We provide consulting to implement a Cyber Security Management System (CSMS) to protect OT devices according to the IEC 62443 Industrial Cyber Security standard.
Management system in conformity with the IEC 62443 standard
A Cyber Security Management System (CSMS) is defined according to the requirements of the IEC 62443 standard. Implementing this system is the final purpose of an entire management process that includes a series of detailed assessments and the definition of corrective actions to protect OT devices from cyber attacks.
As such, our offer is structured on a complete range of specialized consulting services for the entire security lifecycle in conformity with the IEC 62443 standard requirements. To reach the final objective of implementing the Cyber Security Management System, we put each work phase into action as established by the standard:
Adopting the CSMS falls under the implementation phase, during which we work alongside the customer to define policies and procedures to manage and run systems that are always protected against potential cyber attacks.
Our support includes drawing up all the documents regarding training personnel who are responsible for the OT infrastructure in order for the probability of being attacked due to human error to be reduced to a minimum.
Finally, we create incident recovery procedures to prevent the risk of cyber threats to potentially attackable infrastructure.
All these actions aim to make the management system the sole reference for monitoring and maintaining an appropriate security level of industrial devices.
The actions needed are divided into three main areas:
- Introducing organizational policies and procedures that include, for instance, training personnel who interact with the OT infrastructure
- Selecting the technical measures related to network segmentation, access control, authentication, and authorization
- Implementing and maintaining the risk and incident recovery management plan
The IEC 62443 guidelines identify three security lifecycle phases: assessment, implementation, and, finally, maintenance of the security level. It is precisely during the implementation stage that the company must structure the entire CSMS to protect itself from future cyber attacks. Based on what was found in the Assessment phase, the goal is to adopt a management system that includes procedures and strategies to prevent cyber attacks and protect industrial systems.
The most common and perceivable consequences in the industrial sector are mainly financial damages and damaged reputation due to production standstills, safety issues for operators, financial loss, or environmental damage. In addition to interrupted production after stopping the attacked systems, threats can also entail altering or inhibiting safety functions on machinery and systems; for example, when automation is implemented by safety PLCs connected online. Furthermore, the attacked systems releasing dangerous emissions into the atmosphere can also seriously impact the business.
Why Choose us
- Experience in the OT Cyber Security field since 2014
- In-house OT Cyber Security laboratory
- In-house IEC 62443/ISA 99-certified personnel (Fundamentals Specialist and Cyber Security Risk Assessment Specialist)
- Pool of automation and OT network specialists
- Wide network of collaborations with the main international OT solution suppliers
What some of our customers say about us
"The collaboration was a very successful experience for both companies."
"We highly recommend H-ON Consulting service for their expert industrial knowledge concerning machines, process, digital data."
"The biggest benefit our company received working with H-ON Consulting was a combination of on-going flexibility and most of all speed of delivery."
Sirio Sistemi Elettronici