ic33 Flashcards

(35 cards)

1
Q

What are the 3 phases of The IACS Cybersecurity Life Cycle?

A

Assess
Develop & Implement
Maintain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three areas of the Assess phase?

A

High-Level Cyber Risk Assessment

Allocation of IACS Assets to Security Zones or Conduits

Detailed Cyber Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the continuous processes?

A

Cybersecurity Management System: Policies, Procedures, Training & Awareness (IEC 62443-2-1)

Periodic Cybersecurity Audits (IEC 62443-2-1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does an Asset Owner use ISA/IEC 62443-2-1?

A

Asset Owner selects risk assessment methodology, assigns roles and responsibilities, ensures appropriate training, resources, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does an Asset Owner and ISP use ISA/IEC 62443-3-2

A

Asset Owner and Integration
Service Provider use this part
to assess the risks of the
(SuC) System under
Consideration and meet with
the different ZCR’s (Zone and
Conduit Requirements)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does an Asset Owner and ISP use ISA/IEC 62443-3-3?

A

Asset Owner and Integration
Service Provider use this part as a
guidance to bridge from risk
assessment outcome towards
system related security
requirements based on assigned
SL-T (Security Level Target).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How does a Product Supplier use ISA/IEC 62443-3-3?

A

Product Suppliers use this part to
understand what needs to be
developed to meet the needs of
the market for a specific type of
system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does a Product Supplier use ISA/IEC 62443-4-1 and ISA/IEC 62443-4-2?

A

Product Supplier uses these
parts to understand the
requirements placed on
control system components
for specific security
capability levels (SL-C) and
develop the components
accordingly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Necessary Information that needs documenting to perform a Risk Assessment? (Prepare phase)

A
  • Define the goals of the Risk Assessment
  • Clearly document the IACS and associated assets
  • Develop a common, up-to-date understanding of the IACS
  • Regulations, policies, etc.
    – Government
    – Industry
    – Company
  • Gather and organize information such as architecture
    diagrams, devices, configurations, known vulnerabilities
  • Define roles and responsibilities
  • Establish training requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the Key Components to gather in the prepare phase?

A
  • System architecture diagrams
    – Physical
    – Functional
  • Network diagrams
    – Segments
    – Networking components
  • Asset inventory
  • Criticality assessment
  • Process flow
  • Data flow
  • Business processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of System Architecture Diagrams?

A

*Illustrate the components of
the system
* Illustrate connectivity
* Illustrate physical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some System Architecture Diagrams Recommendations?

A
  • All IACS functionality is graphically represented on at least one
    IACS Architecture drawing
  • Present the information following the ISA-62443-1-1 Reference
    Model
    – Based on the ISA-95
  • Include images/pictures of the IACS hardware components to
    provide context and assistance in identifying the equipment
    on site
  • Color code or use different line types for different networks
    and network segments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is ISA 95 Level 0?

A

Level 0 — The physical process — Defines the actual physical processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How many ISA-95 Functional Layers?

A

5 = (0,1,2,3,4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is ISA 95 Level 1?

A

Level 1 — Intelligent devices — Sensing and manipulating the physical processes. Process, sensors, analyzers, actuators and related instrumentation.

17
Q

What is ISA 95 Level 2?

A

Level 2 — Control systems — Supervising, monitoring and controlling the physical processes. Real-time controls and software; DCS, human-machine interface (HMI); supervisory and data acquisition (SCADA) software.

18
Q

What is ISA 95 Level 3?

A

Level 3 — Manufacturing operations systems — Managing production workflow to produce the desired products. Batch management; manufacturing execution/operations management
systems (MES/MOMS); laboratory, maintenance and plant performance management systems; data historians and related middleware. Time frame: shifts, hours, minutes, seconds.

19
Q

What is ISA 95 Level 4?

A

Level 4 — Business logistics systems — Managing the business-related activities of the manufacturing operation. ERP is the primary system; establishes the basic plant production schedule, material use, shipping and inventory levels. Time frame: months, weeks, days,
shifts.

20
Q

ISA95 Level 3 and below is the … domain?

21
Q

Key overview of Network Diagrams

A
  • Detail how the network is physically and logically constructed
  • Individual routers, switches, firewalls are shown symbolically
  • Switch port assignments are identified
  • VLANS are documented
  • May or may not show hosts (e.g. devices plugged into
    switches)
22
Q

Key overview of Asset Inventory?

A

*Facilities should maintain a list or database of all IACS and SCADA hardware (physical and virtual) and software

  • Compiled through documentation and site survey
  • Automated tools can be used to gather this data
  • Automated tools should be carefully tested to ensure they do not impact system availability or integrity and do not introduce security
    vulnerabilities
23
Q

Name the different types of Asset Inventory Tools?

A
  • Network management tools
  • Software Asset Management (SAM) tools
  • Configuration management tools
24
Q

When preparing for a risk assessment a … approach is preferred?

A

Combined Approach Preferred

Asset Owner and Integration Service Provider will understand the SuC better by combining different approaches:
* Documentation Analysis
* Assisted Analysis with tools
* Walk through the plant

25
What are the four Common Threat Actions?
Spoofing Tampering Information Disclosure Denial of Service
26
Broad cases of vulnerabilities are?
Broad classes of vulnerabilities: – Policy & Procedural – Architecture & Design – Configuration & Maintenance – Physical – Software – Communication & Network
27
Give overview of IACS Cybersecurity Vulnerability Assessments
* Exercise to define, identify, and classify the security vulnerabilities in an industrial control system and its related network infrastructure * Evaluate the IACS design, implementation, configuration as well as its operation and management * Determine the adequacy of security measures and identify security deficiencies * Determine known vulnerabilities for the used components
28
What are the Types of Cybersecurity Vulnerability Assessments?
* High-level vulnerability assessment * Passive vulnerability assessment * Active vulnerability assessment * Penetration test (hunting for vulnerabilities)
29
What are the key steps when conducting an IACS High Level Vulnerability Assessment?
* Identify benchmark standards * Gather information – Interviews – Questionnaires – Drawings – Site visits * Compare performance with benchmark standards – People – Processes – Technology * Document and report results
30
Name the most popular IACS Cybersecurity High Level Vulnerability Assessment Tool
* DHS Cybersecurity Evaluation Tool (CSET)
31
What are the Benefits of CSET?
* Repeatable and systematic approach for assessing an organizations cybersecurity posture * Evaluation and comparison to existing industry standards and regulations * Facilitates discussion and input from subject matter experts throughout the organization (e.g. operations, engineering, maintenance, information technology, business, health/safety and Cybersecurity) * Identifies potential vulnerabilities in the control system design and security policies * Offers guidelines for IACSs cybersecurity solutions and mitigations
32
What are the Limitations of CSET?
* CSET is only one component of a comprehensive control system security program. * CSET will not provide a detailed architectural analysis of the network or a detailed network hardware/software configuration review * CSET has a component focus rather than a system focus * CSET is not a risk analysis tool, it will not create a detailed risk assessment * CSET is not intended as a substitute for in-depth analysis of control system vulnerabilities as performed by trained professionals. * Data and reports generated by the CSET should be managed securely and marked, stored, and distributed in a manner appropriate to their sensitivity
33
What is a Cyber Criticality Assessment?
* Assessment of the criticality of an IACS asset, input for risk assessment – Also called Business Impact Assessment * Measure of the negative impact should information be unavailable, unreliable or compromised * Communicated to employees and contractors * Methodology for identifying worse case consequences
34
What is the risk equation?
Risk = Threat x Vulnerability x Consequence
35
What should be done if a risk is above tolerable risk?
* If risk is above tolerable risk: – Design the risk out – Reduce the risk – Transfer or share the risk – Eliminate or redesign redundant or ineffective controls