ICS.SecurityFramework® is a methodology developed by TI Safe that covers all levels of physical and logical security layers for industrial systems, and includes integrated protection for shop floor devices, SCADA, MES, ERP, PIMS and other industrial systems. Security components are installed according to the needs of each layer within security standards while respecting existing technology, and the entire system is integrated into a central operating environment where monitoring, prevention, threat isolation, and response are provided. incidents.
The Framework implements the best practices outlined in the ANSI / ISA-99 Cyber Security Management System (CSMS) and accelerates the cybersecurity compliance process by meeting the needs of IT and automation teams. ICS.SecurityFramework® occurs in a four-step continuous improvement cycle:
Risk Analysis exposes existing vulnerabilities and threats. It is the fundamental step to protect any facility.
The Industrial Cyber Security Plan guides how and when cyber security countermeasures should be implemented.
Organized in six domains, protection solutions establish controls with a focus on the resilience of automation networks.
Monitoring maintains and enhances the levels of security required for full business continuity through risk management and its technological countermeasures.
Protection Solutions are divided into six domains:
Governance and Monitoring
The industrial networks at their source were designed to operate with maximum availability, with little attention focused on cyber security. It is essential to implement governance and monitoring measures.
Edge Security aims to prevent unauthorized access and maintain the integrity of information flowing to and from the automation network.
Industrial Network Protection
Industrial networks and protocols require specific solutions to ensure cybersecurity without affecting the availability of factory floor systems.
Modern malware today is the main threat to industrial networks. Companies without complete solutions for infection control and prevention are constant victims of cyber attacks.
Recent reports on the stealing of sensitive data from global companies bring industrial espionage to the forefront of the discussion.
TI Safe Academy
In order to protect critical infrastructures it is necessary to know the risks to which networks and industrial systems are subjected, and the correct use of countermeasures according to the safety standards.