Friday, April 29, 2016

ICS-CERT Adds ICS Whitelisting Guide to Site

This afternoon the DHS ICS-CERT (in coordination with the National Security Administration) published a new document on their web site that is designed to serve as an appendix to their “Seven Steps to Defend Industrial Control Systems” that was published last December. The six-page document is titled: “Guidelines for Application Whitelisting in Industrial Control Systems”.

Alert readers will recall that “Implement application whitelisting” was the first of the seven steps described briefly in the original paper. Where the concept of whitelisting was covered in just two paragraphs in the December paper, this document provides a much more detailed description of how whitelisting is used. This guideline document describes:

• AWL benefits;
• How AWL differs from and complements anti-virus;
• How AWL operates;
• Creating whitelists;
• AWL as a change control process verification tool;
• AWL limitations;
• Choosing a compatible AWL solution;
• Challenge of running AWL in some specialized environments;
• Protect administrator access;
• Managing an AWL system;

While this certainly is not a whitelisting text book (and at six pages, it was not intended to be) it does provide a detailed enough description of the whitelisting process to be valuable for process control engineers (and maybe more importantly IT specialists). At the same time, it is written at a general enough level that facility managers and C-Suite personnel in organizations with critical control systems should be expected to read the document.

While this guideline does make the point that whitelisting is only one part of a defense in depth security program, the authors did miss making an important point by not referring back to Figure 1 in the Seven Steps document. That document notes that in 2014 and 2015 ICS-CERT estimates that application whitelisting would have mitigated 38% of the ICS-CERT reported control system incidents.

An important addendum to this document is the list of references found on page 6. I particularly appreciate the links to the three NSA whitelisting documents. My only personal complaint is that ICS-CERT continues to use footnotes in their .PDF documents. I would prefer to see links put into the document where the document is referenced. That’s my personal preference, but at least they do have the links available.


I hope that this is just the first of seven appendix documents that ICS-CERT and NSA produce to support the Seven Steps publication.

No comments:

 
/* Use this with templates/template-twocol.html */