09.05.2013 Views

Catalog of Control Systems Security: Recommendations for Standards Developers

Catalog of Control Systems Security: Recommendations for Standards Developers

Catalog of Control Systems Security: Recommendations for Standards Developers

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

EXECUTIVE SUMMARY<br />

This catalog presents a compilation <strong>of</strong> practices that various industry bodies<br />

have recommended to increase the security <strong>of</strong> control systems from both physical<br />

and cyber attacks. The recommendations in this catalog are grouped into 19<br />

families, or categories, that have similar emphasis. The recommendations within<br />

each family are displayed with a summary statement <strong>of</strong> the recommendation,<br />

supplemental guidance or clarification, and a requirement enhancements<br />

statement providing augmentation <strong>for</strong> the recommendation under special<br />

situations.<br />

This catalog is not limited <strong>for</strong> use by a specific industry sector. All sectors<br />

can use it to develop a framework needed to produce a sound cybersecurity<br />

program. The number <strong>of</strong> new and updated published Cyber <strong>Security</strong> <strong>Standards</strong><br />

and guidelines has increased significantly this past year. An attempt has been<br />

made to reference and include the best practices introduced by these new and<br />

updated documents to interested users <strong>for</strong> consideration as input into individual<br />

industrial cybersecurity plans under development and review. This catalog should<br />

be viewed as a collection <strong>of</strong> guidelines and recommendations to be considered<br />

and judiciously employed, as appropriate, when reviewing and developing<br />

cybersecurity standards <strong>for</strong> control systems. The recommendations in this catalog<br />

are intended to be broad enough to provide any industry using control systems<br />

the flexibility needed to develop sound cybersecurity standards specific to their<br />

individual security needs. These recommendations are subservient to existing<br />

legal rules and regulations pertaining to specific industry sectors, and the user is<br />

urged to consult and follow those applicable regulations.<br />

v

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!