The EU’s cyber security agency, ENISA, has provided a new manual for better mitigating attacks on industrial control systems (ICS), supporting industrial processes primarily in the area of critical information infrastructure. As ICS are now often connected to Internet platforms, extra security preparations have to be taken. This new guide provides the necessary key considerations.
‘Good practice guide for CERTs in the area of Industrial Control Systems’ highlights the following points:
- While for traditional ICT systems the main priority is integrity, for ICS systems availability is the highest priority. This has to do with the fact that ICS are indispensable for the seamless operation of critical infrastructure.
- The main ICS actors sometimes do not have sufficient cyber-security expertise. Likewise, the established CERTs do not necessarily understand sector-specific technical aspects of ICS.
- Given the potential significant damage of ICSs, the hiring process for ICS-CERC teams requires staff to be vetted thoroughly, and consideration should be given to many things, for example, an individual’s ability to perform under pressure and response willingness during non-working hours.
- The importance of cooperation at both the domestic and international level must be recognised.
- The unique challenges of ICS cyber-security services can be mitigated by using identified good practices for CERTs, existing global and European experiences, and better exchange of good practices.
Read the guidance.
•Date: 4th December 2013 • Europe/ UK •Type: Article • Topic: Critical infrastructure protection

To submit news stories to Continuity Central,
e-mail the editor.
Want an RSS newsfeed for your website? Click
here |
|
|