ICS Standard, Policy & Procedure Management

The Good Governance in ICS Security

Standard

Lorem ipsum dolor sit amet communitas erdum, lacus et vulputate, velit nulla commodo sem ipsum dolor sit amet.

Policy

Lorem ipsum dolor sit amet communitas erdum, lacus et vulputate, velit nulla commodo sem ipsum dolor sit amet.

Procedure

Lorem ipsum dolor sit amet communitas erdum, lacus et vulputate, velit nulla commodo sem ipsum dolor sit amet.

Policy and Business Conduct

As an organization, company should realize the essential of having clear defined policy on their organization. This policy will be the soul of so many aspects that will guide the whole business conduct. Focus on the cyber security perspective, the policy on this aspect should govern all related entities within the company, regarding the core security guidelines for the organization. Security policy should also govern people (as the core player) and system (as the security object)

Technical Coverage

Technical and behaviour should be captured on the security policy coverage. As an example, the removable media policy.  The threat of being infected by malicious code that spread out by the contaminated removable media can put the organization in danger situation. Another example is related to the behaviour control on how to interact with the high level data classification (confidential and private). What is the best practice that should be deployed to the people each time they interact with these types of datas

What We Offer

ICS Security Company Standard Design & Development

Technical assistance and consultation to design and develop the company standard to govern the ICS security assurance based on existing industrial standards, best practices, technical recommendation and specific corporate guidelines. The ICS security program framework can be included in this standard, while the more detail requirement can be covered in specific ICS security program guidelines

ICS Security Policy Design & Development

Technical assistance and consultation to strategize and develop the ICS security policy within the corporation align with the existing company general policy and IT security policy. The ICS security policy is considered as the top level guidelines to govern the ICS security assurance across the company, while the detail step by step of daily activities will be covered in ICS security procedure

ICS Security Procedure Design & Development

Technical assistance and consultation to strategize and develop the ICS security procedure adhere to the company standard and ICS security policy in order to cover the detail activities related to the ICS security assurance in day to day operations

Title

The ICS Standard, Policy and Procedure Design & Development is the soul of the ICS security assurance continual improvement cycle. This is the guidelines of the whole ICS security activities within the boundary, and therefore it should be made available prior to moving to the next phase, ICS Security Implementation

Develop Now

We provide the ICS Security Standard, Policy and Procedure strategic planning, design and development as the fundamental references to deploy the ICS security assurance