The industrial control system cyber defence triage process
Cook, Allan; Janicke, Helge; Smith, Richard; Maglaras, Leandros
Prof Leandros Maglaras L.Maglaras@napier.ac.uk
The threat to Industrial Control Systems (ICS) from cyber attacks is widely acknowledged by governments and literature. Operators of ICS are looking to address these threats in an effective and cost-sensitive manner that does not expose their operations to additional risks through invasive testing. Whilst existing standards and guidelines offer comprehensive advice for reviewing the security of ICS infrastructure, resource and time limitations can lead to incomplete assessments or undesirably long countermeasure implementation schedules.
In this paper we consider the problem of undertaking efficient cyber security risk assessments and implementing mitigations in large, established ICS operations for which a full security review cannot be implemented on a constrained timescale. The contribution is the Industrial Control System Cyber Defence Triage Process (ICS-CDTP). ICS-CDTP determines areas of priority where the impact of attacks is greatest, and where initial investment reduces the organisation's overall exposure swiftly. ICS-CDTP is designed to be a precursor to a wider, holistic review across the operation following established security management approaches. ICS-CDTP is a novel combination of the Diamond Model of Intrusion Analysis, the Mandiant Attack Lifecycle, and the CARVER Matrix, allowing for an effective triage of attack vectors and likely targets for a capable antagonist. ICS-CDTP identifies and focuses on key ICS processes and their exposure to cyber threats with the view to maintain critical operations. The article defines ICS-CDTP and exemplifies its application using a fictitious water treatment facility, and explains its evaluation as part of a large-scale serious game exercise.
Cook, A., Janicke, H., Smith, R., & Maglaras, L. (2017). The industrial control system cyber defence triage process. Computers and Security, 70, 467-481. https://doi.org/10.1016/j.cose.2017.07.009
|Journal Article Type||Article|
|Acceptance Date||Jul 15, 2017|
|Online Publication Date||Jul 24, 2017|
|Deposit Date||Dec 8, 2022|
|Journal||Computers & Security|
|Peer Reviewed||Peer Reviewed|
|Keywords||ICS, SCADA, Cyber, Security, Triage, Risk|
You might also like
An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks
Human behaviour as an aspect of cybersecurity assurance