Determining the Target Security Level for Automated Security Risk Assessments

被引:4
作者
Ehrlich, Marco [1 ]
Broring, Andre [1 ]
Diedrich, Christian [2 ]
Jasperneite, Jurgen [3 ]
Kastner, Wolfgang [4 ]
Trsek, Henning [1 ]
机构
[1] Tech Hsch OWL, Inst Ind IT inIT, D-32657 Lemgo, Germany
[2] Otto Von Guericke Univ, Inst Automatisierungstech, D-39106 Magdeburg, Germany
[3] Fraunhofer IOSB INA, D-32657 Lemgo, Germany
[4] TU Wien Informat, A-1040 Vienna, Austria
来源
2023 IEEE 21ST INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, INDIN | 2023年
关键词
Industry; 4.0; Security; Risk Assessment; Automation; IEC; 62443; SL-T; MITRE ATT&CK; Intel TAL;
D O I
10.1109/INDIN51400.2023.10217902
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Due to Industry 4.0 developments, the demanded modularity of manufacturing systems generates additional manual efforts for security experts to guarantee a secure operation. The rising utilization of information and the frequent changes of system structures necessitate a continuous and automated security engineering, especially by application of the mandatory security risk assessments. Collecting the required information for these assessments and formalising expert knowledge shall improve the security of modular manufacturing systems in the future. In order to automate the security risk assessment process, this work proposes a method to determine the Target Security Level (SL-T) in conformance to the IEC 62443 standard based on the MITRE ATT&CK framework and the Intel Threat Agent Library (TAL).
引用
收藏
页数:6
相关论文
共 24 条
[1]  
Alexander O., 2020, MITRE ATT&CK® for Industrial Control Systems: Design and Philosophy
[2]  
[Anonymous], 2020, Technical Report
[3]  
Bristow M., 2021, A SANS 2021 Survey: OT/ICS Cybersecurity
[4]  
Bugeja Joseph, 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), P557, DOI 10.1109/PERCOMW.2017.7917623
[5]  
Casey T., 2010, 6 ANN WORKSH CYB SEC, P1
[6]  
Casey T., 2007, Intel Information Technology White Paper
[7]  
Di Pinto A., 2018, Black Hat Research Paper
[8]  
Ehrlich M., 2022, 17 FACHTAGUNG EKA EN
[9]  
Ehrlich M., 2019, INT C NETW SYST WORK
[10]  
Ehrlich M., 2022, 18 IEEE INT C FACT C