Industrial Internet Security Framework v 1.0 | Page 133

Security Framework Annex A: Industrial Security Standards ‘Cloud Controls Matrix Version 3.0,’1 which is an auditable standard that is mapped to a large set of other standards including COBIT, ISO/IEC 27001:2005, NIST SP 800-53, FedRAMP, PCI DSS, HIPAA/HITECH, NERC CIP 2. The Cloud Controls Matrix provides fundamental security principles to guide cloud vendors and to assist prospective customers in assessing the overall security risk of a cloud provider. A cloud provider offers transparency into how its security controls are designed and managed by completing an assessment against the Cloud Controls Matrix. A.9 STANDARD REPOSITORIES The Smart Grid Interoperability Panel (SGIP) has created a compendium of standards and practices pertaining to the development and deployment of the Smart Grid. A table of the documents contained in the SGIP Catalog of Standards on the SGIP website. 3 Specific guidance for securing industrial control systems using the TCG standards is included in these documents: ‘TCG Architect’s Guide for ICS Security’, ‘TCG Architect’s Guide for IoT Security,’ and ‘TCG Guidance for Securing IoT.’ 4 These documents present approaches to industrial control systems security, addressing communications security, system integrity, firmware updates and detection and recovery from sophisticated attacks. SAE standards target safety, quality and effectiveness of products and services across the mobility engineering industry. The more than 10,000 standards in the SAE database now include historical standards and can be accessed at the SAE website. 5 A.10 SUPPLY CHAIN INTEGRITY RESOURCES Manufacturers should apply best practices of supply chain risk assessment and risk management. The NIST ‘Supply Chain Risk Management: Practices for Federal Information Systems and Organizations’ 6 provides guidance to US federal agencies on identifying, assessing and mitigating supply chain risks at all levels of their organizations. It also integrates ICT supply chain risk management (SCRM) into federal agency risk management activities by applying a multi-tiered, SCRM-specific approach, including guidance on assessing supply chain risk and applying mitigation activities. Manufacturers should also follow best practices for supply chain security. One example is ISO ‘Information Security for Supplier Relationships’ 7. Another is the NEMA ‘Supply Chain Best Practices’ 8. This document identifies a recommended set of supply chain best practices and See [CSA-CCM] See [ISACA-COBIT], [ISO-27001], [NIST-800-53], [FedRAMP], [PCI-DSS], [HHS-HIPAA], [HHS-HITECH] and [NERC-CIP] 3 See [SGIP-CoS] 4 See [TCG-AG-ICS], [TCG-AG-IoT] and [TCG-GS-IoT] 5 See [SAE] 6 See [NIST-800-161] 7 See [ISO-27036-1] 8 See [NEMA-CPSP] 1 2 IIC:PUB:G4:V1.0:PB:20160926 - 133 -