smarthub

Implementing NIST 2.0 (For the OT Implementors) Part 2/5 – “Identify”: CSF 2.0 for your Edge Landscape – Identify / Inventory

Home > Blog > Implementing NIST 2.0 (For the OT Implementors) Part 2/5 – “Identify”: CSF 2.0 for your Edge Landscape – Identify / Inventory

By admin

-- October 11, 2024

-- No Responses

Part 1 Recap: Expanding Risk Management for the Growing Edge

In my last post, we discussed how NIST CSF 2.0 goes beyond cybersecurity risks to encompass a broader spectrum of threats to an organization, essentially defining and managing risks.

These can be financial, supply chain, reputational, technological, or physical. This series aims to provide a clear understanding of operationalizing risk management for the ever-increasing number of devices at the edge.

Securing the Edge: The Importance of Asset Inventory

The first crucial step in securing your edge environment, as defined by NIST CSF 2.0 for edge digital assets, is gaining a comprehensive understanding of your operational assets. This requires creating a meticulous inventory of all devices, sensors, controllers, and other components that make up your edge network. 

Identify: Building a Comprehensive View of Your Edge

The “Identify” function in NIST CSF 2.0 has three key sections:

1. Asset Management: Here, we identify assets critical to a business unit (BU) fulfilling its objectives. This involves:
  • Inventories of hardware, software, services, and systems managed by the organization.
  • Network Topology: How are all the assets connected? What is allowed to communicate with what etc.,
  • Supplier-provided services relevant to the BU’s owned inventory.
  • Prioritization based on criticality to BU goals, resource needs, and potential impact of a security breach.
  • Comprehensive metadata (location, owner, financial information, warranty details, support contacts, software Bill of Materials, etc.) and key data with documented threshold triggers.
  • Documentation on lifecycle management for each asset. This is key, because assets can quickly get orphaned in terms of unknown ownership, purpose and criticality to business.
2. Risk Assessment: This section focuses on cybersecurity risks to the BU’s existence in terms of assets, and personnel. Key considerations include:
  • Vulnerabilities and threat intelligence (from vendors, other sources) alongside internal and external threats (e.g., certificate and user management, vulnerabilities).
  • Potential impact of a failure within a set of owned components, to the BU.
  • Risk response strategies (discussed in a later part of this series).
  • Processes for receiving, analyzing, and responding to threats targeting the owned inventory.
  • Ensuring authenticity and integrity of owned components. This includes verifying updates and using signed packages from vendors. Or password rotation when personnel change. 
3. Improvement: Continuous monitoring is essential.
  • This involves monitoring the inventory, managing threat exposure, and making improvements based on KPIs (Key Performance Indicators) to track the performance & security posture of different components. This includes evaluations, tests, simulations, and real-world monitoring of production processes.
Implementing Edge Security: Practical Approach

Here’s how the “Identify” function translates into actions for edge security:

  • Device Discovery: Leverage automated tools to identify all connected devices at the edge. These tools can be network scanners or communication protocol-specific discovery mechanisms.
  • Device Classification: Categorize devices based on their function, operating system, and security capabilities. This helps prioritize security efforts and identify potential vulnerabilities.
  • Data Mapping: Identify the data collected, processed, and transmitted by edge devices. Understand the sensitivity of this data to determine appropriate security controls. This translates to knowing device meta-data and defining the performance metrics (like CPU usage, memory levels etc., where it is possible).
  • Dependency Mapping: Identify how edge devices interact with other systems and applications within the OT environment. This helps assess the impact of a security incident on interconnected systems.

By following these steps, organizations can develop a detailed understanding of their edge landscape. This comprehensive understanding forms the foundation for effective risk management and security control implementation.

Share :

Leave a Comment

Your email address will not be published. Required fields are marked *