IS?
Threat * Vulnerability * Consequences.
Understanding Vulnerability will help with
Better understanding the Risk.
Management is responsible to determine
The Acceptable Risk Level that they can tolerate - risk Tolerance.
Risk Types are divided into the following
- Design Risk Out by changing the design
- Reduce Risk by implementing countermeasure.
- Transfer risk using insurance.
- Eliminate and remove redundant controls.
- Accept Risk
Why conducting Cybersecurity Vulnerability Assessment
The CVA defines, identify, and classify the vulnerability in the Industrial Control System and it is network component,.
First Step in evaluating Cyber Risk is?
Cybersecurity Vulnerability Assessment
Cybersecurity Vulnerability Assessment
Evaluate the configuration, Implementation, Management, and Operation.
Cybersecurity Vulnerability Assessment
Identify security deficiencies
Cybersecurity Vulnerability Assessment Types
- High Level - GAP Assessment - least invasive
- Passive Assessment
- Active Assessment
- Penetration Test - Most Invasive
When conducting risk you should always look at
- Cost of the Assessment
- Benefit gained from the Assessment.
GAP ASSESSMENT
meant for reviewing the system and compare it to the industrial standards and regulations.
GAP Assessment include
- Interviews with key personnel
- Questionnaires
- Walk though
- Examine of Sample Configurations and Drawings.
Passive CVA include
- Reviewing configuration
- Collecting logs, data,
- Capture traffic from network
- Analysis of actual traffic.
- Reviewing ARP tables.
Active CVA include
running tools which are more invasive to the system. tools such as Nessus, Advance IP scanner, NMAP, Shodan, and others.
PEN Test
is the most intrusive to the system.
PEN TEST start with active scanners then it exploit known vulnerabilities in the system,.
- The JOB of the PEN TEST is to Validate the effectiveness of the countermeasures.
Difference Between VA and PEN Test
VA only assess and collect data, identify weakness, and report. PEN test exploit Vuln and try to gain access using complex tools.
How to conduct GAP assessment
- Identify benchmark standards.
- Gather information from system by performing interviews, site visit and documentation
- Compare the Benchmark standard with the performance - compart 1 and 2.
- Document and report the results.
Gap Assessment tools include
- CSET tool
- Custom Databases
- Custom Spreadsheets
Benefit of CSET tool
- Repeatable and Systematic approach to assess the network
- Evaluate against the security standards and regulation.
- Identify potential Vuln in the system
- Provide and offer guidelines
CSET LIMITATIONS
- Its component focus and not system focus
- it cannot provide detailed risk assessment to deigns.
- it is not meant to substitute the in depth analysis.
- it is not risk analysis tool for system.
- date should be treated securely.
Standard listed in CSET are
- NERC-CIP
- NIST Special publications.
- NIST SP800-82
- DoD Instruction 8500
- NIST Cyber Security Framework
- CNNSI 1253
- FIPS 199
- CFATS RBPS
- NRC-RG
CSET Process includes
- Form a Team
- Add Assessment Information
- Select Mode and Standard
- Determine Security Level
- Build a Network Diagram
- Answer Questions
- Analyze the Results.
Which assessment give feedback
GAP Assessment
Conducting Risk Assessment include
- Pre Assessment
- Kick off meeting
- Walk through
- Passive Data collection
- Network Scanning - Active
- Vulnerability Scanning - Active
- Analysis
- Reporting
Pre Assessment phase include -1
- scope of the project
- Find assessment team
-`Select standard - set time and logistics
- Review Documents
- PPE requirement
it is important to identifying gaps by
asking and collecting all documents required to help with assessment