0% found this document useful (0 votes)
208 views

Tekgem IACS Cyber Security Assessment

Find out how UK based Tekgem can provide a confidential and independent review of your current manufacturing infrastructure and cyber security, based on ISA99, IEC62443 & HSE Operational Guidelines OG-0086. This enables us to draft a comprehensive output summary report based on the findings.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
208 views

Tekgem IACS Cyber Security Assessment

Find out how UK based Tekgem can provide a confidential and independent review of your current manufacturing infrastructure and cyber security, based on ISA99, IEC62443 & HSE Operational Guidelines OG-0086. This enables us to draft a comprehensive output summary report based on the findings.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

IACS

Cyber Security
Health Check
Contents

04
02
About Tekgem
Health Check Report

03
IACS Cyber Security

05
Health Check
3.1 Scoping
3.2 Reporting

Health Check
Report Overview
5.1 Priority Rating
5.2 Fix Rating
Introduction 2

About Tekgem
Who we are
Tekgem bridges the gap between Information Technology (IT) and Operational
Technology (OT). Manufacturing and engineering companies come to us because
of our independent and highly specialised skillset in mitigating cyber-security
risks in industrial automation and control systems.

We act as an extension of our customer’s team to protect their critical


infrastructure, giving back control so they can focus on what they do best.

+44 (0)1642 062 109 [email protected] www.tekgem.co.uk


About your IACS Cyber Security Health Check 3

IACS Cyber Security


Health Check
3.1 Scoping
The IACS Cyber Security Health Check begins with a scoping session. This
involves time on-site speaking to your team and supervised access to your
infrastructure and systems.

For example, we may require access to your firewall configuration files to


access control rules. Similarly, we may access a sample of servers and
workstations to review access control, user accounts, endpoint protection,
patch levels etc.

3.2 Reporting
The purpose of these reports is to provide detailed findings from the scoping
session and the subsequent recommendations of the work required to meet
the specified industry standards.

The reports provide invaluable data and actionable recommendations, with a


traffic light system to help understand which of the recommendations should
take priority (see Section 3).

Tekgem use industry-recognised cyber security best practices, international


standards and specialised network analysis tools to accompany all reports.
About your IACS Cyber Security Health Check - Health Check Report 4

Your Health Check Report includes:

Policies & Procedures


Including any standards or frameworks you follow.

Network Access
Including routing, switching and firewalls.

Endpoint Protection
Including antivirus and associated technologies.

Electronic Identity
Including user accounts, security groups, access control.

Backup & Recovery


Including disaster recovery.

Removable Media
Including USB, CD, DVD and portable device connectivity.

Security Updates
Including patch levels.

System Administration
Including privileged accounts and centralized administration.

Physical Security
Including locations of equipment.

Human Factors
Including role & responsibilities, awareness and training.

Asset Management
Including life-cycle management, monitoring and reporting.

Risk Assessment
Including change control and incident management.

+44 (0)1642 062 109 [email protected] www.tekgem.co.uk


Health Check Report Overview 5

Health Check
Report Overview
Understanding your needs
Each recommendation identified in the IACS Cyber Security Health Check is rated
by priority and the effort required to fix the outstanding action. The overall rating
for each finding is calculated based on the priority and fix ratings.

5.1 Priority Rating


Each recommendation is given a priority rating, which is determined using the
criteria outlined in Table 1 (below)

Rating Description

High These findings pose a significant threat to security and can include a lack of
physical or electronic barriers to entry, misconfiguration of existing measures or
missing security measures.

Medium These findings have limitations on the direct impact they can cause. Typically,
these would include lack of / out of date documentation including procedures
and policies, lack of monitoring / maintenance of systems and / or lack of
routine activities and reporting.

Low These issues represent no direct security threat. Minimum requirements have
been met however there may be recommendations to further improve working
practices and/or knowledge/skillset.

5.2 Fix Rating


Each recommendation is given a fix rating, which is determined using the
criteria outlined in Table 2 (below).

Rating Description

Involved The resolution of this recommendation will require significant resources to


resolve and is likely to include disruption to some services, and possibly the
modification of device configurations.

Planned Meeting this recommendation involves planning, testing and could cause some
disruption to services.

Quick The recommendation is quick to resolve. Typically, this would just involve
changing a small number of settings and or creation of documentation and
would have little-to-no effect on services.

Many organisations have found these Health Checks extremely useful in


understanding the cyber-security vulnerabilities in their industrial automation
and process control systems, and are often shocked at the weaknesses we
uncover that have been going undetected.

+44 (0)1642 062 109 [email protected] www.tekgem.co.uk


Contact us to arrange your
IACS Cyber Security Health Check...
+44 (0)1642 062 109
[email protected]
www.tekgem.co.uk

You might also like