A structured approach to enhance ICS cyber security

The key details and objectives of each of the cybersecurity domain is highlighted below:

Cybersecurity Program Management

A cybersecurity program is an integrated group of activities designed and managed to meet cybersecurity objectives for the organization and/or the function

Key objectives of the Cybersecurity Program Management Domain:

  1. Establish Cybersecurity Program Strategy
  2. Sponsor Cybersecurity Program
  3. Establish and Maintain
    Cybersecurity Architecture
  4. Perform Secure Software Development

Risk Management

Cybersecurity risk is one component of the overall business risk environment and cannot be completely eliminated. However, it can be managed through informed decision-making processes.

Key objectives of the Risk Management Domain:

  1. Establish Cybersecurity Risk Management Strategy
  2. Manage Cybersecurity Risk

Asset, Change and Configuration Management

An asset is something of value to an organization. It is critical to manage the organization’s IT & OT assets, including both hardware and software assets, as well as information essential to operating the function

Key objectives of the Asset, Change & Configuration Management Domain:

  1. Manage Asset Inventory
  2. Manage Asset Configuration
  3. Manage Change to Assets

Situational Awareness

Situational Awareness involves developing near real time knowledge of a dynamic operating environment. Rapid shifts among predetermined emergency operations can enable faster and more effective response to cybersecurity threats

Key objectives of the Situational Awareness Domain:

  1. Perform Logging
  2. Perform Monitoring
  3. Establish and maintain a Common Operating Picture

Identity and Access Management

Create and manage identities for entities that may be granted logical or physical access to the organization’s assets

Key objectives of the Identity and Access Management Domain:

  1. Establish and maintain identities
  2. Control Access

Incident Response, Continuity of operations

Any security incident could significantly affect critical infrastructure and organizational assets and services and require an effective response to limit adverse impacts.

Key objectives of the Threat & Vulnerability Management Domain:

  1. Identify and Respond to Threats
  2. Reduce Cybersecurity Vulnerabilities

Supply Chain and External Dependencies Management

As the interdependencies among infrastructures, operating partners, suppliers, service providers and customers increase, establishing and maintain a comprehensive understanding of key relationships and managing the associated risks is essential.

Key objectives of the Supply Chain & External Dependencies Management Domain:

  1. Identify Dependencies
  2. Management Dependency Risk

Threat and Vulnerability Management

Establish and maintain plans, procedures and technologies to detect, identify, analyse, manage and respond to cyber security threats and vulnerabilities

Key objectives of the Event and Incident Response, COP Domain:

  1. Detect Cybersecurity Events
  2. Escalate Cybersecurity Events and Declare Incidents
  3. Respond to Incidents and Escalated Cybersecurity Events
  4. Plan for Continuity

Information Sharing

The purpose of information sharing is to strengthen cybersecurity by establishing and maintaining a framework for interaction among utilities, as well as with the government

Key objectives of the Information Sharing & Communication Domain:

  1. Share Cybersecurity Information

Workforce Management

As utilities increasingly adopt advanced digital technology, workforce issues become a crucial aspect of successfully addressing cybersecurity and risk management

Key objectives of the Workforce Management Domain:

  1. Assign Cybersecurity Responsibilities
  2. Control the Workforce Life Cycle
  3. Develop Cybersecurity Workforce and increase Cybersecurity Awareness

Contact us

Siddharth Vishwanath

Partner and Leader, Cyber Security, PwC India

Tel: 022 66 691 559

Follow us