Industrial Internet Security Framework v 1.0 | Page 29

Security Framework 5: Managing Risk tradeoffs should be documented to support reexamination and independent verification. Decisions should be made based on future requirements across the lifetime of the system, not on the current threat landscape of today. Deployment of security solutions needs to consider the legal ownership of the deployed IoT components and support systems. For example, the sensors or actuators may be deployed and owned by one legal entity, the IT components by another, while the data may be owned by yet another. In addition, a distributed deployment may be under multiple jurisdictions. Therefore, challenges posed by the ownership of equipment and data by multiple legal entities also need to be considered in assessing risks to the security of the deployed systems. Deployment of security solutions must also consider operations, since security implementation that hinders them tend to be circumvented by operators, rendering the security measures ineffective. Security controls that frequently generate false-positive security alerts, require repeated user authentication or prevent the user from operating in the expected manner impede business productivity and should be discarded lest the installer be asked to remove the offending security controls. Security capabilities must be efficient, accurate and provide demonstrable value in contributing to defensive postures. Other security programs may organize specific capabilities into different groups or elements based on traditional methodologies used in a specific sector or organization. For example, the North American Electric Reliability Corporation’s Critical Infrastructure Protection standard (NERC-CIP standard 1), which lays out the security program approach for electric providers in their jurisdiction, has organized the activities into eleven elements, some of which are unique to securing an electric system. Another example is European Union Agency for Network and Information Security (ENISA)’s Security Framework for Governmental Clouds2 that offers four high-level phases with fourteen elements spread across them. Several methodologies exist to assess security programs, the security posture of organizations and their process for secure development and maintenance of their products. Examples are provided in Annex A.3. IIC plans to utilize the Cybersecurity Capability Maturity Model (C2M2) model, discussed in Annex B, in IIC testbeds. 5.2 RISK ASSESSMENTS Business risk is defined by IIC as “the effect of uncertainty on objectives” and information security risk as the “potential that a given threat will exploit vulnerabilities of an asset or group of assets and thereby cause harm to the organization.” 3 Information security uses the term threat instead of the more general term uncertainty. A risk assessment is the process by which risk, and specifically information security risk, is characterized. Approaches to information systems risk assessment are documented in many See [NERC-CIP] See [ENISA-SFGC] 3 See [IIC-IIRA2016] 1 2 IIC:PUB:G4:V1.0:PB:20160926 - 29 -