Sale!

ISA TR99.00.01

Original price was: $110.00.Current price is: $55.00.

ANSI/ISA-99.00.01

This ISA technical report provides a current assessment ofvarious cyber security tools, mitigation counter-measures, andtechnologies that may effectively apply to the modernelectronically based IACSs regulating and monitoring numerousindustries and critical infrastructures. It describes severalcategories of control system-centric cyber security technologies;the types of products available in those categories; the pros andcons of using those products in the automated IACS environmentsrelative to the expected threats and known cyber vulnerabilities;and, most important, the preliminary recommendations and guidancefor using these cyber security technology products and/orcountermeasures.

The concept of IACS cyber security as applied in this ISAtechnical report is in the broadest possible sense, encompassingall types of components, plants, facilities, and systems in allindustries and critical infrastructures. IACSs include, but are notlimited to:

• Hardware (e.g., data historian servers) and software systems(e.g., operating platforms, configurations, applications) such asDistributed Control Systems (DCSs), Programmable Logic Controllers(PLCs), Supervisory Control and Data Acquisition (SCADA) systems,networked electronic sensing systems, and monitoring, diagnostic,and assessment systems. Inclusive in this hardware and softwaredomain is the essential industrial network and any connected orrelated information technology (IT) devices and links critical tothe successful operation to the control system at large. As such,this domain also includes, but is not limited to: firewalls,servers, routers, switches, gateways, fieldbus systems, intrusiondetection systems, intelligent electronic/end devices, remoteterminal units (RTUs), and both wired and wireless remotemodems.

• Associated internal, human, network, or machine interfacesused to provide control, data logging, diagnostics, safety,monitoring, maintenance, quality assurance, regulatory compliance,auditing and other types of operational functionality for eithercontinuous, batch, discrete, and combined processes.

Similarly, the concept of cyber security technologies andcountermeasures is also broadly applied in this ISA technicalreport and includes, but is not limited to, the followingtechnologies:

• Authentication and Authorization

• Filtering, Blocking, and Access Control

• Encryption

• Data Validation

• Auditing

• Measurement

• Monitoring and Detection Tools

• Operating Systems

In addition, a non-cyber technology—physical security control—isan essential requirement for some aspects of cyber security and isdiscussed in this report.

Purpose

The purpose of this ISA technical report is to categorize anddefine cyber security technologies, countermeasures, and toolscurrently available to provide a common basis for later technicalreports and standards to be produced by the ISA99 committee. Eachtechnology in this technical report is discussed in terms of:

• Security vulnerabilities addressed by the technology, tool,and/or countermeasure

• Typical deployment

• Known issues and weaknesses

• Assessment of use in the IACS environment

• Future directions

• Recommendations and guidance

• Information sources and reference material

The intent of this technical report is to document the knownstate of the art of cyber security technologies, tools, andcountermeasures applicable to the IACS environment, clearly definewhich technologies can reasonably be deployed today, and defineareas where more research may be needed.

Edition:
07
Published:
10/29/2007
ANSI:
ANSI Approved
Number of Pages:
82
File Size:
1 file , 390 KB

Reviews

There are no reviews yet.

Be the first to review “ISA TR99.00.01”

Your email address will not be published. Required fields are marked *

Shopping Cart
ISA TR99.00.01
Original price was: $110.00.Current price is: $55.00.