Book Image

Industrial Cybersecurity - Second Edition

By : Pascal Ackerman
Book Image

Industrial Cybersecurity - Second Edition

By: Pascal Ackerman

Overview of this book

With Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure. This second edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment. You'll begin by learning how to design security-oriented architecture that allows you to implement the tools, techniques, and activities covered in this book effectively and easily. You'll get to grips with the monitoring, tracking, and trending (visualizing) and procedures of ICS cybersecurity risks as well as understand the overall security program and posture/hygiene of the ICS environment. The book then introduces you to threat hunting principles, tools, and techniques to help you identify malicious activity successfully. Finally, you'll work with incident response and incident recovery tools and techniques in an ICS environment. By the end of this book, you'll have gained a solid understanding of industrial cybersecurity monitoring, assessments, incident response activities, as well as threat hunting.
Table of Contents (26 chapters)
Section 1: ICS Cybersecurity Fundamentals
Section 2:Industrial Cybersecurity – Security Monitoring
Section 3:Industrial Cybersecurity – Threat Hunting
Section 4:Industrial Cybersecurity – Security Assessments and Intel
Chapter 15: Industrial Control System Risk Assessments
Section 5:Industrial Cybersecurity – Incident Response for the ICS Environment

Red Team/Blue Team example exercise, attacking Company Z

In this section, we are going to go over the steps and activities involved in performing an industrial control system (ICS)-centric Red Team/Blue Team exercise. The engagement is held around a fictitious organization, aptly called Company Z. We will go over the prerequisites, preparation, implementation, and results of the exercise in the following sections.

Red Team strategy

The Red Team's strategy is simple: get to the objective of the engagement using the same tactics, techniques, and procedures (TTPs) that potential adversaries of the exercise's target would likely use as well. Time is not a factor, so we can take as much or as little time as we need. The goal is to stay under the radar as much as possible, but being detected should not be considered a failure but instead an indicator of the competence of the target's Blue Team's capabilities.

Blue Team preparation

As the saying goes, as defenders...