Evaluation

Prepare a cybersecurity strategy

PROBLEM

Do you know the security status of your industrial system?

Lack of knowledge of the industrial system

Wrong configuration of security equipment

Poor operational practices

Increase in the weight of both functional and regulatory risks for the owner

SOLUTION

In-depth analysis

Risk analysis

  • Highlight functional and cyber risks
  • Define risks probability and severity
  • Quantify and qualify risks
  • Link to functional safety and regulations

Technical diagnosis

  • Set network mapping (permeability, segmentation and data flow)
  • Identify vulnerabilities
  • Evaluate system protection and quality

Maturity audit

  • Governance, organization and responsibilities
  • Review physical and logical access, architecture and concepts
  • Inventory equipment and data

OUR METHODOLOGY

Professionalism and quality

Tools

  • APERO: SADT based risk analysis methodology
  • CyMAP: network flows mapping and vulnerability analysis tool
  • NP-view: network configuration assessment tool

References and standards

  • ISA/IEC 62443, 62351
  • ISO 27001, 27002, 27005
  • NERC CIP 005, 007
  • ANSSI

Commitments

  • Non-invasive tools and execution
  • Seamless integration into the business process
  • Confidentiality and privacy best practices

BENEFITS

The keys for decision making

Evaluation - Benefits

NEXT STEP

Secure the industrial system

Use a powerful DMZ to control exchanges with the industrial system, strengthen its security and resilience.

CyFENCE helps you to partition environments, bring cyber hygiene into operational technologies and collect log / security events.