SEC6084 ICS Risk And Audit Methodology Project
- Other / SEC6084 ICS
- 17 Nov 2020
- Price: $25
- Other / Other
Description of Industry
- What type of industry is this?
- What is the importance of this industry to society?
Industrial Control System Processes Employed
- List industrial control system processes specific to industry.industry.
- List the control systems that control those processes and how they control those processes.
- Createa network diagram displaying the interconnections of the industrial control system devices listed in item 3.
a. For example: Use ICS CERT CSET, Visio, Excel, Word, etc.
Table of Contents
- Description of Industry
- Industrial Control System Processes Employed
- Profile ICS Security Devices
- Create Diagrams of ICS Device Network
- Identify, Measure, and Manage Risks
- Identify Security Controls
- Apply ICS Security Best Practices
- Appendix
- Example: Industrial Incident or Accident
- Example: Disaster Recovery and Incident Response
- Example: Test Outputs
- Example: Vulnerability Scan Reports
- Example: Analysis Metrics from Tools
- Example: Presentations
- Example: Screenshots of Systems
List of Tables and Figures
Figure 1. Example: ICS System Documentation
Figure 2. Example: Security Solution Documentation
Description of Industry
- What type of industry is this?
- What is the importance of this industry to society?
Industrial Control System Processes Employed
- List industrial control system processes specific to industry.
- List the control systems that control those processes and how they control those processes.
- Create a network diagram displaying the interconnections of the industrial control system devices listed in item 3.
- a. For example: Use ICS CERT CSET, Visio, Excel, Word, etc.
Profile ICS Devices
1. For each ICS device document:
- Logical Ports: For example, 80, 443, etc. http://www.digitalbond.com/tools/the-rack/control-system-port-list/
- Protocols Running: For example, SMTP, SNMP, DNP3, Modbus, Fieldbus, Ethernet, etc.
- Physical Connection Types: For example, serial, RJ45, USB, parallel, etc. http://www.digitalbond.com/tools/the-rack/control-system-port-list/
- Default Accounts: Research the manufacturer’s information on the device. Look for default account information to login with. Check “Default Password List” for an entry: http://www.defaultpassword.com/
- Services: Research manufacturer’s information on the device and document services running.
- Authentication: Research manufacturer’s website for the device and locate information on how the device authenticates users.
- Use of Encryption: Research manufacturer’s website for the device and locate information about encryption. For example, does the device use encrypted connections? Is the back-end database encrypted? What type of encryption does it use? Is public/private key encryption like RSA?
- Logging Capability: Research manufacturer’s website for the device and locate information about logging. Answer questions like is logging enabled? Are logs stored locally or remotely?
- Other Security Documentation: Does the manufacturer have any security related documentation not provided above that would be of use?
Identify, Measure, and Manage Risks
1. Identify risks:
Risk is a function of M, AV, T, and V:
R = f (M, AV, T, V)
R – risk, M – mission importance, AV – asset values, T – threats, V – vulnerabilities
2. “What”: what is the problem/challenge in managing risks and auditing the ICS?
Explain how you might measure
“Why”: why do you need and want to solve the problem?
“How”: how do you economically solve it?
Identify Security Controls
Select security controls based on results from “Industrial Control System Processes Employed” and “Profile ICS Devices”: Reference either ICS CERT CSET or NIST 800-53, Security and Privacy Controls for Federal Information Systems and Organizations, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf
Apply ICS Security Best Practices
1. NIST 800-82, Industrial Control System Security, http://csrc.nist.gov/publications/drafts/800-82r2/sp800_82_r2_draft.pdf
2. Identify unremediated risks and choose risk strategy: Accept risk, avoid risk, mitigate risk, share risk, transfer risk, combination. Reference: NIST 800-37, Guide for Applying the Risk Management Framework to Federal Information Systems, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r1.pdf
Identify Vulnerability Continuous Monitoring Strategy
- Examples:
- Nessus - Bandolier modules.
- Metasploit – ICS exploits.
- Snort
- Nmap – Identify ICS “friendly” scans.
- Are these IA certified tools? How so?
- For example:
- NIAP: https://www.niap-ccevs.org/CCEVS_Products/pcl.cfm
- Common Criteria: https://www.commoncriteriaportal.org/products/
- For example: Are these tools SCAP-compliant?
- For example:
- Create script rules for baselining each ICS system.
- For example scripts rules should audit:
- Installed programs.
- Users, groups.
- Shares.
- Services.
- Processes.
- Etc.
- For example scripts rules should audit: