Low-level risk assessment for cybersecurity

The low-level risk assessment is a detailed analysis typically performed after a high-level risk assessment or, sometimes, conducted on specific plants in order to deeply assess the precise risk estimate of a cyber attack. In general, the low-level risk assessment focuses on the most sensitive equipment reported from the high-level risk assessment, and in relation to the potential most critical consequences of a cyber attack.

While the purpose of the high-level risk assessment is to macroscopically assess the potential consequences of an attack, the low-level risk assessment deepens the weakest parts of an industrial control system.

The low-level risks calculation is based on the following formula:

Risk = 〖Threat〗 Specific x 〖Vulnerability] (Exploitable〗 x 〖Consequences〗 Event

Technical standards for low-level risk assessment

The following table shows the technical standards within the IEC 62443 standard applicable to the low-level risk assessment:

Courtesy: H-ON Consulting

Courtesy: H-ON Consulting

Low-level risk assessment phases according to the IEC 62443

Low-level risk assessment is a microscopic quantification of the potential cyber risk affecting an industrial control system. This activity, according to the IEC 62443 scheme, is divided into three main phases:

1. Identification of the target asset, where the target asset is analyzed in terms of extension, technical characteristics, and device composition, by focusing on the existing vulnerabilities.

2. Network mapping and analysis, i.e. the application of potential threats to each subsystem and component by verifying their characteristics. This phase identifies all exploitable vulnerabilities through passive packet scans that analyze network traffic, unauthenticated scans, or authenticated scans, depending on whether the network is studied externally or internally, and, finally, agent-based scans through software.

3. Social engineering and access analysis, i.e. a targeted analysis of vulnerabilities that can be exploited by the human factor, with particular attention to the interventions of external personnel, generally in charge of ordinary and extraordinary maintenance of the infrastructures. This phase also considers the access controls on the perimeter security parts.

Starting from the data collected prior to the low-level risk assessment, i.e. along with the High Level Risk Assessment, our pool of ISA99/IEC62443 certified in-house specialists provides a complete set of services in compliance with the Cyber ​​Security Lifecycle defined by the IEC 62443 standard. Our proven expertise in industrial automation allows us to support our customers in all the phases of the low-level risk assessment described in the previous paragraph.

The low-level cybersecurity risk assessment service is divided into 4 phases:

  1. Vulnerability assessment, network mapping, social engineering, and access management analyses
  2. Low-level risk assessment (preliminary), i.e. the issue of a preliminary analysis report containing the results of the analyzes of the previous point
  3. Evaluation of the preliminary result of the analysis to be shared with the internal staff responsible for the security of the industrial control systems and discussion of the following actions to be planned
  4. Low-level risk analysis (final), where the detailed risk analysis is completed by providing the necessary information to the internal staff for the implementation of a remediation plan, ie a plan containing the most suitable mitigation measures.

– This article originally appeared on H-ON Consulting’s website. H-ON Consulting is a CFE Media content partner. Edited by Chris Vavra, web content manager, Control Engineering, CFE Media and Technology, cvavra@cfemedia.com.

The post Low-level risk assessment for cybersecurity appeared first on Control Engineering.

Read More

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

The Chip Shortage: Moore Than Potatoes

Next Post

Heat Pumps, Auxiliary Heat, and Resilience

Related Posts
Close Bitnami banner
Bitnami