Graded security forensics readiness of SCADA systems
نویسندگان
چکیده
Security event logs are major indicators for the timely discovery of cyberattacks and during security incident examinations. Collection of sufficient logs of events associated with security incident time is critical for effective investigation. SCADA systems logging capabilities are intended for identifying and detecting process disruptions, not security incidents, and are frequently not suitable for digital forensic investigation [Ta13]. Nevertheless, logs provide tremendous support during digital forensics investigations as they consist of vast amounts of information, e.g. step-by-step events that occurred in a system in question, including time stamping [AIJ12]. In addition, logging is a major element of forensic readiness. Numerous tools and methods contribute to log monitoring, e.g. evaluating log records and correlating them through various systems. This can assist in incident handling, identifying policy violations, auditing, and other efforts. Within the general context described above and the more specific graded security approach of IEC 62443-x-x, this paper will identify cybersecurity specific SCADA component requirements, preconditions for subsequent forensic investigations, collecting potential digital evidence, graded forensic-related security controls, and forensic readiness during SCADA lifecycle phases.
منابع مشابه
Incident Analysis & Digital Forensics in SCADA and Industrial Control Systems
SCADA and industrial control systems have been traditionally isolated in physically protected environments. However, developments such as standardisation of data exchange protocols and increased use of IP, emerging wireless sensor networks and machine-to-machine communication mean that in the near future related threat vectors will require consideration too outside the scope of traditional SCAD...
متن کاملWorkshop on new security standards for IACS/SCADA industrial systems
The IACS/SCADA-Security WS aims at Security Standards and Practice for Industrial Systems integrated by a sort of Distributed Middleware I4.0. A short tutorial into Security Standards is given by the WS Co-Chairs. In-depth aspects of this issue is discussed and presented by the invited authors from China, UK and Germany presenting: IEC 62443 Security Standards Humans, the strongest and weakest ...
متن کاملThe Development of a Generic Framework for the Forensic Analysis of SCADA and Process Control Systems
There is continuing interest in researching generic security architectures and strategies for managing SCADA and process control systems. Documentation from various countries on IT security does now begin to recommendations for security controls for (federal) information systems which include connected process control systems. Little or no work exists in the public domain which takes a big pict...
متن کاملCyberspace Forensics Readiness and Security Awareness Model
The goal of reaching a high level of security in wireless and wired communication networks is continuously proving difficult to achieve. The speed at which both keepers and violators of secure networks are evolving is relatively close. Nowadays, network infrastructures contain a large number of event logs captured by Firewalls and Domain Controllers (DCs). However, these logs are increasingly b...
متن کاملTowards a Digital Forensics Readiness Framework for Public Key Infrastructure Systems
The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates [18]. PKI systems are today one of the most accepted and used technologies to enable successful implementation of information systems security services such as authentication and confidentiality. Digital forensics is a ...
متن کامل