1660602370781 Cg1310covstrysteps

NIST Identifies Common Security Steps

Oct. 15, 2013
Common Themes on Cybersecurity Best Practices Have Emerged
About the Author

Jim Montague is the Executive Editor at Control, Control Design and Industrial Networking magazines. Jim has spent the last 13 years as an editor and brings a wealth of automation and controls knowledge to the position. For the past eight years, Jim worked at Reed Business Information as News Editor for Control Engineering magazine. Jim has a BA in English from Carleton College in Northfield, Minnesota, and lives in Skokie, Illinois.

Check Out Montague's Google+ profile.

One of the latest calls for better cybersecurity arrived in the form of the Obama Administration's Executive Order on Feb. 12, which assigned the National Institute of Standards and Technology (NIST) to develop a framework for improving critical-infrastructure cybersecurity. Likewise, NIST's draft framework includes a draft compendium of informative references, which reviewed more than 320 national and international standards, guidelines, directives, best practices, models, specifications, policies and regulations. Some of these organizations include: ANSI, ISA, NERC, API, ISO, IEC, NEI, NIST, NFPA, OIG, OLF, OPC, SANS, TIA and others.

Naturally, some common themes on cybersecurity best practices have emerged. "The basic cybersecurity process involves identifying critical assets, doing security risk assessments for them, deciding how the cybersecurity framework applies to them, and coming up a mitigation plan and actions to comply with it," explains Michael Martinez, CISA, principal in Invensys' Critical Infrastructure and Security Practice.

NIST's preliminary framework has five steps: know, prevent, detect, respond and recover:

  • Know means gaining the institutional understanding to identify what systems need to be protected, assessing their priority in light of the organization's mission, and managing processes to achieve cost effective risk management goals.
  • Prevent consists of categories of management, technical and operational activities, which enable the organization to decide on the appropriate outcome-based actions to ensure adequate protection against threats to business systems that support critical infrastructure components.
  • Detect includes activities that identify, through ongoing monitoring or other means of observation, the presence of undesirable cyber risk events, and the processes to assess the potential impact of those events.
  • Respond involves making specific risk-management decisions and enacting activities based on previously implemented cybersecurity planning, completed at the Prevent stage, relative to estimated impact.
  • Recover includes categories of management, technical and operational activities that restore services, which were previously impaired by an undesirable cybersecurity risk.

About the Author

Jim Montague | Executive Editor

Jim Montague is executive editor of Control. 

Sponsored Recommendations

Make Effortless HMI and PLC Modifications from Anywhere

The tiny EZminiWiFi is a godsend for the plant maintenance engineers who need to make a minor modification to the HMI program or, for that matter, the PLC program. It's very easy...

The Benefits of Using American-Made Automation Products

Discover the benefits of American-made automation products, including stable pricing, faster delivery, and innovative features tailored to real-world applications. With superior...

50 Years of Automation Innovation and What to Expect Next

Over the past 50 years, the automation technology landscape has changed dramatically, but many of the underlying industry needs remain unchanged. To learn more about what’s changed...

Manufacturing Marvels Highlights Why EZAutomation Is a Force to Be Reckoned With

Watch EZAutomation's recent feature on the popular FOX Network series "Manufacturing Marvels" and discover what makes them a force to be reckoned with in industrial automation...