ARC View- Enabling Continuous Vulnerability Management for Industrial Control Systems

Issue link:

Contents of this Issue


Page 4 of 5

ARC View, Page 5 ©2018 ARC • 3 Allied Drive • Dedham, MA 02026 USA • 781-471-1000 • PAS Cyber Integrity Provides Continuous Industrial Vulnerability Management The PAS Cyber Integrity solution was designed specifically for OT cyberse- curity management. The solution was built on more than two decades of expertise in the power and process industry. Significantly, PAS has a long history of automation vendor platform independence. The product sup- ports continuous vulnerability management for a broad range of level 0, 1, and 2 cyber assets. Asset Inventory Support According to the company, building asset inventories for proprietary con- trol system components automatically is a key feature of PAS Cyber Integrity. It is designed to automate discovery, collection, and management of information. This includes detailed configuration data for industrial con- trol system elements like DCSs, PLCs, safety systems, and I/O cards for all major control systems, regardless of vendor. It also gathers configuration data for the IT-based systems – all in one data repository. The Cyber Integ- rity solution can collect this information from devices that are connected through TCP/IP, serial, and other methods. Automated Vulnerability Monitoring and Evaluation Cyber Integrity automates the monitoring and evaluation of ICS vulnerabil- ity alerts through a combination of an in-depth asset inventory and the National Vulnerability Database (NVD) from US-CERT. The product quickly identifies specific ICS assets with iden- tified vulnerabilities. The solution displays all vulnerabilities across the entire environment and enables users to filter for quick identification of vulnerabilities by plant, unit, area/zone, or individual asset. Results include the NVD Common Vulnerabil- ity Scoring System (CVSS) risk rating for each vulnerability. Remediation and Mitigation Workflows PAS Cyber Integrity provides a flexible platform for managing vulnerabil- ity remediation and mitigation workflows. This includes documentation, inventory-matching, and reporting on existing vulnerabilities. To help pro- Cyber Integrity Vulnerability Management

Articles in this issue

Links on this page

view archives of Brochures - ARC View- Enabling Continuous Vulnerability Management for Industrial Control Systems