Amenaza Technologies Limited

NIST recently released revision 2 - initial public draft of Special Publication 800-82 (Guide to Industrial Control Systems Security). This document outlines several activities that will enhance ICS security. Chapter 3 discusses the need for proper risk assessment and management as a foundation step for ICS security. Chapter 5 describes and recommends a number of beneficial architectural practices.

Attack tree analysis is an effective, efficient mechanism for performing the risk assessment steps shown in Figure 3-3 of the NIST document, and for quantifying the benefits of the recommended practices. Contact info@amenaza.com if you would like to see a SecurITree demo of ICS threat risk analysis.

X

 

 

SecurITree - the world's most advanced software for Attack Tree analysis!

 

Think like an attacker! Think SecurITree!