org.1 Security Policy |
Compliance, Cybersecurity assessment, Risk and Vulnerability Management, Communications plan |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Critical Infrastructure Protection |
Partial coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cumplimiento normativo |
Partial coverage |
Centros de Respaldo |
Partial coverage |
Cloud Security |
Full coverage |
Cybersecurity Services Management |
Full coverage |
Specialized Consulting in Cybersecurity |
Full coverage |
Regulatory Compliance |
Partial coverage |
Forensic Analysis |
Partial coverage |
org.2 Security standard |
Compliance |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Critical Infrastructure Protection |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Centros de Respaldo |
Full coverage |
Cloud Security |
Full coverage |
Cybersecurity Services Management |
Full coverage |
Specialized Consulting in Cybersecurity |
Full coverage |
Regulatory Compliance |
Full coverage |
Forensic Analysis |
Full coverage |
org.3 Security procedures |
Compliance, Use control policy, Activity log policy, Backup Policy |
Integration of cybersecurity solutions in Control Centers |
Partial coverage |
Critical Infrastructure Protection |
Partial coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Centros de Respaldo |
Partial coverage |
Securing platforms, networks and services. CASB and End Point |
Partial coverage |
Cloud Security |
Partial coverage |
Cybersecurity Services Management |
Partial coverage |
Specialized Consulting in Cybersecurity |
Partial coverage |
Regulatory Compliance |
Partial coverage |
Forensic Analysis |
Partial coverage |
org.4 Authorization process |
Account management, PKI infrastructure |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cloud Security |
Partial coverage |
op.pl.1 Risk analysis |
Cybersecurity assessment, Risk and Vulnerability Management |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Cybersecurity Assesment |
Partial coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Red Team/Blue Team/Purple Team |
Partial coverage |
Implementation of security management systems |
Partial coverage |
Cumplimiento normativo |
Full coverage |
Centros de Respaldo |
Partial coverage |
Cloud Security |
Full coverage |
Cybersecurity Services Management |
Full coverage |
Specialized Consulting in Cybersecurity |
Full coverage |
Regulatory Compliance |
Partial coverage |
op.pl.2 Security architecture |
Network communications control, Secure network design |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Critical Infrastructure Protection |
Partial coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Centros de Respaldo |
Partial coverage |
Securing platforms, networks and services. CASB and End Point |
Partial coverage |
Optimización de políticas de seguridad |
Full coverage |
SSL Inspection |
Partial coverage |
Cloud Security |
Full coverage |
Cybersecurity Services Management |
Partial coverage |
Specialized Consulting in Cybersecurity |
Partial coverage |
op.pl.3 Acquisition of new components |
Configuration control, Equipment use control, Device control |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Critical Infrastructure Protection |
Partial coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Centros de Respaldo |
Partial coverage |
Optimización de políticas de seguridad |
Partial coverage |
SSL Inspection |
Partial coverage |
Cloud Security |
Partial coverage |
Cybersecurity Services Management |
Partial coverage |
op.pl.4 Sizing / Capacity Management |
Hardware and software inventory, Redundancy system |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Partial coverage |
Centros de Respaldo |
Partial coverage |
Cloud Security |
Partial coverage |
Cybersecurity Services Management |
Partial coverage |
op.pl.5 Certified components |
Certification of the main ICS providers |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Specialized Consulting in Cybersecurity |
Full coverage |
op.acc.1 Identification |
Hardware and software inventory, Access control policy |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cloud Security |
Partial coverage |
Cybersecurity Services Management |
Full coverage |
Specialized Consulting in Cybersecurity |
Partial coverage |
op.acc.2 Access requirements |
Basic user access control, Multi-factor user access control, Access control policy |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cloud Security |
Partial coverage |
Cybersecurity Services Management |
Partial coverage |
Specialized Consulting in Cybersecurity |
Partial coverage |
op.acc.3 Segregation of functions and tasks |
Account management |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
op.acc.4 Access rights management process |
Device control, Account management |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Optimización de políticas de seguridad |
Partial coverage |
op.acc.5 op.acc.5 Authentication methods (external users) |
Hardware Security Keys, Basic user access control, Multi-factor user access control |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cloud Security |
Partial coverage |
op.acc.6 op.acc.6 Authentication methods (organization\'s users) |
Hardware Security Keys, Basic user access control, Multi-factor user access control |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cloud Security |
Partial coverage |
op.exp.1 Asset inventory |
Hardware and software inventory |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cybersecurity Services Management |
Full coverage |
op.exp.2 Security configuration |
Configuration control |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Centros de Respaldo |
Full coverage |
Optimización de políticas de seguridad |
Full coverage |
SSL Inspection |
Full coverage |
Cloud Security |
Full coverage |
Cybersecurity Services Management |
Full coverage |
op.exp.3 Security Configuration Management |
Configuration control |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Centros de Respaldo |
Full coverage |
Optimización de políticas de seguridad |
Full coverage |
SSL Inspection |
Full coverage |
Cloud Security |
Full coverage |
Cybersecurity Services Management |
Full coverage |
op.exp.4 Maintenance and security updates |
Reliable updates, Upgrade testing support |
Integration of cybersecurity solutions in Control Centers |
Partial coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cybersecurity Services Management |
Partial coverage |
op.exp.5 Change Management |
Configuration control |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Centros de Respaldo |
Full coverage |
Optimización de políticas de seguridad |
Full coverage |
SSL Inspection |
Full coverage |
Cloud Security |
Full coverage |
Cybersecurity Services Management |
Full coverage |
op.exp.6 Protection against malicious code |
Advanced antimalware |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
op.exp.7 Incident Management |
Incident response support |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
CERT |
Full coverage |
Cybersecurity Services Management |
Full coverage |
op.exp.8 Activity log |
Inspect endpoint logs, Activity log policy |
Integration of cybersecurity solutions in Control Centers |
Partial coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cloud Security |
Partial coverage |
op.exp.9 Incident management log |
Inspect endpoint logs, Activity log policy |
Integration of cybersecurity solutions in Control Centers |
Partial coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cloud Security |
Partial coverage |
op.exp.10 Protection of cryptographic keys |
PKI infrastructure |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cloud Security |
Full coverage |
op.ext.1 Contracting and service level agreements |
Certification of the main ICS providers |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Specialized Consulting in Cybersecurity |
Full coverage |
op.ext.2 Day-to-day management |
Account management |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
op.ext.3 Supply Chain Protection |
Awareness and Training |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cumplimiento normativo |
Full coverage |
Cybersecurity Services Management |
Full coverage |
Specialized Consulting in Cybersecurity |
Full coverage |
Regulatory Compliance |
Full coverage |
op.ext.4 Systems interconnection |
Network communication visualization |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Securing platforms, networks and services. CASB and End Point |
Full coverage |
Cloud Security |
Full coverage |
op.nub.1 Cloud services protection |
Data Protection |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Securing platforms, networks and services. CASB and End Point |
Full coverage |
Cloud Security |
Full coverage |
Cybersecurity Services Management |
Full coverage |
op.cont.1 Impact analysis |
Risk and Vulnerability Management |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Implementation of security management systems |
Full coverage |
Cumplimiento normativo |
Full coverage |
Centros de Respaldo |
Full coverage |
Cloud Security |
Full coverage |
Cybersecurity Services Management |
Full coverage |
Specialized Consulting in Cybersecurity |
Full coverage |
op.cont.2 Continuity plan |
Redundancy system, Backup system |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Partial coverage |
Centros de Respaldo |
Full coverage |
Cloud Security |
Full coverage |
op.cont.3 Periodic tests |
Upgrade testing support |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
op.cont.4 Alternative means |
Redundancy system |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Centros de Respaldo |
Full coverage |
Cloud Security |
Full coverage |
op.mon.1 Intrusion detection |
Industrial DPI for anomaly detection, Advanced detection of anomalies in the IP layer |
Integration of cybersecurity solutions in Control Centers |
Partial coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Partial coverage |
Cloud Security |
Partial coverage |
op.mon.2 Metrics system |
SIEM integration |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
CERT |
Full coverage |
Cloud Security |
Full coverage |
op.mon.3 Monitoring |
Network communication visualization |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Securing platforms, networks and services. CASB and End Point |
Full coverage |
Cloud Security |
Full coverage |
mp.if.1 Separate and access controlled areas |
Physical security in the installation of devices, Separation of environments |
Integration of cybersecurity solutions in Control Centers |
Partial coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Centros de Respaldo |
Full coverage |
Cloud Security |
Partial coverage |
mp.if.2 Identification of persons |
Hardware Security Keys |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
mp.if.3 Fitting out of the premises |
Physical security in the installation of devices |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Centros de Respaldo |
Full coverage |
mp.if.4 Electrical energy |
Redundancy system |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Centros de Respaldo |
Full coverage |
Cloud Security |
Full coverage |
mp.if.5 Fire protection |
Physical security in the installation of devices |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Centros de Respaldo |
Full coverage |
mp.if.6 Flood protection |
Physical security in the installation of devices |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Centros de Respaldo |
Full coverage |
mp.if.7 Entry and exit registration of equipment log |
Equipment protection diagnostics |
|
|
mp.per.1 Job description |
Awareness and Training |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cumplimiento normativo |
Full coverage |
Cybersecurity Services Management |
Full coverage |
Specialized Consulting in Cybersecurity |
Full coverage |
Regulatory Compliance |
Full coverage |
mp.per.2 Duties and obligations |
Awareness and Training |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cumplimiento normativo |
Full coverage |
Cybersecurity Services Management |
Full coverage |
Specialized Consulting in Cybersecurity |
Full coverage |
Regulatory Compliance |
Full coverage |
mp.per.3 Awareness |
Awareness and Training |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cumplimiento normativo |
Full coverage |
Cybersecurity Services Management |
Full coverage |
Specialized Consulting in Cybersecurity |
Full coverage |
Regulatory Compliance |
Full coverage |
mp.per.4 Training |
Awareness and Training |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cumplimiento normativo |
Full coverage |
Cybersecurity Services Management |
Full coverage |
Specialized Consulting in Cybersecurity |
Full coverage |
Regulatory Compliance |
Full coverage |
mp.eq.1 Clear workstation |
Equipment use control |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Critical Infrastructure Protection |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
mp.eq.2 Workstation locking |
Equipment use control |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Critical Infrastructure Protection |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
mp.eq.3 Protection of portable equipment |
Equipment use control |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Critical Infrastructure Protection |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
mp.eq.4 Other network-connected devices |
Device control |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Optimización de políticas de seguridad |
Full coverage |
mp.com.1 perimeter security |
Host-based firewall |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cloud Security |
Full coverage |
mp.com.2 Confidentiality protection |
Data Protection |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Securing platforms, networks and services. CASB and End Point |
Full coverage |
Cloud Security |
Full coverage |
Cybersecurity Services Management |
Full coverage |
mp.com.3 Integrity and authenticity protection |
Verification of integrity of software and hardware code |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
SCVD Services |
Full coverage |
Cybersecurity Services Management |
Full coverage |
mp.com.4 Separation of information flows in the network |
Secure network design |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Centros de Respaldo |
Full coverage |
Optimización de políticas de seguridad |
Full coverage |
Cloud Security |
Full coverage |
Cybersecurity Services Management |
Full coverage |
Specialized Consulting in Cybersecurity |
Full coverage |
mp.si.1 Support marking |
Industrial network event log (forensic analysis) |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cybersecurity Services Management |
Full coverage |
Forensic Analysis |
Full coverage |
mp.si.2 Cryptography |
PKI infrastructure |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cloud Security |
Full coverage |
mp.si.3 Custody |
Equipment protection diagnostics |
|
|
mp.si.4 Transport |
WI-FI control, Network communications control, Network integrity control, Data Protection |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Critical Infrastructure Protection |
Partial coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Securing platforms, networks and services. CASB and End Point |
Partial coverage |
Optimización de políticas de seguridad |
Partial coverage |
Cloud Security |
Partial coverage |
Cybersecurity Services Management |
Partial coverage |
mp.si.5 Erased and destruction |
Backup Policy |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Centros de Respaldo |
Full coverage |
Cloud Security |
Full coverage |
Cybersecurity Services Management |
Full coverage |
Specialized Consulting in Cybersecurity |
Full coverage |
mp.sw.1 Application development |
Software usage control, Verify PLC integrity |
Integration of cybersecurity solutions in Control Centers |
Partial coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Partial coverage |
SCVD Services |
Partial coverage |
Cloud Security |
Partial coverage |
mp.sw.2 Acceptance and commissioning |
Cybersecurity assessment |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Cybersecurity Assesment |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Red Team/Blue Team/Purple Team |
Full coverage |
Cumplimiento normativo |
Full coverage |
Cloud Security |
Full coverage |
Cybersecurity Services Management |
Full coverage |
Specialized Consulting in Cybersecurity |
Full coverage |
Regulatory Compliance |
Full coverage |
mp.info.1 Personal information |
Data Protection |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Securing platforms, networks and services. CASB and End Point |
Full coverage |
Cloud Security |
Full coverage |
Cybersecurity Services Management |
Full coverage |
mp.info.2 Information qualification |
Use control policy |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Securing platforms, networks and services. CASB and End Point |
Full coverage |
Cybersecurity Services Management |
Full coverage |
mp.info.3 Electronic signature |
PKI infrastructure |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Cloud Security |
Full coverage |
mp.info.4 Timestamps |
Security log, File integrity monitoring |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Partial coverage |
CERT |
Partial coverage |
Cloud Security |
Partial coverage |
mp.info.6 Backup |
Backup system |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Centros de Respaldo |
Full coverage |
Cloud Security |
Full coverage |
mp.s.1 E-mail protection |
Network communications control, Host-based firewall |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Critical Infrastructure Protection |
Partial coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Securing platforms, networks and services. CASB and End Point |
Partial coverage |
Optimización de políticas de seguridad |
Partial coverage |
SSL Inspection |
Partial coverage |
Cloud Security |
Full coverage |
mp.s.2 Protection of web services and applications |
Device control |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Optimización de políticas de seguridad |
Full coverage |
mp.s.3 Web browsing protection |
Network communications control, Host-based firewall |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Critical Infrastructure Protection |
Partial coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Securing platforms, networks and services. CASB and End Point |
Partial coverage |
Optimización de políticas de seguridad |
Partial coverage |
SSL Inspection |
Partial coverage |
Cloud Security |
Full coverage |
mp.s.4 Denial of service protection |
Network communications control, Device control, Host-based firewall |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Critical Infrastructure Protection |
Partial coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Securing platforms, networks and services. CASB and End Point |
Partial coverage |
Optimización de políticas de seguridad |
Partial coverage |
SSL Inspection |
Partial coverage |
Cloud Security |
Partial coverage |
mp.info.5 Document cleaning |
Backup Policy |
Integration of cybersecurity solutions in Control Centers |
Full coverage |
Servicios de Seguridad para Sistemas y Redes de Información |
Full coverage |
Centros de Respaldo |
Full coverage |
Cloud Security |
Full coverage |
Cybersecurity Services Management |
Full coverage |
Specialized Consulting in Cybersecurity |
Full coverage |