There is an interesting new link near the top of the ICS-CERT landing page that leads to a
page that I have never seen before, but that is probably not new; About
the Industrial Control Systems Cyber Emergency Response Team. It provides
an overview of the ICS-CERT mission within the DHS National Protection and
Programs Directorate.
The page outlines the ICS-CERT role in the DHS strategy for
securing control systems. It lists six key responsibilities:
• Responding to and analyzing
control systems-related incidents;
• Conducting vulnerability,
malware, and digital media analysis;
• Providing onsite incident
response services;
• Providing situational awareness
in the form of actionable intelligence;
• Coordinating the responsible
disclosure of vulnerabilities and associated mitigations; and
• Sharing and coordinating vulnerability information
and threat analysis through information products and alerts.
It also provides links to a number of interesting (if
severely dated) supporting documents, including:
• Strategy
for Securing Control Systems (dated October 2009);
• NCCIC/ICS-CERT
Acronyms List; and
In many ways the last document may be the most valuable if
more people, particularly legislators and regulators, would use it. It would
make talking about cybersecurity issues much easier. I’ll highlight three of
the key definitions here; only two of which I like (guess which ones – grin):
Cyber Incident - An occurrence that
actually or potentially results in adverse consequences to an information system
or the information that the system processes, stores, or transmits and that may
require a response action to mitigate the consequences.
Cyber System - Any combination of
facilities, equipment, personnel, procedures, and communications integrated to
provide cyber services; examples include business systems, control systems, and
access control systems.
Cybersecurity - The full range of
threat reduction, vulnerability reduction, deterrence, international
engagement, incident response, resiliency, and recovery policies and
activities, including computer network operations, information assurance, law enforcement,
diplomacy, military, and intelligence missions as they relate to the security
and stability of the global information and communications infrastructure.
The one thing missing from this collection of information
about ICS-CERT is some sort of fact sheet on the vulnerability disclosure
process that outlines the process, procedures and ICS-CERT policies on the
topic. I think that this would be a valuable addition to the page.
One other complaint that I have with the information
presented here (and across most of the DHS web sites) is there is a real lack
of information dating. It is hard to tell what information is dated and what
information is new. This is particularly important when the organization
updates the pages.
No comments:
Post a Comment