There is hardly another topic that has picked up so much in recent years. Operational Technology (OT) systems that have been in operation for decades are suddenly in the focus of classic IT solutions, such as the call for a virus attack to patch an old process plant with the latest malware and the associated malware Challenges such as upgrades of control systems, re-qualification and business interruptions.
This is precisely where ITKP comes in by analyzing the security requirements from the point of view of automation experts, engineers who have broadened their expertise in the direction of IT and can “translate” into the language of the engineer.
ITKP’s cyber security experts support you in the following areas:
Engineers, logistics experts, laboratory experts (OT) and classic IT speak a similar language, using the same operating systems. Nevertheless, for example, configuration management means something completely different. IT thinks of a configuration “ITEM” in a database OT does not use the term “configuration management” or is integrated with change management.
ITKP has these differences and introduces a common language and Definition.
Core Areas
|
|
|
|
|
|
|
Security starts with the purchase of OT systems, either directly from the manufacturer of a control system or control system, or through the procurement of an automated packaging system. Of course, you can buy as much “security” as you like, or even worse, upgrade it accordingly after sourcing.
Core Areas
|
|
|
|
There are many standards in OT security, IEC 62443, to name perhaps the most well-known next to NIST. Here, requirements are defined for the various areas of the life cycle of an OT system. The trend, however, is towards certification of systems and service providers. ITKP is critical of pure certifications – because security can only be achieved in the interaction between system manufacturer, system integrator and operator.
There are different levels of participants in this cooperation – divisible into the maturity levels: Innocense, Awareness, Understanding, Competence and Excellence. Standards move towards excellence, our aim is to take into account the state of the customer and to adapt the assessment accordingly. We do not want to ask questions whose answers are already known, do not suggest solutions that bring more problems than benefits. We believe that in certain situations, malware protection can have the same negative impact as malware itself.
Core Areas
|
|
|
|
|
Core Areas
|
|
|
|
|
|
|
|