The Implementation Phase of ICS Cyber Security Assurance
The cyber security implementation on ICS environment is based on the results from several entities, such as: Asset Management Findings, Controls Catalog (Risk Register), and ICS Cyber Security Assessment Result. The implementation phase will require support from several resources, internal & external, in order to achieve the ICS Cyber Security Assurance as per expected
Integrated Action Items
Implementation of the required action items based on the important and urgency level of each items will be the main activities that should be performed on this phase
Integrated Action Items
Implementation of the required action items based on the important and urgency level of each items will be the main activities that should be performed on this phase
Resources Intensive Support
Management, engineering, operations & maintenance, IT, and other related parties should give the required support to successfully implement the security action items. Support from cross boundaries resources is critical to have
Stewardship and Sustainability Improvement
A periodic review of the implementation activities will drive the successful implementation of all required action items. The sustainability improvement will need to be ensured to accommodate the environmental changes to reflect the security risk that may threaten the company in the future
ICS Cyber Security Compliance
The ICS Cyber Security Compliance is a long journey to be pursued, it requires a lot of resources, budget, effort, and willingness to secure the ICS environment as per regulating standards and best practices. Keep the pace and move forward, ensure the cyber security assurance in the ICS environment is not just at the system level but it should be bear in the people mindset, therefore the security culture will last in long-run