09.05.2013 Views

Catalog of Control Systems Security: Recommendations for Standards Developers

Catalog of Control Systems Security: Recommendations for Standards Developers

Catalog of Control Systems Security: Recommendations for Standards Developers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2.4.20 Power Equipment and Power Cabling .............................................................. 23<br />

2.4.21 Physical Device Access <strong>Control</strong> ....................................................................... 24<br />

2.5 System and Services Acquisition ...................................................................................... 24<br />

2.5.1 System and Services Acquisition Policy and Procedures ................................. 24<br />

2.5.2 Allocation <strong>of</strong> Resources .................................................................................... 25<br />

2.5.3 Life-Cycle Support ........................................................................................... 25<br />

2.5.4 Acquisitions ...................................................................................................... 26<br />

2.5.5 <strong>Control</strong> System Documentation ........................................................................ 26<br />

2.5.6 S<strong>of</strong>tware License Usage Restrictions ............................................................... 27<br />

2.5.7 User-Installed S<strong>of</strong>tware .................................................................................... 28<br />

2.5.8 <strong>Security</strong> Engineering Principles ....................................................................... 28<br />

2.5.9 Outsourced <strong>Control</strong> System Services ............................................................... 29<br />

2.5.10 Developer Configuration Management ............................................................ 29<br />

2.5.11 Developer <strong>Security</strong> Testing .............................................................................. 30<br />

2.5.12 Supply Chain Protection ................................................................................... 31<br />

2.5.13 Trustworthiness ................................................................................................ 32<br />

2.5.14 Critical In<strong>for</strong>mation System Components ........................................................ 32<br />

2.6 Configuration Management .............................................................................................. 33<br />

2.6.1 Configuration Management Policy and Procedures ......................................... 33<br />

2.6.2 Baseline Configuration ..................................................................................... 34<br />

2.6.3 Configuration Change <strong>Control</strong> ......................................................................... 35<br />

2.6.4 Monitoring Configuration Changes .................................................................. 36<br />

2.6.5 Access Restrictions <strong>for</strong> Configuration Change ................................................. 36<br />

2.6.6 Configuration Settings ...................................................................................... 37<br />

2.6.7 Configuration <strong>for</strong> Least Functionality .............................................................. 38<br />

2.6.8 Configuration Assets ........................................................................................ 39<br />

2.6.9 Addition, Removal, and Disposal <strong>of</strong> Equipment .............................................. 40<br />

2.6.10 Factory Default Authentication Management .................................................. 40<br />

2.6.11 Configuration Management Plan ...................................................................... 41<br />

2.7 Strategic Planning ............................................................................................................. 42<br />

2.7.1 Strategic Planning Policy and Procedures ........................................................ 42<br />

2.7.2 <strong>Control</strong> System <strong>Security</strong> Plan ........................................................................... 43<br />

2.7.3 Interruption Identification and Classification ................................................... 43<br />

2.7.4 Roles and Responsibilities ................................................................................ 44<br />

2.7.5 Planning Process Training ................................................................................ 45<br />

2.7.6 Testing .............................................................................................................. 45<br />

2.7.7 Investigation and Analysis ................................................................................ 46<br />

2.7.8 Corrective Action ............................................................................................. 46<br />

2.7.9 Risk Mitigation ................................................................................................. 46<br />

2.7.10 System <strong>Security</strong> Plan Update ........................................................................... 47<br />

2.7.11 Rules <strong>of</strong> Behavior ............................................................................................. 47<br />

2.7.12 <strong>Security</strong>-Related Activity Planning .................................................................. 48<br />

2.8 System and Communication Protection ............................................................................ 48<br />

2.8.1 System and Communication Protection Policy and Procedures ....................... 48<br />

2.8.2 Management Port Partitioning .......................................................................... 49<br />

2.8.3 <strong>Security</strong> Function Isolation ............................................................................... 50<br />

2.8.4 In<strong>for</strong>mation in Shared Resources ..................................................................... 50<br />

2.8.5 Denial-<strong>of</strong>-Service Protection ............................................................................ 51<br />

2.8.6 Resource Priority .............................................................................................. 51<br />

2.8.7 Boundary Protection ......................................................................................... 52<br />

viii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!