ICS-SCADA Security

  1. Industrial Control System Security Standards and Frameworks
    1. ISA/IEC 62443 Industrial Automation and Control Systems Security
      1. Series Overview and Structure
        1. Standard Development History
          1. International Harmonization Efforts
            1. Industry Adoption Status
            2. 62443-1 Foundational Concepts and Models
              1. Terminology and Definitions
                1. Security Level Concepts
                  1. Zone and Conduit Model
                    1. Risk Assessment Methodology
                    2. 62443-2 Policies and Procedures
                      1. Security Program Management
                        1. Risk Assessment Processes
                          1. Security Lifecycle Management
                            1. Incident Response Planning
                            2. 62443-3 System Security Requirements
                              1. System Design Security Requirements
                                1. Security Control Implementation
                                  1. Security Level Achievement
                                    1. Risk Assessment and Management
                                    2. 62443-4 Component Security Requirements
                                      1. Product Development Security Requirements
                                        1. Secure Component Design Principles
                                          1. Security Testing and Validation
                                            1. Vulnerability Disclosure Processes
                                          2. NIST Cybersecurity Framework Application
                                            1. Framework Core Function Implementation
                                              1. Identify Function Activities
                                                1. Protect Function Controls
                                                  1. Detect Function Capabilities
                                                    1. Respond Function Procedures
                                                      1. Recover Function Processes
                                                      2. ICS-Specific Framework Application
                                                        1. OT Environment Considerations
                                                          1. Risk Management Integration
                                                            1. Maturity Assessment Methods
                                                            2. NIST Special Publication 800-82
                                                              1. ICS Security Guidance
                                                                1. Risk Management Recommendations
                                                                  1. Security Control Selection
                                                                    1. Implementation Best Practices
                                                                  2. North American Electric Reliability Corporation Standards
                                                                    1. Critical Infrastructure Protection Standards
                                                                      1. CIP Standard Development Process
                                                                        1. Applicability Determination
                                                                          1. Compliance and Enforcement
                                                                          2. Key CIP Standard Requirements
                                                                            1. Asset Identification and Classification
                                                                              1. Security Management Controls
                                                                                1. Personnel and Training Requirements
                                                                                  1. Electronic Security Perimeters
                                                                                    1. Physical Security Controls
                                                                                      1. System Security Management
                                                                                        1. Incident Reporting and Response
                                                                                          1. Recovery Planning
                                                                                            1. Configuration Change Management
                                                                                              1. Vulnerability Assessments
                                                                                            2. MITRE ATT&CK for ICS Framework
                                                                                              1. Tactics and Techniques Matrix
                                                                                                1. Initial Access Techniques
                                                                                                  1. Execution Methods
                                                                                                    1. Persistence Mechanisms
                                                                                                      1. Privilege Escalation
                                                                                                        1. Defense Evasion
                                                                                                          1. Credential Access
                                                                                                            1. Discovery Techniques
                                                                                                              1. Lateral Movement
                                                                                                                1. Collection Methods
                                                                                                                  1. Command and Control
                                                                                                                    1. Inhibit Response Function
                                                                                                                      1. Impair Process Control
                                                                                                                        1. Impact Techniques
                                                                                                                        2. Threat Modeling Applications
                                                                                                                          1. Attack Path Analysis
                                                                                                                            1. Security Control Gap Assessment
                                                                                                                              1. Red Team Exercise Planning
                                                                                                                                1. Detection Rule Development