Форум АСУ в Україні

форум з автоматизації для викладачів, студентів та спеціалістів
Сьогодні: 29 березня 2024, 07:51

Часовий пояс UTC + 2 годин [ DST ]




Створити нову тему Відповісти  [ 4 повідомлень ] 
Автор Повідомлення
 Тема повідомлення: Компетенції: IACS Cybersecurity
ПовідомленняДодано: 12 травня 2015, 16:40 
Офлайн
Викладач

З нами з: 29 листопада 2013, 17:11
Повідомлення: 5033
Industrial Automation and Control Systems (IACS) Cybersecurity
http://www.careeronestop.org/Competency ... =1074&AT=Y


Догори
 Профіль  
 
 Тема повідомлення: Re: Компетенції: IACS Cybersecurity
ПовідомленняДодано: 12 травня 2015, 17:50 
Офлайн
Викладач

З нами з: 29 листопада 2013, 17:11
Повідомлення: 5033
The knowledge, skills, and abilities needed to understand the purpose and implement the function of cybersecurity in operational technology, including tools and systems.

Critical Work Functions
•Differentiate between IT and OT architectures and the operation of these architectures
•Manage Cybersecurity risk as it relates to IACS
•Determine and implement the appropriate tools and methods for IACS Cybersecurity
•Understand zones and conduits identification
•Understand Cybersecurity Security Level (SL) per zone
•Professional development to stay current on threats and remediation methodologies
•Incorporate new and emerging cybersecurity defense technologies and trends into proposed solutions
•Reassess risk as automation systems evolve


Догори
 Профіль  
 
 Тема повідомлення: Re: Компетенції: IACS Cybersecurity
ПовідомленняДодано: 12 травня 2015, 17:53 
Офлайн
Викладач

З нами з: 29 листопада 2013, 17:11
Повідомлення: 5033
Technical Content Areas

General
◦Understand policies and procedures - IT and OT
◦Technologies –Security Lifecycle - assess, implement and maintain
◦People – training and motivation

Operational Technology (OT) architecture
◦Explain typical OT architecture
◦Explain the typical communications network options and communications protocols used in OT architectures, with their relative pros and cons
◦Identify the principal drivers of OT systems, particularly process safety and system availability

Networks
◦Recognize the impact on OT systems of security hardware and software options such as encryption and intrusion detection
◦Explain guidance on separation of OT and IT system networks and components
◦Identify zones and conduits and implement controls

Operating systems
◦Describe how to manage patches to IT and OT operating systems
◦Recognize the implications of installed patches to IT and OT systems

Telecommunications
◦Describe the communications protocols used in OT architectures, with their relative pros and cons

Information assurance - The standards, procedures, and applications used to protect the confidentiality, integrity and availability of information and information systems
◦Identity management and authentication
◦Access control
◦System integrity
◦Data confidentiality
◦Restricted data flow
◦Timely response to events
◦Resource availability

Security Lifecycle – The overall business process for managing security of information and information systems
◦Understand that security management is a continuous process
◦Recognize the key elements which must be present in any security lifecycle: governance, identify, protect, respond and recover

Governance - The knowledge and skills, and abilities needed to successfully manage the process
◦Policies and procedures – defining what will be done and how
◦Oversight – ensuring the process is working

Identify – The knowledge and skills, and abilities needed to identify the assets to be managed
◦Differences between OT and IT systems - recognize the specialized system requirements of OT systems
◦Asset management
◦Risk management – the systems, tools, and concepts used to minimize the risk to an organization's cyberspace and prevent a cybersecurity incident
◦Computer defense - describe the impact of computer defense techniques and tools (such as penetration testing and vulnerability scanning) on IT and OT systems and know when to use such techniques or tools
◦Contracting and procurement - describe critical IT and OT procurement requirements
◦Enterprise strategies - explain the rationale of and adhere to IT and OT supply chain security/risk management policies, requirements, and procedures

Protect – The knowledge and skills, and abilities needed to develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services
◦Technologies and architectures – how to make systems secure (firewalls, DMZ, zones, conduits, VPNs)
◦Access Control – limiting access to systems (role based access and account management)
◦Awareness and training – making users aware
◦Data security – protecting valuable information
◦Maintenance – managing updates safely and securely – virus scanning, patch management
◦Outsourcing – safely outsourcing the entire technology environment (cloud computing, etc.), taking into account the limitations of outsourcing OT systems
◦Safe internet behavior – not accessing email or internet on OT system computers; not installing unauthorized software on OT system computers
◦Remote working - restrictions on accessing OT systems at home or outside the secure work areas of the business

Detect - The knowledge, skills, and abilities needed to identify threats or incidents
◦Intrusion detection tools
◦Network monitoring resources
◦Attack stages
◦Evasion strategies and techniques
◦Incident classification

Respond - The knowledge, skills, and abilities needed to respond to and remediate an incident, as well as restore functionality to the system or infrastructure
◦Response/business continuity planning - understand the risks associated with OT systems and be able to identify practical mitigation measures to manage these risks
◦Analysis – investigate anomalies, perform forensics, classify the incident
◦Communications – understand roles and order of operations; report incidents consistently within established criteria; share information in accordance with plans; coordinate with stakeholders
◦Mitigation – contain and mitigate incidents

Recover – The knowledge and skills, and abilities needed to ensure timely restoration of systems or assets affected by cybersecurity events and adoption of lessons learned
◦Recovery planning – execute recover plan
◦Communications – manage public relations; repair reputation; communicate with stakeholders
◦Improvements – incorporate lessons learned into plans and update response strategies

Standards
◦International Information Security Management Guidance (ISO27001)
◦Office of Homeland Security System and Physical Security Regulations (US only)
◦ISA/IEC 62443 Cyber Security for Industrial Control Systems
◦NIST Cybersecurity Framework


Догори
 Профіль  
 
 Тема повідомлення: Re: Компетенції: IACS Cybersecurity
ПовідомленняДодано: 12 травня 2015, 17:58 
Офлайн
Викладач

З нами з: 29 листопада 2013, 17:11
Повідомлення: 5033
Related Competency Model Resources:
http://www.careeronestop.org/Competency ... =1074&AT=Y


Догори
 Профіль  
 
Відображати повідомлення за:  Сортувати за  
Створити нову тему Відповісти  [ 4 повідомлень ] 

Часовий пояс UTC + 2 годин [ DST ]



Хто зараз онлайн

Зараз переглядають цей форум: Немає зареєстрованих користувачів і 2 гостей


Ви не можете створювати нові теми у цьому форумі
Ви не можете відповідати на теми у цьому форумі
Ви не можете редагувати ваші повідомлення у цьому форумі
Ви не можете видаляти ваші повідомлення у цьому форумі
Ви не можете додавати файли у цьому форумі

Знайти:
Вперед:  
cron
Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group
Вы можете бесплатно создать форум PHPBB2 на MyBB2.ru, Также возможно создать форум бесплатно PHPBB3 на Getbb.ru
Український переклад © 2005-2007 Українська підтримка phpBB