The Industrial Cybersecurity Controls Standard (ICCS) is a controls standard designed
ICCS is intended for critical infrastructure entities of any size, all of which revolve around Operational Technology (OT) environments. Operational environments have different goals, risks, architectures, organizational structure, and considerations than IT environments creating a need for a tailored approach. These OT environments encompass not only Windows-based systems but also various end devices...see more
There are multiple roads leading to Rome, meaning there are multiple ways to achieve the same outcome. ICCS is meant to provide platforms, tools, and high-level processes/best practices to help direct and guide OT organizations to be more secure. This is one person's opinion, with other tools, approaches, or best practices that may work just as well. Use what works for your organization, your goals, your risk,...see more
With each tool, an organization needs to minimally ensure the following:
An organization should build people, processes, and technology around each of the Critical Controls, so it has proper coverage. To establish a cybersecurity program centered around the CIS Critical Controls, the organization aligns its mission, goals, enabling functions, risk profile, and budget. The organization adopts a framework or standards (in this case CIS) to structure its cybersecurity program, identifies ...see more
ICCS provides OT organizations with a concise reference for cybersecurity tool and program guidance. It offers insights into selecting cybersecurity tools, along with best practices, considerations, and vendor-neutral guidance. Aligned with the CIS Top 18, it helps organizations meet essential cybersecurity requirements effectively.
CIS Critical Control: This column lists the CIS Critical Control from the CIS Top 18 OT Platform / Tool: This column lists out the cybersecurity platform/tool that meets the critical control. These are listed in alphabetical order to take away bias. These selections are based on an OT (Operational Technology) environment. High-level Considerations / Best Practices: This column lists out considerations,...see more
NIST CSF Function | CIS Critical Control | OT Platform/Tool | High-Level Consnisteration/Best Practices | Maturity-based Requirements |
---|---|---|---|---|
Inventory and Control of Software AssetsActively manage all software on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution. | Develop policies/procedures for conducting software inventory that includes who will manage the process, what tools will be used to aid in the process, and how these tools will be used. Determine what information requirements exist for inventory. This minimally include the following;
Determine if the tool selected meets requirements There are two main types of software inventory methodsPassive: Inventory data gathered by actively polling devices on the network. Additional data is introduced on the network to gather this data. Active: Inventory data most commonly collected by a SPAN port. No additional data is introduced on the network to gather this information. To meet this CIS requirement or Critical Control. Organizations will need to understand the software needed for operations and collect what software is currently being used by manually inventorying software or by using an automated solution, some of the popular solutions listed to the left. From here, deltas can be created between what is needed for operations and what software exists in the environment. From this baseline, Application Allowlist solutions can be used to prevent any additional software from running other than what is required for operations. Application Allowlist solutions have a very high RIO and should be high on the list when looking at implementing endpoint protection. Most application allowlist solutions allows the administrator to run the tool in audit mode. Audit mode or learning mode. Before running learning mode on end devices use a tool such as MalwareBytes to ensure no malware is added to the whitelist. After learning mode is complete to establish the list of known good software, put the whitelisting tool in enforce mode to block any added software. Additionally, organizations can enable software downloaded from authorized vendors. This eases the maintenance and number of helpdesk tickets, as it still allows users to install typical software they may need. Granted in a typical ICS environment needing additional client software on a continual basis is seldomly required. For Additional Guidance: |