POLICY & PROCEDURE ASSESSMENT
We work closely with your organization to evaluate or develop an industrial control system network policy and procedures based on your concerns and the appropriate standards and regulations applicable to your industry and region. We will work with your team to insure agreement, rollout, and adoption. The established policy & procedures will drive security focused behaviors without compromising performance and connectivity. It will also establish a method for budgeting decisions, and accountability.
Our team will work with yours to verify that the detailed design as built, meets the security functions defined in the design. These test can be performed onsite for systems/equipment constructed and installed locally or performed offsite where the skid is built. In some cases, it is possible to conduct analysis remotely; contact Kenexis for more information on remote acceptance testing. Acceptance testing is designed to prevent the introduction of vulnerabilities into your system.
Our conformance assessment service verifies your system, policy, and/or procedures, comply with the appropriate standard or regulation. A conformance assessment can also measure awareness and other attributes on a global scale for large corporations seeking to understand where they should focus effort and budget. It many cases, it is possible to assess certain conformance criteria remotely using online questionaries or remote conferencing technology. Periodically it is good practice to test both policy awareness and policy compliance. We will work with your team to develop questionnaires and interview strategies as you desire using a variety of methods or you can utilize our custom questionnaires based on ISA/IEC 62443, NIST SP800, NIST Cybersecurity Framework, ISO/IEC 27001, ISACA Cobit 5, or SANS 20 Critical Controls.
A Vulnerability assessment evaluates the ICS network for security, performance, and Kenexis will also perform reliability analysis. Prior to assessment, we typically review network architecture, assets, technologies, data flows, process flow diagrams, and previous assessments including risks assessments like HAZOP. Vulnerability testing includes passive scanning for device discovery and service enumeration as well as vulnerabilities. A penetration test can be performed with written permission to pursue vulnerabilities further into the system. Data aggregation and collation is followed by in depth analysis using a variety of tools and Kenexis Dulcet Analytics™. We identify vulnerabilities and rank them, remove false positives, and develop prioritized recommendations for remediation. Our final report includes asset inventory, vulnerabilities discovered, severity ratings, recommendations, comparisons, overview of tools and methods utilized and findings. Once the project is complete, we either destroy or return of all raw data.
STRATEGIC PLANNING & INCIDENT RESPONSE
If we plan correctly from the beginning, incident response should rarely if ever be required. If required, then our organization can dispatch rapidly to assist your team’s response and recovery. Strategic planning can encompass all the above services to insure your industrial network and team are ready to act based on procedure in the event you are attack or a network mishap occurs. Our incident Response service will help you develop a plan including the services listed above as required and assist during an incident. Our incident response focuses on remediating the problem as quickly as possible and not specifically on forensics unless specified in writing. Regardless, we use the same forensics techniques in either case, but emphasis shifts depending on the response requested.
- Oil & Gas, Petrochemical, Chemical, Pharmaceutical
- Power Generation including Nuclear, Gas, Coal, and Hydro
- Manufacturing including Automotive, Metal, Food & Beverage
- Transit including Rail, Shipping, and Terminals
- Government & Municipalities including Military, Research, Water & Wastewater