ICS Cybersecurity


Latest projects

ICS Cybersecurity

Securing Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems is a program management effort.  To be successful it is a process that must be institutionalized, and it has to be part of the organizational culture.

CommTech Systems as a member of the International Society of Automation, follows ICS Cybersecurity process as outlined in the International Society for Automation / International Electrotechnical Commission (ISA/IEC) standard 62443, and the National Institute of Standards and Technology, Special Publication (NIST SP) 800-82 Guide to Industrial Control Systems (ICS) Cybersecurity.  What is common in these standards is an all hazards approach to system risk, and the need for a process that that encompasses strategies for risk identification, training, monitoring, system testing, and a feedback process focused on system security improvement.

Much of what these standards require are policy and procedures that are designed to secure the system and resilience.  Resilience is in terms of a continuity of operations, recovery, and a means to continually improve security.

In addition to the ISA/IEC and NIST standards there are also a host of industry specific standards some of these are listed below:

  • American Chemistry Council’s, Chemical Information Technology (ChemITC)™; Chemical Sector Cyber Security Program, Guidance for Addressing Cyber Security in the Chemical Industry Version 3.0

  • American Petroleum Institute; API Standard 1164 – SCADA Security

  • American Water Works Association (AWWA)

  • Security Practices for Operations and Maintenance, ANSI/AWWA G430-09

  • Standard for Risk and Resilience Management of Water and Wastewater Systems, J100 RAMCAP®
  • National Association of Regulatory Utility Commissioner (NARUC), Cybersecurity for State Regulators

  • North American Electric Reliability Council (NERC); NERC CIP-002 to CIP-009

  • US Department of Energy, Electricity Subsector Cybersecurity, DOE/OE-003

Leave a Reply