Sky Breaker

Hacking Celestial Wisdom with Skill and Technique.

NIST

NIST SP 800-82を読んだメモ書き(6) Appendix C. Threat Sources, Vulnerabilities, and Incidents

C.1 Threat Sources C.2 Vulnerabilities and Predisposing Conditions C.2.1. Policy and Procedure Vulnerabilities and Predisposing Conditions C.2.2. System Vulnerabilities and Predisposing Conditions アーキテクチャおよび設計上の脆弱性 設定お…

NIST SP 800-82を読んだメモ書き(5) 6. Applying the Cybersecurity Framework to OT

6.1 Identify (ID) 6.1.1 Asset Management (ID.AM) 6.1.2 Governance (ID.GV) 6.1.3 Risk Assessment (ID.RA) 6.1.4 Risk Management Strategy (ID.RM) 6.1.5 Supply Chain Risk Management (ID.SC) 6.2 Protect (PR) 6.2.1 Identity Management and Access…

NIST SP 800-82を読んだメモ書き(4) 5. OT Cybersecurity Architecture

5.2 Defense-in-Depth Architecture Capabilities 5.2.2 Layer 2 – Physical Security 5.2.3 Layer 3 – Network Security 5.2.3.1 Network Architecture 5.4 Cybersecurity Architecture Models OT環境向けのセキュリティ管理策と推奨事項について、ふわっと…

NIST SP 800-82を読んだメモ書き(3) 4. Risk Management for OT Systems

4.1 Managing OT Security Risk 4.1.1 Framing OT Risk 4.1.2 Assessing Risk in an OT Environment 4.1.3 Responding to Risk in an OT Environment 4.1.4 Monitoring Risk in an OT Environment 4.2 Special Areas for Consideration 4.2.1 Supply Chain R…

NIST SP 800-82を読んだメモ書き(2) 3. OT Cybersecurity Program Development

3.1 Establish a Charter for the OT Cybersecurity Program 3.2 Business Case for the OT Cybersecurity Program 3.2.1 Benefits of Cybersecurity Investments 物理的影響(Physical impacts) 経済的影響(Economic impacts) 社会的影響(Social impacts) 3.…

NIST SP 800-82を読んだメモ書き(1) 2. OT Overview

アメリカのNISTが公開しているOTセキュリティに関するガイドラインを読みながら考えたメモ。 csrc.nist.gov このブログポストを見る前に、まずは実際にNIST SP 800-82を全文読んでいただきたい。 2. OT Overview 2.1 Evolution of OT 2.2 OT-Based Systems a…