Module 1-10 Flashcards

1
Q

Assess Phase?

A
  1. High-Level Cyber Risk Assessment
  2. Allocation of IACS assets to Zones/Conduits
  3. Detailed Risk Assessment
    62443-3-2
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Development & Implementation Phase?

A
  1. CRS
    62443-3-2
  2. Design and Engineering of Cybersecurity Countermeasures (CC)
    62443-3-3
  3. Installation, Commissioning, and Validation of CC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Maintain Phase?

A
  1. Cybersecurity Maintenance, Monitoring, and MoC
  2. Cyber Incident Response and Recovery
    62443-2-1
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Continuous Process

A

Cybersecurity Management System (CMS): Policies, Procedures, Training, and Awareness
Periodic Cybersecurity Audits
62443-2-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Interpreting CRS

A

The output of the risk assessment (CRS) is the input for the Development & Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Security Level (SL) Definitions

A

0 = No reqs. or security protection needed.
1 = Protection against casual/coincidental violation
2 = Protection against intentional violation with low resources/skill/motivation
3 = Protection against intentional violation with moderate resource/IACS skill/motivation
4 = Protection against intentional violation with extended resource/IACS skill/motivation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SL Types

A

SL-T = desired security level for system
SL-A = actual security level of system
SL-C = potential security level of system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Four Ts for Managing Risk

A

Terminate
Tolerate
Transfer
Treat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

5 Ds of Treating Risk

A

Defeat
Delay
Deny
Detect
Deter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Steps to Developing a Security Strategy

A

I R E I D
Identify Zones
Review Risk Assessment results
Establish SL-T
Identify Physical and Cyber Access points
Develop 5D physical & cyber strategy for each point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Seven Foundational Requirements (62443-3-3)

A

I U S D R T R
1. Identity and Authentication Control
2. Use Control
3. System Integrity
4. Data Confidentiality
5. Restricted Data Flow
6. Timely Response to Events
7. Resource Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

FR Technologies

A

System Integrity: Malware/Anti-virus
Data Confidentiality: Encryption
Both: Physical security, secure protocols
Restricted Data Flow: Firewall, VLAN
Timely Response to Events: IDS/IPS
Resource Availability: Backup/recovery tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

62443-4-2 Overview

A

Used by suppliers to identify security capabilities of their components (Software App, Embedded Device, Host Device, Network Device)
Series of Component Requirement (CR) and Requirement Enhancements (RE)
Expands System Requirements (SR) and RE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network types for IACS

A

Mesh, Star/Hub, Spoke, Ring, Bus, Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ISO/OSI Reference model layers and description

A
  1. Physical - physics of getting messages between devices (Ethernet - IEEE 802.3)
  2. Data Link - rules for framing, converting electrical signals to data, physical/MAC addressing (802.3)
  3. Network - routing messages through complex network (IP, ICMP, ARP)
  4. Transport - transparent transfer of data between systems/hosts, end2end recovery, flow control (TCP/UDP)
  5. Session - persistent logical linking of 2 software apps, mechanism for opening, closing, managing sessions (RPC)
  6. Presentation - delivers/formats data for L7 data, format conversion, encryption/security, SSL
  7. Application - interfaces with software apps that have a communicating component, Email (SMTP), File (FTP),
    HTTP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Problems with OSI model?

A

Layer specification is FUNCTIONAL only
Too complex for many applications such as industrial protocols where L5,6,7 are combined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How do Network Discovery and Security Auditing Tools affect IACS

A

May adversely affect hazardous materials/operations/equipment
Safety systems could be triggered
Disrupt the flow of the control system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Three classes of firewalls

A

Packet Filter - filters based on packet headers
Stateful Inspection - tracks state of connections and blocks packets that deviate from state
3 states Connection Establishment, Usage, Termination
Deep Packet Inspection - basic intrusion detection technology that analyses protocols for malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Steps in Firewall Planning

A

P I T D M
Plan - select technologies
Install & Configure - Install device, soft/firmware, patch/update. Configure users, policies, rules, ACLs
Test - Connectivity, rulesets, security, performance
Deploy - notify users, integration with routers/switches, test, back up
Manage - Maintain policies, patching, MoC, Config mgmt., Logs, Audits

20
Q

IACS Firewall configuration best practices

A

Deny all, allow by exception
No direct connections from internet to ICS network
Restrict access between CORP/PROD

21
Q

Host Intrusion Detection System (HIDS)

A

Monitors and analyzes internal and network interfaces on a single host

Agents monitor SI, applications activity, file changes, logs, Policy enforcement

22
Q

NIDS vs HIDS

A

Broad vs Narrow
Near real-time vs after suspicious activity
Bandwidth-dependent vs independent
High false positive rates vs low
Hardware vs no hardware

23
Q

IDS Best practices

A

Distributed Deployment
Use SCADA IDS Signatures
Careful not to block necessary traffic with IPS

24
Q

Security Requirements (SRs)

A

CAD SIR
Confidentiality
Access control,
Data flow,
Security event monitoring,
Industry/regulatory standards
Risk assessment

25
Q

Network Intrusion Detection System (NIDS)

A

Monitors network traffic for suspicious activity

IDS sensors/collectors are placed throughout a network connected to a mgmt. console

26
Q

System Hardening - Reducing Attack Vectors

A
  • Remove unnecessary software, user accounts, unnecessary services
  • Install Security Patches
  • Strengthen access controls
27
Q

OS Hardening Guidance

A

Guidance: Center for Internet Security (CIS) security benchmarks
Microsoft security guides
NIST SP 800-123 Guide to general server security

28
Q

OS Hardening Steps

A

Patch/update OS
Remove/Disable unnecessary services/apps/protocols
Configure Access controls
Configure OS user authentication
Install and configure additional security controls
Test the security

29
Q

CIS Benchmarks

A

Recommendations for technical control rules/values for hardening OS, software and network devices

Accepted by governments, industry and academia

30
Q

IACS Guidance

A

Guidance: NIST SP 800-82 Guide to ICS
Vendor Specific
Independent test reports: ISA Secure

31
Q

IACS Device Hardening

A

Disable remote program changes,unused interfaces, unnecessary services, protocols

Compare file hashes
Install vendor firmware updates

Restrict remote access
Protect with IACS firewall

Change default passwords
Enable Logging

32
Q

Functional Planes of a Network

A

Mgmt. - SSH/SNMP
Control - BGP, OSPF
Data

33
Q

Network Hardening Best Practices

A

Shutdown unused interfaces and services
Restrict remote mgmt.

Install firmware updates
Compare hashes

Change/encrypt passwords
Enable logging

Use secure protocols for remote mgmt.
Use SNMPv3 with Encryption

34
Q

Access Control

A

Policies, Procedures, and technical controls that govern the use of system resources.

35
Q

Access Control Best Practices

A

D E E M S
Develop an access control policy that enables logical and physical rules and rights

Employ multiple authentication methods of critical IACSs.

Establish separate IACS domains for each production area.
Use Organizational units (Ous) to partition resources into logical/functional units.

Make use of centralized identity and access mgmt. tools

Segregate data with high sensitivity and/or business consequences from other internal info.

36
Q

Remote Access Best Practices

A

Require
- use of CORP laptops for remote access
- 3rd parties with RA to contractually comply with orgs security policies
- 2FA >

Provide separate authentication mechanisms for int/external users
Change TCP port numbers for well-known remote access protocols from their defaults
Monitor and log all remote access sessions
Encrypt all communication over untrusted networks

37
Q

VPNs

A

VPN appliance is a network device with security features known as Secure Socket Layer (SSL)

Site-to-Site VPN (LAN to LAN, 2 gateways)

Remote Access VPN (Host to Host, 1 gateway)

38
Q

IACS remote access

39
Q

Types of remote users

A

System Operators/Integratiors/Support Specialist & Engineers, field technicians

Reporting and regulatory entities

supply chain representatives, managed service providers

Vendors, customers, business partners

40
Q

Cybersecurity Factory Acceptance Testing (CFAT) Objective?

A
  1. Verification of Cybersecurity specifications
  2. Cybersecurity robustness testing – testing the design of the system to discover and identify weaknesses or vulnerabilities.
41
Q

Need for Cybersecurity Site Acceptance Testing (CSAT)?

A

verifies that security settings are properly configured

42
Q

Cyber Acceptance testing best practices

A

Select different vendors for testing vs design
Define System-under-Test
Develop a verification and testing plan
Verify cybersecurity configuration settings
Perform robustness testing
Document results

62443-2-4

43
Q

Security Auditing Tools

A

Auditing Tools: Center for Internet Security (CIS) has the
Configuration Assessment Tool (CAT) and the Router Assessment Tool (RAT)

Tenable has Nessus audits OS, Apps, DB

Digital Bond has Bandolier audits against optimal security configs for ICS servers and workstations (works with nessus)

MBSA (Microsoft Baseline Security Analyser)

44
Q

Roles to support asset owner

A
  1. Product Supplier Components (in 62443-4-1)
  2. Integration Provider Design and Setup (Analyzing environment, developing architecture, defining connections, installing, configuring, patching, testing and backups)
  3. Maintenance Provider Support After Handoff (patching and anti-virus updates, equipment upgrades and maintenance, change management)
45
Q

Maturity Levels

A

Level Description
1 Initial - undocumented
2 Managed - written policies
3 Defined - repeatable across the organization
4 Improving - service providers control the effectiveness and performance of the service and demonstrate improvement

I M D I
Based on CMMI SVC Model

46
Q

Security Program Requirements for IACS Service Providers

A

62443-2-4
Can be used by asset owner to request or assess specific security capabilities from service provider