12
ICS Cybersecurity Threat Modeling Salem S. Elwi © Saudi Arabian Oil Company, 2020

ICS Cybersecurity Threat Modeling - ISASecure

  • Upload
    others

  • View
    15

  • Download
    1

Embed Size (px)

Citation preview

Page 1: ICS Cybersecurity Threat Modeling - ISASecure

ICS Cybersecurity

Threat Modeling

Salem S. Elwi

© Saudi Arabian Oil Company, 2020

Page 2: ICS Cybersecurity Threat Modeling - ISASecure

2

Saudi Aramco: Company General Use

Threat Modeling and Risk

Management

Value Realization

Future Value Maximization

Key Points

3

Page 3: ICS Cybersecurity Threat Modeling - ISASecure

3

Saudi Aramco: Company General Use

Risk Management Framework

Page 4: ICS Cybersecurity Threat Modeling - ISASecure

4

Saudi Aramco: Company General Use

ICS Cybersecurity Threat Model

Page 5: ICS Cybersecurity Threat Modeling - ISASecure

5

Saudi Aramco: Company General Use

ICS Threat Modeling Elements

Page 6: ICS Cybersecurity Threat Modeling - ISASecure

6

Saudi Aramco: Company General Use

ICS Threat Vectors Driven Risk Assessment

Page 7: ICS Cybersecurity Threat Modeling - ISASecure

7

Saudi Aramco: Company General Use

ICS Cyber Risk Assessment Process

Risk Management Process Applied Across the TiersNIST SP 800-39 Managing Information Security Risk, NIST, March 2019,

[https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-39.pdf].

Graphical view of elements of a

cyber security management systemIEC 62443-2-1:2010(E) Industrial communication networks –

Network and system security – Part 2-1: Establishing an

industrial automation and control system security Program,

IEC, 2010.

Page 8: ICS Cybersecurity Threat Modeling - ISASecure

8

Saudi Aramco: Company General Use

Risk Calculation – High Level Approach

Page 9: ICS Cybersecurity Threat Modeling - ISASecure

9

Saudi Aramco: Company General Use

Impact Rating

Page 10: ICS Cybersecurity Threat Modeling - ISASecure

10

Saudi Aramco: Company General Use

Sr

Management

GRC

Value Realization

• Limited automation

• No ICS standards such

as IEC 62443 and

C2M2

• No ICS process such as

Cyber PHA

• No ICS certificate

schemes such as

ISASecure

• No out-of-the-box

baseline config for ICS

• Vendors’ vetting

TechnologyPeople

Process

Page 11: ICS Cybersecurity Threat Modeling - ISASecure

11

Saudi Aramco: Company General Use

Future Value Maximization

Cybersecurity Big Data AI Based CybersecurityRisk Management

Page 12: ICS Cybersecurity Threat Modeling - ISASecure