Understanding the SIS attack surface
To make an SIS more secure, we need to clearly understand the attack surface – this includes all entry points where an unauthorized user could potentially gain access to the system or interfaces and exploit vulnerabilities for malicious purposes. An SIS could be subject to attacks via direct network connections, remote access software, portable media, or even supply chain threats, among others.
First, let’s explore SIS interfaces and Systems Under Consideration (SuCs).
SuCs
When evaluating ICSs, especially SISs, it is vital to understand the scope and any dependencies as well as system boundaries. This requires the examination of all interfaces and entry points, including physical and digital venues.
As per the IEC 62443-3-2 definition, the SuC encompasses anything from Basic Process Control Systems (BPCSs), Distributed Control Systems (DCSs), SISs, and Supervisory Control And Data Acquisition (SCADA), ICS, or Industrial...