ICS Cheat Sheets: It’s Not Cheating If You Have an Effective and Safe Approach!

Are you wondering which industrial control system (ICS) assets are commonly targeted and where to get critical security logs? Are you planning to conduct an ICS security program assessment at either a strategic or technical level? Maybe you want to map your existing program, or start a new one that aligns with important functions of the National Institute of Standards and Technology (NIST) Cybersecurity Framework to protect your control network. Or perhaps you just want to know more about the technical details of the industrial protocols in use on your ICS network.


We have just published several new ICS Cheat Sheets to guide the community in answering these and other critical ICS security questions. The tri-fold ICS Cheat Sheets are applicable to all ICS sectors. Let’s briefly walk through them together!



1. Common ICS Acronyms


This Cheat Sheet is literally the “ABC’s” of the industrial control system security arena. It is a handy collection of the most commonly referenced acronyms used in SANS ICS courses, ranging from security for Operational Technology (OT) to Information Technology (IT). Terminology for critical engineering operations, security models, devices, and assets are covered, as are ICS applications for plant operations, with acronyms for everything from Active Cyber Defense Cycle (ACDC) to Human Machine Interface (HMI), Phasor Measurement Unit (PMU), Remote Terminal Unit (RTU), Safety Instrumented System (SIS), and Cross-Site Scripting (XSS).


Keep this ICS Cheat Sheet in your pocket for a handy reference if you’ve just entered the ICS engineering or security areas.



2. ICS Cybersecurity Program Maturity


Applicable to any industrial control system sector, this Cheat Sheet covers the basics of using the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF). The Cheat Shee ..

Support the originator by clicking the read the rest link below.