Amenaza Technologies Limited
NIST recently released revision 2 - initial public draft of Special Publication 800-82
(Guide to Industrial Control Systems Security).
This document outlines several activities that will enhance ICS security.
Chapter 3 discusses the need for proper risk assessment and management as a foundation step for
ICS security. Chapter 5 describes and recommends a number of beneficial architectural practices.
Attack tree analysis is an effective, efficient mechanism for performing the risk
assessment steps shown in Figure 3-3 of the NIST document, and for quantifying the benefits
of the recommended practices. Contact email@example.com if you would like to see a SecurITree
demo of ICS threat risk analysis.
SecurITree - the world's most advanced software for Attack Tree analysis!
Think like an attacker! Think SecurITree!