content
stringlengths 26
2.54k
| metadata
dict |
---|---|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
173 Document Classification: Public TLP: White
• Evidence of continuous monitoring of event logs ( e.g., the team that is
approved and dedicated to monitoring and controlling these logs).
5-1-3-4 Isolation of Safety Instrumental Systems (SIS).
Control implementation guidelines
• Ensure that the approved documented policy includes requirements for the
isolation of Safety Instrumented System.
• All safety equipment systems in the organization must be defined.
• Identify and assess the cyber risks associated with connecting Safety
Instrumented Systems with other systems.
• Isolate Safety Instrumented Systems from other systems based on the following:
o Physical or logical isolation based on cyber risks and Safety
Instrumented Systems guidelines and providers.
o Type of isolation to be applied, including:
▪ Safety Instrumented Systems (SIS) isolation from engineering
workstations
▪ Safety Instrumented Systems isolation from industrial systems
▪ Safety Instrumented Systems isolation from other networks
Expected deliverables:
• Cybersecurity policy that covers the requirements of the protection of ICS/OT
(e.g., electronic copy or official hard copy).
• Design plan of the approved Safety Instrumented Systems network (electronic
copy or hard copy).
5-1-3-5 Strict limitation on the use of external storage media.
Control implementation guidelines
• Ensure that the approved documented policy includes requirements for
restricted use of external storage media.
• Configure systems and technologies to prevent the use of external storage
media automatically. This may include:
o Configure industrial systems protection techniques to prevent the use
of external storage media automatically; or
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 172,
"page_label": "173",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
174 Document Classification: Public TLP: White
o Configure central service system (e.g., Active Directory) to prevent the
use of external storage media automatically; or
o Configure devices registry to prevent the use of external storage media
automatically
• Develop and approve procedures to use external storage media, (including, but
not limited to, requesting approvals via e -mail, paper, or through an internal
system). Such procedures include:
o Reason for requesting approval for use.
o Usage duration.
• Define the mechanism for handling data stored in storage media to be
inspected before use and erased after completion.
Expected deliverables:
• Cybersecurity policy that covers the requirements of the protection of ICS/OT
(e.g., electronic copy or official hard copy).
• Screenshot showing the restriction of the use of external storage media on
industrial systems.
• Procedures for restricting the use of external storage media on industrial
systems, while proving the application of these procedures (e.g., procedures for
approving use through emails, a hard copy or electronic copy of the use
approval form).
5-1-3-6 Strict limitation on connecting mobile devices to industrial production
networks.
Control implementation guidelines
• Ensure that the approved documented policy includes requirements for the
restriction of mobile device connectivity to the industrial production network.
• Identify, implement and control appropriate technologies for network access
control.
• Define appropriate and advanced technologies to authenticate mobile devices
(e.g., RADIUS, MAC Authentication).
• Ensure that the mobile devic es' connectivity to the industrial production
network is not basically activated and that this connectivity is restricted if there
is a need to activate it.
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 173,
"page_label": "174",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
175 Document Classification: Public TLP: White
• Develop and approve procedures to use mobile devices, (including, but not
limited to, requesting ap provals via e -mail, paper, or through an internal
system). Such procedures include:
o Reason for requesting approval for use.
o Usage duration.
• Define the mechanism for handling data stored in mobile devices to be
inspected before use and erased after completion.
Expected deliverables:
• Cybersecurity policy that covers the requirements of the protection of ICS/OT
(e.g., electronic copy or official hard copy).
• Screenshot showing the restriction of connectivity of mobile devices to
industrial systems.
• Procedures for restricting the connectivity of mobile devices to the industrial
production network, while proving the application of these procedures ( e.g.,
procedures for approving potential connectivity through emails, a hard copy
or electronic copy of the approval form).
5-1-3-7 Periodic review and secure configuration and hardening of industrial,
automated, support systems, and devices.
Control implementation guidelines
• Ensure that the approved documented policy includes the requirements to
periodically review the Secure Configuration and Hardening of industrial
systems, support systems and industrial machinery.
• Identify all industrial systems, support systems and industrial machinery in the
organization.
• Develop hardening standard controls for industrial systems, support systems,
and industrial machinery in cooperation with system providers and
manufacturers.
• Document and implement an action plan to review Secure Configuration and
Hardening of industrial systems, support systems and industrial machinery on
a regular basis or using automated tools.
• Work with the concerned departments to develop a corrective plan for
configuration and hardening review results.
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 174,
"page_label": "175",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
176 Document Classification: Public TLP: White
Expected deliverables:
• Cybersecurity policy that covers the requirements of the protection of ICS/OT
(e.g., electronic copy or official hard copy).
• Reports on the review of Secure Configuration and Hardening of industrial
systems, support systems, and industrial machinery, indic ating their periodic
application.
5-1-3-8 Vulnerability management for industrial control systems and operational
technology (ICS/OT).
Control implementation guidelines
• Ensure that the approved documented policy includes the requirements for
ICS/OT Vulnerability Management.
• ICS in the organization must be defined.
• Identify appropriate technologies for ICS/OT vulnerabilities assessment,
provided that they are qualified by industrial systems providers and
manufacturers.
• Analyze the impact of the ICS/OT vulnerabilities assessment and determine
whether it is invasive or non-invasive and develop a contingency plan.
• Schedule and conduct vulnerabilities assessment based on the approved plan.
• Work with the concerned departments to develop a plan to address
vulnerabilities.
Expected deliverables:
• Cybersecurity policy that covers the requirements of the protection of ICS/OT
(e.g., electronic copy or official hard copy).
• ICS/OT Vulnerability review report, outlining the procedures used to manage
vulnerabilities.
5-1-3-9 Patch management for industrial control systems and operational
technology (ICS/OT).
Control implementation guidelines
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 175,
"page_label": "176",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
177 Document Classification: Public TLP: White
• Ensure that the approved documented policy includes requirements for
ICS/OT Patch Management.
• Identify the organization's ICS/OT and determine their criticality, in
accordance with the relevant laws and regulations.
• Identify approved communication channels in the organization with the
systems suppliers and manufacturers to know the latest security ICS/OT Patch.
• Develop approved pro cedures and plans for the management of patches for
industrial systems.
• Analyze the impact of implementing patches on industrial systems while
developing a contingency plan.
• Work with the concerned departments to test patches according to the
approved procedures.
• Schedule and implement ICS/OT Patch based on the approved plan.
Expected deliverables:
• Cybersecurity policy that covers the requirements of the protection of ICS/OT
(e.g., electronic copy or official hard copy).
• ICS/OT Patch review report outlining the patch management procedures.
5-1-3-10 Cybersecurity applications management related to the protection of the
industrial systems from viruses and malware.
Control implementation guidelines
• Ensure the approved documented policy includes the requirements to manage
industrial cybersecurity programs for protection against viruses, suspicious
malware and malicious malware
• Identify the organization's ICS/OT and determine their criticality, in
accordance with the relevant laws and regulations.
• Identify appropriate technologies for protection against viruses, suspicious
malware and malicious malware, provided that they are approved by industrial
systems providers and manufacturers.
• Implement and develop antivirus and ma lware protection tools for industrial
systems based on the procedures of industrial systems providers and
manufacturers.
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 176,
"page_label": "177",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
178 Document Classification: Public TLP: White
• Review the tools for industrial systems protection against viruses and
suspicious malware and malicious malware periodically to ensure the
comprehensiveness of the protection tools.
• Develop procedures for the safe management of antivirus and suspicious
malware and malicious malware protection tools.
Expected deliverables:
• Cybersecurity policy that covers the requirements of the protection of ICS/OT
(e.g., electronic copy or official hard copy).
• Updated list of industrial systems protection against viruses, suspicious
malware and malicious malware.
• Reports on the update of p rotection against viruses, suspicious malware and
malicious malware.
5-1-4 The cybersecurity requirements related to Industrial Controls Systems and Operational
Technology (ICS/OT) must be reviewed periodically.
Control implementation guidelines
• Review and update the cybersecurity policy and requirements for ICS/OT in
the organization periodically according to a documented and approved plan
for review and based on a planned interval ( e.g., review must be conducted
annually) or in the event of changes in relevant laws and regulations. Document
the review and changes to the cybersecurity requirements for ICS/OT
protection in the organization and approve them by the head of the
organization or his/her deputy.
Expected deliverables:
• An approved document that sets the policy's review schedule
• Policy indicating that it is up to date and the changes to the cybersecurity
requirements for ICS/OT protection have been documented and approved by
the head of the organization or his/her deputy.
• Formal approval by the head of the organization or his/her deputy on the
updated policy ( e.g., via the organization's official e -mail, paper or electronic
signature).
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 177,
"page_label": "178",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
179 Document Classification: Public TLP: White
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 178,
"page_label": "179",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
180 Document Classification: Public TLP: White
|
{
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 179,
"page_label": "180",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.