OT Cybersecurity Requirements Specification
M. Yousuf Faisal
I help cyber & business leaders with Securing Things (IT, OT/ICS, IIOT, digital transformation/4.0 journey, & AI) & share everything I learn at securingthings.blog | securingthings.academy
Disclaimer: All views presented here, in this newsletter, are my own.
Author or the newsletter are not liable for any actions taken by an individual or an organization / business / entity. The information provided is for education and awareness and is not specific to any business or situation.
??In this edition, we'll be covering, at a high-level, the key stakeholders & their interactions within industrial ecosystem, introduce a typical IACS / OT / ICS project lifecycle and relevant cybersecurity activities and cover basics on OT Cybersecurity requirements specification
Assuming, we have the results from OT site(/s) assessments, business inventory discovered, cybersecurity strategy and roadmap
??Now we have to define a minimum set of OT cybersecurity best practices
Threat Landscape??
Several industry reports??since 2020 till 2023, clearly highlights that there's a steady increase in the number of ransomware attacks / incidents impacting many asset owners in the manufacturing industry or critical infrastructure sector. ??
Key Stakeholders - Roles & their interactions
Below figure depicts a simplified high-level view of end user organization (or asset owners), other stakeholders and their interactions for a typical manufacturing environment or organization in critical infrastructure sectors. (Note: may not represents all possible relationships / interactions).
??Note: product manufacturers can also be maintenance service providers and may have systems integration capabilities as well as preferred partners that they work with.?
Is this limited to manufacturers only? certainly not - even other critical infrastructure environments like financial sector, data centers and businesses with smart buildings, smart distribution centres, etc. and other business operations involves similar stakeholders interaction scenarios.
Acronym Soup
Let's define the key stakeholders, their responsibilities and some specific terms:
IACS / OT / ICS Project Lifecycle & Cybersecurity Activities??
A typical IACS / OT / ICS Project lifecycle have following stages, highlighted in the figure below. At each stage of the project lifecycle, from procurement to decommissioning, certain cybersecurity activities can be embedded into the lifecycle to ensure security is not an afterthought.??
More on cybersecurity activities throughout the OT project lifecycle in future newsletter edition.
Tip: If you as an organization is just thinking of starting out on such a journey to embed cybersecurity activities into your IACS / OT / ICS Project lifecycle - but lacks skills/resources and or business buy-in; it's recommended to take an iterative incremental approach, whereby, you establish an initial set of practices to be incorporated as quick wins - iterate, mature, and add more cybersecurity activities.
??We'll be focusing on first stage of project lifecycle i.e. for establishing a list of cybersecurity requirements specifications.?
领英推荐
ISA/IEC 62443 Standards - Cybersecurity Requirements Specification (CRS)??
?According to ISA/IEC 62443 standards, Cybersecurity Requirements Specification (CRS)??- documents - general security requirements based upon organization policy and standards, relevant regulations and the outcome of the high-level risk assessment as well as any mandatory security functions of the Systems Under Consideration (SuC).
Looking at the above list of items, there's lots to cover in a CRS document, for any given SuC. (More on the overview of ISA/IEC 62443 standards, security target levels etc. in future newsletter edition).
Safety, Reliability, Availability, Integrity, and Confidentiality related cybersecurity requirements may be logically grouped together, as well as monitoring and reporting requirements.?Grouping requirements can provide better organization of the information. For example, Access Control requirements may include:
??Note: Cybersecurity acceptance testing (e.g. CFAT or CSAT) (pre-commissioning) performs verification of the cybersecurity requirements specifications defined in CRS.?
? The Challenge ?
Many asset owners, in particular, SMB manufacturers don't have the required resources or skills sets and may find it difficult to build such a document or practice. Also they need to review a plethora of reference standards and guidance documents (many of them are old/outdated) and may find it complex or difficult to follow a full list of standard specific requirements - typical list is 100+ requirements for any given standards or guidance document.
? The Solution ???
Asset owners, can establish a predefined reference set of minimum best practices requirements specifications, for standardisation across all production sites or facilities, for any new or existing SuC (systems under consideration) or all projects. Later for each specific projects just add delta to requirements specification e.g., assumptions, specific security controls needs, selecting security target levels etc.
Each requirement, should be supported by specific guidance, reference standards control for greater staff awareness and minimize ambiguity.
CRS, need to include variety of domains/topics to be covered as part of IACS project lifecycle from PPT perspective:
-------------------------------------------------------------------------------
???Securing Things - OT Cybersecurity Best Practices Requirements Specification (OT-CBPRS)????- reference checklist for global SMB Manufacturers - a MVP Offer!? (for asset owners only) -
??Offer valid for both single or multi-site / multi-geographic operations. Large global manufacturers can contact for a custom requirements specification.
??Potential Use Cases??
Following is a list of potential use cases where by such a reference OT-CBPRS checklist would benefit asset owners:
??Special MVP Offer for Asset Owners (SMB Manufacturers)??- Reach out for special price??offer for the standard checklist or get a custom quote for customized checklist for your environment and for other business needs related to IT/OT cybersecurity project support; - feel free to DM me or reach out at info[@]securingthings[.]com
Follow @securingthings.
It’s a great day to start “#SecuringThings”.?
I help cyber & business leaders with Securing Things (IT, OT/ICS, IIOT, digital transformation/4.0 journey, & AI) & share everything I learn at securingthings.blog | securingthings.academy
11 个月#SecuringThings??? OT Cybersecurity Best Practices Requirements Specification (CBPRS)??#toolkit, by M Yousuf Faisal (Explainer video Premieres on Securing Things Youtube channel on 26th April 2024 at 9 am GMT +8) ? https://lnkd.in/djsJvfm9 To help?#SMB?#manufacturers?to jump start their OT/ICS cybersecurity journey. watch and listen more details on Youtube link above. Please register your interest here --> https://lnkd.in/dTb_BpJm? (or drop a DM with your official email address only) #SecuringThings?#OTCBPRS?#ITOTCySEAT?#Technology?#Cybersecurity?#Cybersecurityawareness?#industrial?#manufacturing?#OT?#ICS?#IACS?#smartfactory?#itotconvergence?#securefactory?#otsecurity?#icssecurity?#otcybersecurity?#cybersecurityawareness?#otsecurityawareness?#itotcybersecurity?#foodandbeverage?#automotive?#OTcybersecuritybestpracticesrequirements?#OTcybersecuritybestpracticesrequirementsspecification? ?#productmanufacturing?#securebydesign?#ccop?#soci?#nis2?#iec62443?#ncaot #otsecurityguidelines?#securitybestpractices
I help cyber & business leaders with Securing Things (IT, OT/ICS, IIOT, digital transformation/4.0 journey, & AI) & share everything I learn at securingthings.blog | securingthings.academy
1 年checkout the offer --> https://www.dhirubhai.net/posts/yousufzubairi_stl-ot-ics-cbprs-toolkit-for-smb-manufacturers-activity-7135304112811745280-4Ah1
| Partner, Global Head of OT Security | Industry Fellow | Board Advisor |
1 年Great insights as always M. Yousuf Faisal
I help cyber & business leaders with Securing Things (IT, OT/ICS, IIOT, digital transformation/4.0 journey, & AI) & share everything I learn at securingthings.blog | securingthings.academy
1 年Dieter Sarrazyn Caston Thomas Steven SIM Kok Leong Jonathon Gordon Malcolm Bailie Baillie Hamilton