Remember that before any assessment
you should define the scope of the project. the scope include what is included in the assessment
In the scope always remember to
What are the four parts in defining the scope?
Key Component of Project scope include
Remember! complete and detailed scope leads to more valuable assessment.
Why conduct CVA
CVA meant to identify, classify, and define security Vulnerabilities. this is very critical step into in evaluating CYBER RISK!
CVA includes
When selecting an assessment type
Be aware of cost and Risk to the system. Also consider the benefits gained when running assessment.
Remember that
Those are Cybersecurity Vulnerability Assessment types
Benefit of cyber security risk assessment
Cybersecurity Risk assessment process 62443-3-2
Detailed risk assessment process. Section 5.0 under IEC62443-3-2
as per the standard it is defined under section 5-
the standard explain the input which is the requirement for each zone and conduit. the middle is the requirement and the output is the results.
the list is
5.1 identify threat
5.2 identify vulnerabilities
5.3 determine consequences and impact.
5.4 determine likelihood.
5.5 calculate unmitigated cyber security risk
5.6 determine security level target.
5.7 consider exaiting countermeasures,
5.8 reevaluate likelihood and impact
5.9 calculate residual risk
5.10 all risk mitigated or below tolerable risk.
5.11 apply additional cybersecurity measure.
5.12 document results
Documentation
You need to document to prove what you did.
Document should be:
- Revised,
- Amended,
- Reviewed and,
- Approved.
Document should be under controlled Scheme.
You need to document all the reports. Documents include
Documents in general provide support, findings, and recommendations.
Difference between Vulnerability Assessment and Penetration Testing
VA include identify, classify, and define weaknesses and report on discoveries.
PEN test include exploit to gain access.
Which key concept in the scope details all the element of the system?
Asset Inventory
Why partition the system under consideration into zones and conduits?
To ensure best possible protection.
Chapter 2 Conceptual Design
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Conceptual Design have key components that needs to be address so you can provide conceptual design specifications. those key components are
1 - Interpret risk assessment results.
2 - Mitigate results 4Ts or mitigating risk using the 4T’s
3 - Treat Risk using the 5Ds
4 - Develop Security Strategy
5 - Prepare conceptual design specification.
Lets dive to each one.
1- Interpreting Risk assessment Results- this includes. this should be included in any good risk risk assessment. if those are addressed correctly in the Risk assessment then things will be easier.
SL-T should be established for each zone. this depends on CRRF. it is based on risk matrix and risk tolerance.
Risk Profile is?
it is like a heat map that shows unmittigated risk and the risk level. some companies may have this in place or needs to build one.
SL-T is defined in how many levels?
5 levels.
Level 0 - no requirement
Level 1 - Protection against casual
Level 2 - Protection against intentional with low resource
Level 3 - Protection again intentional with high skills and moderate skills
Level 4 - Protection against intentional attacks with high skills and high motivation.
Security Level Target (SL-T) should be provided for each zone and conduit. also remember that
SL-T depends directly on CRRF the risk reduction Factor.
CRRF
is a measure of the degree of acceptable level. or the risk reduction required to achieve tolerable risk.
CRRF = to unmitigated risk / tolerable risk
You need to establish a relation between the SLT- and the CRRF. this should be based upon
Organization Risk Matrix and Risk tolerance.
Security Level targets are explained under
Annex A of IEC62443-3-3 Security Level Vectors.