Amenaza Technologies Limited

NIST recently released revision 2 - initial public draft of Special Publication 800-82 (Guide to Industrial Control Systems Security). This document outlines several activities that will enhance ICS security. Chapter 3 discusses the need for proper risk assessment and management as a foundation step for ICS security. Chapter 5 describes and recommends a number of beneficial architectural practices.

Attack tree analysis is an effective, efficient mechanism for performing the risk assessment steps shown in Figure 3-3 of the NIST document, and for quantifying the benefits of the recommended practices. Contact if you would like to see a SecurITree demo of ICS threat risk analysis.




SecurITree - the world's most advanced software for Attack Tree analysis!


Think like an attacker! Think SecurITree!