content
stringlengths
26
2.54k
metadata
dict
Guide to Essential Cybersecurity Controls (ECC) Implementation 173 Document Classification: Public TLP: White • Evidence of continuous monitoring of event logs ( e.g., the team that is approved and dedicated to monitoring and controlling these logs). 5-1-3-4 Isolation of Safety Instrumental Systems (SIS). Control implementation guidelines • Ensure that the approved documented policy includes requirements for the isolation of Safety Instrumented System. • All safety equipment systems in the organization must be defined. • Identify and assess the cyber risks associated with connecting Safety Instrumented Systems with other systems. • Isolate Safety Instrumented Systems from other systems based on the following: o Physical or logical isolation based on cyber risks and Safety Instrumented Systems guidelines and providers. o Type of isolation to be applied, including: ▪ Safety Instrumented Systems (SIS) isolation from engineering workstations ▪ Safety Instrumented Systems isolation from industrial systems ▪ Safety Instrumented Systems isolation from other networks Expected deliverables: • Cybersecurity policy that covers the requirements of the protection of ICS/OT (e.g., electronic copy or official hard copy). • Design plan of the approved Safety Instrumented Systems network (electronic copy or hard copy). 5-1-3-5 Strict limitation on the use of external storage media. Control implementation guidelines • Ensure that the approved documented policy includes requirements for restricted use of external storage media. • Configure systems and technologies to prevent the use of external storage media automatically. This may include: o Configure industrial systems protection techniques to prevent the use of external storage media automatically; or
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 172, "page_label": "173", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 174 Document Classification: Public TLP: White o Configure central service system (e.g., Active Directory) to prevent the use of external storage media automatically; or o Configure devices registry to prevent the use of external storage media automatically • Develop and approve procedures to use external storage media, (including, but not limited to, requesting approvals via e -mail, paper, or through an internal system). Such procedures include: o Reason for requesting approval for use. o Usage duration. • Define the mechanism for handling data stored in storage media to be inspected before use and erased after completion. Expected deliverables: • Cybersecurity policy that covers the requirements of the protection of ICS/OT (e.g., electronic copy or official hard copy). • Screenshot showing the restriction of the use of external storage media on industrial systems. • Procedures for restricting the use of external storage media on industrial systems, while proving the application of these procedures (e.g., procedures for approving use through emails, a hard copy or electronic copy of the use approval form). 5-1-3-6 Strict limitation on connecting mobile devices to industrial production networks. Control implementation guidelines • Ensure that the approved documented policy includes requirements for the restriction of mobile device connectivity to the industrial production network. • Identify, implement and control appropriate technologies for network access control. • Define appropriate and advanced technologies to authenticate mobile devices (e.g., RADIUS, MAC Authentication). • Ensure that the mobile devic es' connectivity to the industrial production network is not basically activated and that this connectivity is restricted if there is a need to activate it.
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 173, "page_label": "174", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 175 Document Classification: Public TLP: White • Develop and approve procedures to use mobile devices, (including, but not limited to, requesting ap provals via e -mail, paper, or through an internal system). Such procedures include: o Reason for requesting approval for use. o Usage duration. • Define the mechanism for handling data stored in mobile devices to be inspected before use and erased after completion. Expected deliverables: • Cybersecurity policy that covers the requirements of the protection of ICS/OT (e.g., electronic copy or official hard copy). • Screenshot showing the restriction of connectivity of mobile devices to industrial systems. • Procedures for restricting the connectivity of mobile devices to the industrial production network, while proving the application of these procedures ( e.g., procedures for approving potential connectivity through emails, a hard copy or electronic copy of the approval form). 5-1-3-7 Periodic review and secure configuration and hardening of industrial, automated, support systems, and devices. Control implementation guidelines • Ensure that the approved documented policy includes the requirements to periodically review the Secure Configuration and Hardening of industrial systems, support systems and industrial machinery. • Identify all industrial systems, support systems and industrial machinery in the organization. • Develop hardening standard controls for industrial systems, support systems, and industrial machinery in cooperation with system providers and manufacturers. • Document and implement an action plan to review Secure Configuration and Hardening of industrial systems, support systems and industrial machinery on a regular basis or using automated tools. • Work with the concerned departments to develop a corrective plan for configuration and hardening review results.
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 174, "page_label": "175", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 176 Document Classification: Public TLP: White Expected deliverables: • Cybersecurity policy that covers the requirements of the protection of ICS/OT (e.g., electronic copy or official hard copy). • Reports on the review of Secure Configuration and Hardening of industrial systems, support systems, and industrial machinery, indic ating their periodic application. 5-1-3-8 Vulnerability management for industrial control systems and operational technology (ICS/OT). Control implementation guidelines • Ensure that the approved documented policy includes the requirements for ICS/OT Vulnerability Management. • ICS in the organization must be defined. • Identify appropriate technologies for ICS/OT vulnerabilities assessment, provided that they are qualified by industrial systems providers and manufacturers. • Analyze the impact of the ICS/OT vulnerabilities assessment and determine whether it is invasive or non-invasive and develop a contingency plan. • Schedule and conduct vulnerabilities assessment based on the approved plan. • Work with the concerned departments to develop a plan to address vulnerabilities. Expected deliverables: • Cybersecurity policy that covers the requirements of the protection of ICS/OT (e.g., electronic copy or official hard copy). • ICS/OT Vulnerability review report, outlining the procedures used to manage vulnerabilities. 5-1-3-9 Patch management for industrial control systems and operational technology (ICS/OT). Control implementation guidelines
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 175, "page_label": "176", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 177 Document Classification: Public TLP: White • Ensure that the approved documented policy includes requirements for ICS/OT Patch Management. • Identify the organization's ICS/OT and determine their criticality, in accordance with the relevant laws and regulations. • Identify approved communication channels in the organization with the systems suppliers and manufacturers to know the latest security ICS/OT Patch. • Develop approved pro cedures and plans for the management of patches for industrial systems. • Analyze the impact of implementing patches on industrial systems while developing a contingency plan. • Work with the concerned departments to test patches according to the approved procedures. • Schedule and implement ICS/OT Patch based on the approved plan. Expected deliverables: • Cybersecurity policy that covers the requirements of the protection of ICS/OT (e.g., electronic copy or official hard copy). • ICS/OT Patch review report outlining the patch management procedures. 5-1-3-10 Cybersecurity applications management related to the protection of the industrial systems from viruses and malware. Control implementation guidelines • Ensure the approved documented policy includes the requirements to manage industrial cybersecurity programs for protection against viruses, suspicious malware and malicious malware • Identify the organization's ICS/OT and determine their criticality, in accordance with the relevant laws and regulations. • Identify appropriate technologies for protection against viruses, suspicious malware and malicious malware, provided that they are approved by industrial systems providers and manufacturers. • Implement and develop antivirus and ma lware protection tools for industrial systems based on the procedures of industrial systems providers and manufacturers.
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 176, "page_label": "177", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 178 Document Classification: Public TLP: White • Review the tools for industrial systems protection against viruses and suspicious malware and malicious malware periodically to ensure the comprehensiveness of the protection tools. • Develop procedures for the safe management of antivirus and suspicious malware and malicious malware protection tools. Expected deliverables: • Cybersecurity policy that covers the requirements of the protection of ICS/OT (e.g., electronic copy or official hard copy). • Updated list of industrial systems protection against viruses, suspicious malware and malicious malware. • Reports on the update of p rotection against viruses, suspicious malware and malicious malware. 5-1-4 The cybersecurity requirements related to Industrial Controls Systems and Operational Technology (ICS/OT) must be reviewed periodically. Control implementation guidelines • Review and update the cybersecurity policy and requirements for ICS/OT in the organization periodically according to a documented and approved plan for review and based on a planned interval ( e.g., review must be conducted annually) or in the event of changes in relevant laws and regulations. Document the review and changes to the cybersecurity requirements for ICS/OT protection in the organization and approve them by the head of the organization or his/her deputy. Expected deliverables: • An approved document that sets the policy's review schedule • Policy indicating that it is up to date and the changes to the cybersecurity requirements for ICS/OT protection have been documented and approved by the head of the organization or his/her deputy. • Formal approval by the head of the organization or his/her deputy on the updated policy ( e.g., via the organization's official e -mail, paper or electronic signature).
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 177, "page_label": "178", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 179 Document Classification: Public TLP: White
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 178, "page_label": "179", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 180 Document Classification: Public TLP: White
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 179, "page_label": "180", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }