09.05.2013 Views

Catalog of Control Systems Security: Recommendations for Standards Developers

Catalog of Control Systems Security: Recommendations for Standards Developers

Catalog of Control Systems Security: Recommendations for Standards Developers

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.10.9 Non-Local (Remote) Maintenance ................................................................... 77<br />

2.10.10 Timely Maintenance ......................................................................................... 78<br />

2.11 <strong>Security</strong> Awareness and Training ..................................................................................... 78<br />

2.11.1 <strong>Security</strong> Awareness and Training Policy and Procedures ................................ 79<br />

2.11.2 <strong>Security</strong> Awareness .......................................................................................... 79<br />

2.11.3 <strong>Security</strong> Training .............................................................................................. 80<br />

2.11.4 <strong>Security</strong> Training Records ................................................................................ 81<br />

2.11.5 Contact with <strong>Security</strong> Groups and Associations .............................................. 81<br />

2.11.6 <strong>Security</strong> Responsibility Testing ........................................................................ 81<br />

2.12 Incident Response ............................................................................................................. 82<br />

2.12.1 Incident Response Policy and Procedures ........................................................ 82<br />

2.12.2 Continuity <strong>of</strong> Operations Plan .......................................................................... 83<br />

2.12.3 Continuity <strong>of</strong> Operations Roles and Responsibilities ....................................... 83<br />

2.12.4 Incident Response Training .............................................................................. 84<br />

2.12.5 Continuity <strong>of</strong> Operations Plan Testing ............................................................. 84<br />

2.12.6 Continuity <strong>of</strong> Operations Plan Update .............................................................. 85<br />

2.12.7 Incident Handling ............................................................................................. 85<br />

2.12.8 Incident Monitoring .......................................................................................... 86<br />

2.12.9 Incident Reporting ............................................................................................ 86<br />

2.12.10 Incident Response Assistance ........................................................................... 87<br />

2.12.11 Incident Response Plan ..................................................................................... 88<br />

2.12.12 Corrective Action ............................................................................................. 89<br />

2.12.13 Alternate Storage Sites ..................................................................................... 89<br />

2.12.14 Alternate Command/<strong>Control</strong> Methods ............................................................. 90<br />

2.12.15 Alternate <strong>Control</strong> Center .................................................................................. 91<br />

2.12.16 <strong>Control</strong> System Backup .................................................................................... 91<br />

2.12.17 <strong>Control</strong> System Recovery and Reconstitution .................................................. 92<br />

2.12.18 Fail-Safe Response ........................................................................................... 93<br />

2.13 Media Protection ............................................................................................................... 93<br />

2.13.1 Media Protection Policy and Procedures .......................................................... 93<br />

2.13.2 Media Access .................................................................................................... 94<br />

2.13.3 Media Classification ......................................................................................... 95<br />

2.13.4 Media Marking ................................................................................................. 95<br />

2.13.5 Media Storage ................................................................................................... 96<br />

2.13.6 Media Transport ............................................................................................... 97<br />

2.13.7 Media Sanitization and Disposal ...................................................................... 98<br />

2.14 System and In<strong>for</strong>mation Integrity ..................................................................................... 98<br />

2.14.1 System and In<strong>for</strong>mation Integrity Policy and Procedures ................................ 99<br />

2.14.2 Flaw Remediation ............................................................................................. 99<br />

2.14.3 Malicious Code Protection ............................................................................. 100<br />

2.14.4 System Monitoring Tools and Techniques ..................................................... 101<br />

2.14.5 <strong>Security</strong> Alerts and Advisories and Directives ............................................... 103<br />

2.14.6 <strong>Security</strong> Functionality Verification ................................................................ 104<br />

2.14.7 S<strong>of</strong>tware and In<strong>for</strong>mation Integrity ................................................................ 104<br />

2.14.8 Spam Protection .............................................................................................. 105<br />

2.14.9 In<strong>for</strong>mation Input Restrictions ........................................................................ 106<br />

2.14.10 In<strong>for</strong>mation Input Validation .......................................................................... 106<br />

2.14.11 Error Handling ................................................................................................ 107<br />

2.14.12 In<strong>for</strong>mation Output Handling and Retention .................................................. 107<br />

2.14.13 Predictable Failure Prevention ........................................................................ 108<br />

x

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!