Industrial ICS/OT Cybersecurity A to Z as per NIST 800-82
- Description
- Curriculum
- FAQ
- Reviews
Industrial cybersecurity based on the NIST guidelines. OT is critical to the operation of critical infrastructures, which are often highly interconnected, mutually dependent systems. It is important to note that while federal agencies operate many of the nation’s critical infrastructures, many others are privately owned and operated.
This course is created after thoroughly understanding and practically implementing in the OT environment, so this 6-hour course is summarised version of the NIST 800-82 standard. It will help to understand what it contains and how it should be understood. So, following are the basic topics which we will cover in this course:
1. OT Overview: DCS/PLC/PLC/BACS/PACS
2. About Cybersecurity program development
3. Risk Management for OT systems
4. OT Cybersecurity Architecture
5. Cybersecurity Framework
6. OT Security capabilities and tools
After finishing this course, you will have following understanding:
1. Good grasp of NIST 800-82 Standard
2. What technologies are required for securing a OT infrastructure.
3. What is cybersecurity framework
4. What to do to achieve defense in depth architecture
5. Why cybersecurity program is required and how to set up
6. Feel confident about referring standards in professional discussions
7. Will help in cracking interviews
This course provides guidance for establishing secure operational technology (OT) while addressing OT’s unique performance, reliability, and safety requirements. OT encompasses a broad range of programmable systems and devices that interact with the physical environment (or manage devices that interact with the physical environment). These systems and devices detect or cause a direct change through monitoring and/or control of devices, processes, and events.
-
2OT Based system and their interdependenciesVideo lesson
Will learn about types of OT systems and there interdependencies, also will see one use case of interdependent system.
-
3SCADA SystemsVideo lesson
About basic network and communication of SCADA systems.
-
4Distributed Control SystemsVideo lesson
This chapter includes details of DCS and its basic communication architecture.
-
5Programmable Logic Controller Based TopologiesVideo lesson
This chapter includes details of PLC and its basic communication architecture.
-
6Building Automation SystemsVideo lesson
This chapter includes details of BACS and its basic communication architecture.
-
7Physical Access Control SystemsVideo lesson
This chapter includes details of physical access control system and its basic communication architecture.
-
8Safety SystemsVideo lesson
In this chapter we will learn about SIS and Safety Systems
-
9Industrial Internet of ThingsVideo lesson
This chapter includes details of IIOT and its basic communication architecture.
-
10OT Cybersecurity ProgramVideo lesson
To mitigate cybersecurity risk to their OT systems, organizations need to develop and deploy an OT cybersecurity program. We will learn bout program.
-
11Establish Charter for OT Cybersecurity programVideo lesson
A charter for a cybersecurity program is a plain-language high-level description that establishes clear ownership and accountability for protecting the OT resources . We will learn about charter.
-
12Benefits of OT Cybersecurity ProgramVideo lesson
What are benefits of cybersecurity program? Lets learn!
-
13OT Cybersecurity Program ContentVideo lesson
Learn about contents of a cybersecurity program.
-
14Managing OT Security RiskVideo lesson
The risk management process and framework outlined in this section can be applied to managing safety, information security, and cyber supply chain risk. Lets learn about it.
-
15Framing OT RiskVideo lesson
We will learn about framing cybersecurity risk!
-
16Assessing RiskVideo lesson
We will learn about the assessing risk.
-
17Responding to RiskVideo lesson
How to respond the cybersecurity incident, that we will learn in this chapter.
-
18Monitoring RiskVideo lesson
-
19Applying Risk Management FrameworkVideo lesson
In this chapter we will learn about application of risk management in the OT cybersecurity enviroment.
-
20PrepareVideo lesson
Lets see what is prepare pahse!
-
21CategorizeVideo lesson
Now once we are prepared , lets move to categorize!!
-
22SelectVideo lesson
Time to select the initial set of cybersecurity controls for implementation in the OT enviroment
-
23ImplementVideo lesson
Time to implement the selected controls!
-
24AssessVideo lesson
Now assess again what is working what is not!
-
25AuthorizeVideo lesson
Authorisation is required for all the activities, lets learn about it!
-
26MonitorVideo lesson
Continuous monitoring is required for continuous improvent in the risk management.
-
27Defense in Depth ArchitectureVideo lesson
We will leanr about, what is defense in depth and how it can be done.
-
28Layer-1 Security ManagementVideo lesson
We will learn about Layer 1 security requirements.
-
29Layer-2 Physical SecurityVideo lesson
We will learn about the Layer 2 requirements for defense in depth architecture.
-
30Layer-3 Network SecurityVideo lesson
We will learn about the Layer 3 requirements for defense in depth architecture.
-
31Network ArchitectureVideo lesson
We will learn about the Layer 3 requirements for defense in depth architecture.
-
32Centralized LoggingVideo lesson
We will learn about the central logging requirements for defense in depth architecture.
-
33Network MonitoringVideo lesson
We will learn about the network monitoring for defense in depth architecture.
-
34Zero trust architectureVideo lesson
We will learn about the Zero trust architecture.
-
35Layer-4 Hardware SecurityVideo lesson
We will learn about the Layer 4 requirements for defense in depth architecture.
-
36Layer-5 Software SecurityVideo lesson
We will learn about the Layer 5 requirements for defense in depth architecture.
-
37Additional ConsiderationsVideo lesson
We will learn about the additional consideration requirements for defense in depth architecture.
-
38Distributed Control System (DCS)-Based OT SystemsVideo lesson
We will learn about the the transformation of DCS architecture with defense in depth principles.
-
39DCS/PLC-Based OT with IIoTVideo lesson
We will learn about the the transformation of DCS /PLC architecture with defense in depth principles.
-
40SCADA-Based OT EnvironmentsVideo lesson
We will learn about the the transformation of SCADA architecture with defense in depth principles.
-
41IdentifyVideo lesson
The Identify Function provides foundational activities to effectively use the CSF. The intended outcome of the Identify Function is to develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities We will learn about it in this chapter and subsegments.
-
42Asset Management (ID.AM)Video lesson
This chapter includes the Identification of assets
-
43Governance (ID.GV)Video lesson
Effective governance involves organization leadership incorporating risk management objectives along with resiliency, privacy, and cybersecurity objectives into the strategic planning process and providing the required resources to effectively implement and sustain the cybersecurity program.
-
44Risk Assessment (ID.RA)Video lesson
We will learn about risk assessment in this chapter.
-
45Risk Management strategy (ID.RM)Video lesson
-
46Supply Chain Risk Management (ID.SC)Video lesson
It about supply chain risk management.
-
47ProtectVideo lesson
This chapter contains details about protect domain.
-
48Identity Management and Access Control (PR.AC)Video lesson
Identity Management and Access Control (PR.AC) identifies outcomes around establishing and managing the identification mechanisms and credentials for users, devices, and services.
-
49Logical Access Controls (PR.AC)Video lesson
We will learn about Logical access in protect segment.
-
50Physical Access Controls (PR.AC-2)Video lesson
We will learn about the physical access control requirement
-
51Network Segmentation and Isolation (PR.AC-5)Video lesson
When properly configured, network segmentation supports enforcing security policies and segmented traffic at the Ethernet layer and facilitates network isolation. Lets learn about it.
-
52User, Device, and Asset Authentication (PR.AC-7Video lesson
Will study about the user, device and asset authentication requiremnet and technical details.
-
53Awareness and Training (PR.AT)Video lesson
The Awareness and Training category provides policy and procedures for ensuring that all users are provided basic cybersecurity awareness and training.
-
54Data Security (PR.DS)Video lesson
Providing data security includes protecting the confidentiality, integrity, and availability of data-at-rest and data-in-transit, protecting assets after removal, and preventing data leaks.
-
55Information Protection Processes and Procedures (PR.IP)Video lesson
Policies, processes, and procedures should be maintained and used to manage protection of information systems and assets
-
56Least Functionality (PR.IP1)Video lesson
-
57Configuration Change Control (Configuration Management) (PR.IP-3)Video lesson
Configuration management helps ensure that systems are deployed and maintained in a secure and consistent state, allowing organizations to reduce risks from outages due to configuration issues and security breaches through improved visibility and tracking of changes to the system. Lets learn about it.
-
58Backups (PR.IP-4)Video lesson
Conducting, maintaining, and testing backups is a critical outcome for the recovery process if a cyber or reliability incident occurs.
-
59Physical Operating Environment (PR.IP-5)Video lesson
Learn about managing the physical operating environment
-
60Response and Recovery Plans (PR.IP-9) and Response and Recovery Plan TestingVideo lesson
Lets learn about how organizations should develop and maintain response plans, including incident response and
business continuity.
-
61Maintenance (PR.MA)Video lesson
Maintenance tracking solutions enable an organization to schedule, track, authorize, monitor, and audit maintenance and repair activities to OT, ensuring maintenance logs or changes performed are properly documented.
-
62Protective Technology (PR.PT)Video lesson
Lets learn about technical mechanisms assist organizations with protecting the devices
-
63DetectVideo lesson
The Detect function enables the timely discovery of cybersecurity events by ensuring appropriate activities are developed and implemented.
-
64Anomalies and Events (DE.AE)Video lesson
Learn and understand the different events and anomalies
-
65Security Continuous Monitoring (DE.CM)Video lesson
Continuous monitoring is quite vital, lets learn about it.
-
66Network Monitoring (DE.CM-1Video lesson
Network monitoring as continuous monitoring tool!
-
67System Use Monitoring (DE.CM-1 and DE-CM-3)Video lesson
-
68Malicious Code Detection (DE.CM-4)Video lesson
Malicious code detection solution is required for OT security, lets learn about it.
-
69Vulnerability Scanning (DE.CM-8)Video lesson
Vulnerability scanning gives us view of latest vulnerabilities and we can fill that gap!
-
70Detection Process (DE.DP)Video lesson
So over all detection is a process, lets document it!
-
71RespondVideo lesson
For detected events we need a proper response plan, lets see what it is!
-
72Response Planning (RS.RP)Video lesson
When responding to events, organizations should attempt to capture details associated with executing the documented response plans.
-
73Response Communications (RS.CO)Video lesson
Need to understand response communications and respective role whom need to communicate.
-
74Response Analysis (RS.AN)Video lesson
Analyses of cybersecurity incidents are conducted to ensure effective response and recovery activities, consistent with the detection process and the response plan
-
75Response Mitigation (RS.MI)Video lesson
Response mitigation is necessary against any OT incident, lets see mitigation activties.
-
76Response Improvements (RS.IM)Video lesson
Organizational response activities are improved by incorporating lessons learned from current and previous detection and response activities
-
77RecoverVideo lesson
Recovery is crucial after the incident , so this essential component.
-
78Recovery Planning/Improvements/CommunicationVideo lesson
Planning for recovery is very important for an organisation, so that in case of emergency they can execute the plan.
-
79Segmentation-FirewallVideo lesson
ABout firewall and type of firewall.
-
80Segmentation-Unidirectional GatewaysVideo lesson
Have you heard about datadiode, lets learn!
-
81Segmentation-VLANVideo lesson
Everyone knows VLAN, so just revise it!
-
82Segmentation-Software Defined NetworkingVideo lesson
What is software define networking? How it works?
-
83Network Monitoring/SIEM-BAD/DLPVideo lesson
Anomaly detection? Data loass prevention: Lets learn!
-
84Network Monitoring/SIEM-Deception & Digital TwinVideo lesson
Learn about network monitoring and deception technologies?
-
85Data Security- Immutable storage/HashingVideo lesson
Lets continue learning data security!
-
86Data Security-Digital Signatures/Remote AccessVideo lesson
We can use digital signatures as well for security requiremnet and validation!
External Links May Contain Affiliate Links read more