Coverage

Requirements coverage ENS Supplier SARENET

Requeriments Capacities Services/Solutions Coverage
org.1 Security Policy Compliance, Cybersecurity assessment, Risk and Vulnerability Management, Communications plan
Industrial IoT Security Partial coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Partial coverage
SOC - IIoT Network Partial coverage
Evolutionary security audits (Monitoring vulnerabilities in the OT-IIoT network) Partial coverage
Cloud/IT/OT NETWORK SEGMENTATION (NETWORK SEGMENTATION PROJECTS) Partial coverage
OT-IIoT contingency plans with remote cloud copies Partial coverage
OT Endpoint Security - EndPoint (Sarenet Managed Security) Partial coverage
org.2 Security standard Compliance
org.3 Security procedures Compliance, Use control policy, Activity log policy, Backup Policy
Industrial IoT Security Partial coverage
OT-IIoT contingency plans with remote cloud copies Partial coverage
OT Endpoint Security - EndPoint (Sarenet Managed Security) Partial coverage
org.4 Authorization process Account management, PKI infrastructure
Industrial IoT Security Partial coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Partial coverage
op.pl.1 Risk analysis Cybersecurity assessment, Risk and Vulnerability Management
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
SOC - IIoT Network Full coverage
Evolutionary security audits (Monitoring vulnerabilities in the OT-IIoT network) Full coverage
Cloud/IT/OT NETWORK SEGMENTATION (NETWORK SEGMENTATION PROJECTS) Partial coverage
OT-IIoT contingency plans with remote cloud copies Partial coverage
OT Endpoint Security - EndPoint (Sarenet Managed Security) Partial coverage
op.pl.2 Security architecture Network communications control, Secure network design
Industrial IoT Security Partial coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
SOC - IIoT Network Partial coverage
VIRTUAL PRIVATE NETWORK FOR INDUSTRIAL ENVIRONMENTS (VPN-MPLS) Full coverage
Cloud/IT/OT NETWORK SEGMENTATION (NETWORK SEGMENTATION PROJECTS) Partial coverage
op.pl.3 Acquisition of new components Configuration control, Equipment use control, Device control
Industrial IoT Security Partial coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Partial coverage
SOC - IIoT Network Partial coverage
op.pl.4 Sizing / Capacity Management Hardware and software inventory, Redundancy system
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
SOC - IIoT Network Partial coverage
Evolutionary security audits (Monitoring vulnerabilities in the OT-IIoT network) Partial coverage
VIRTUAL PRIVATE NETWORK FOR INDUSTRIAL ENVIRONMENTS (VPN-MPLS) Partial coverage
OT-IIoT contingency plans with remote cloud copies Partial coverage
op.pl.5 Certified components Certification of the main ICS providers
op.acc.1 Identification Hardware and software inventory, Access control policy
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Partial coverage
SOC - IIoT Network Partial coverage
Evolutionary security audits (Monitoring vulnerabilities in the OT-IIoT network) Partial coverage
op.acc.2 Access requirements Basic user access control, Multi-factor user access control, Access control policy
Industrial IoT Security Partial coverage
op.acc.3 Segregation of functions and tasks Account management
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
op.acc.4 Access rights management process Device control, Account management
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
SOC - IIoT Network Partial coverage
op.acc.5 op.acc.5 Authentication methods (external users) Hardware Security Keys, Basic user access control, Multi-factor user access control
op.acc.6 op.acc.6 Authentication methods (organization\'s users) Hardware Security Keys, Basic user access control, Multi-factor user access control
op.exp.1 Asset inventory Hardware and software inventory
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
SOC - IIoT Network Full coverage
Evolutionary security audits (Monitoring vulnerabilities in the OT-IIoT network) Full coverage
op.exp.2 Security configuration Configuration control
SOC - IIoT Network Full coverage
op.exp.3 Security Configuration Management Configuration control
SOC - IIoT Network Full coverage
op.exp.4 Maintenance and security updates Reliable updates, Upgrade testing support
Monitoring Vulnerabilities in the IT/OT/IIoT Network Partial coverage
Evolutionary security audits (Monitoring vulnerabilities in the OT-IIoT network) Partial coverage
op.exp.5 Change Management Configuration control
SOC - IIoT Network Full coverage
op.exp.6 Protection against malicious code Advanced antimalware
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
SOC - IIoT Network Full coverage
Evolutionary security audits (Monitoring vulnerabilities in the OT-IIoT network) Full coverage
OT Endpoint Security - EndPoint (Sarenet Managed Security) Full coverage
op.exp.7 Incident Management Incident response support
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
SOC - IIoT Network Full coverage
Evolutionary security audits (Monitoring vulnerabilities in the OT-IIoT network) Full coverage
VIRTUAL PRIVATE NETWORK FOR INDUSTRIAL ENVIRONMENTS (VPN-MPLS) Full coverage
OT-IIoT contingency plans with remote cloud copies Full coverage
op.exp.8 Activity log Inspect endpoint logs, Activity log policy
Industrial IoT Security Partial coverage
Evolutionary security audits (Monitoring vulnerabilities in the OT-IIoT network) Partial coverage
OT Endpoint Security - EndPoint (Sarenet Managed Security) Full coverage
op.exp.9 Incident management log Inspect endpoint logs, Activity log policy
Industrial IoT Security Partial coverage
Evolutionary security audits (Monitoring vulnerabilities in the OT-IIoT network) Partial coverage
OT Endpoint Security - EndPoint (Sarenet Managed Security) Full coverage
op.exp.10 Protection of cryptographic keys PKI infrastructure
op.ext.1 Contracting and service level agreements Certification of the main ICS providers
op.ext.2 Day-to-day management Account management
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
op.ext.3 Supply Chain Protection Awareness and Training
op.ext.4 Systems interconnection Network communication visualization
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
SOC - IIoT Network Full coverage
VIRTUAL PRIVATE NETWORK FOR INDUSTRIAL ENVIRONMENTS (VPN-MPLS) Full coverage
op.nub.1 Cloud services protection Data Protection
OT-IIoT contingency plans with remote cloud copies Full coverage
OT Endpoint Security - EndPoint (Sarenet Managed Security) Full coverage
op.cont.1 Impact analysis Risk and Vulnerability Management
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
SOC - IIoT Network Full coverage
Evolutionary security audits (Monitoring vulnerabilities in the OT-IIoT network) Full coverage
OT-IIoT contingency plans with remote cloud copies Full coverage
op.cont.2 Continuity plan Redundancy system, Backup system
Industrial IoT Security Partial coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
VIRTUAL PRIVATE NETWORK FOR INDUSTRIAL ENVIRONMENTS (VPN-MPLS) Partial coverage
OT-IIoT contingency plans with remote cloud copies Full coverage
op.cont.3 Periodic tests Upgrade testing support
op.cont.4 Alternative means Redundancy system
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
VIRTUAL PRIVATE NETWORK FOR INDUSTRIAL ENVIRONMENTS (VPN-MPLS) Full coverage
OT-IIoT contingency plans with remote cloud copies Full coverage
op.mon.1 Intrusion detection Industrial DPI for anomaly detection, Advanced detection of anomalies in the IP layer
SOC - IIoT Network Partial coverage
Evolutionary security audits (Monitoring vulnerabilities in the OT-IIoT network) Full coverage
OT Endpoint Security - EndPoint (Sarenet Managed Security) Partial coverage
op.mon.2 Metrics system SIEM integration
op.mon.3 Monitoring Network communication visualization
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
SOC - IIoT Network Full coverage
VIRTUAL PRIVATE NETWORK FOR INDUSTRIAL ENVIRONMENTS (VPN-MPLS) Full coverage
mp.if.1 Separate and access controlled areas Physical security in the installation of devices, Separation of environments
Industrial IoT Security Partial coverage
Evolutionary security audits (Monitoring vulnerabilities in the OT-IIoT network) Partial coverage
VIRTUAL PRIVATE NETWORK FOR INDUSTRIAL ENVIRONMENTS (VPN-MPLS) Partial coverage
Cloud/IT/OT NETWORK SEGMENTATION (NETWORK SEGMENTATION PROJECTS) Partial coverage
mp.if.2 Identification of persons Hardware Security Keys
mp.if.3 Fitting out of the premises Physical security in the installation of devices
Industrial IoT Security Full coverage
mp.if.4 Electrical energy Redundancy system
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
VIRTUAL PRIVATE NETWORK FOR INDUSTRIAL ENVIRONMENTS (VPN-MPLS) Full coverage
OT-IIoT contingency plans with remote cloud copies Full coverage
mp.if.5 Fire protection Physical security in the installation of devices
Industrial IoT Security Full coverage
mp.if.6 Flood protection Physical security in the installation of devices
Industrial IoT Security Full coverage
mp.if.7 Entry and exit registration of equipment log Equipment protection diagnostics
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
mp.per.1 Job description Awareness and Training
mp.per.2 Duties and obligations Awareness and Training
mp.per.3 Awareness Awareness and Training
mp.per.4 Training Awareness and Training
mp.eq.1 Clear workstation Equipment use control
Industrial IoT Security Full coverage
mp.eq.2 Workstation locking Equipment use control
Industrial IoT Security Full coverage
mp.eq.3 Protection of portable equipment Equipment use control
Industrial IoT Security Full coverage
mp.eq.4 Other network-connected devices Device control
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
SOC - IIoT Network Full coverage
mp.com.1 perimeter security Host-based firewall
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
mp.com.2 Confidentiality protection Data Protection
OT-IIoT contingency plans with remote cloud copies Full coverage
OT Endpoint Security - EndPoint (Sarenet Managed Security) Full coverage
mp.com.3 Integrity and authenticity protection Verification of integrity of software and hardware code
mp.com.4 Separation of information flows in the network Secure network design
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
VIRTUAL PRIVATE NETWORK FOR INDUSTRIAL ENVIRONMENTS (VPN-MPLS) Full coverage
Cloud/IT/OT NETWORK SEGMENTATION (NETWORK SEGMENTATION PROJECTS) Full coverage
mp.si.1 Support marking Industrial network event log (forensic analysis)
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
SOC - IIoT Network Full coverage
VIRTUAL PRIVATE NETWORK FOR INDUSTRIAL ENVIRONMENTS (VPN-MPLS) Full coverage
mp.si.2 Cryptography PKI infrastructure
mp.si.3 Custody Equipment protection diagnostics
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
mp.si.4 Transport WI-FI control, Network communications control, Network integrity control, Data Protection
Industrial IoT Security Partial coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Partial coverage
SOC - IIoT Network Partial coverage
Evolutionary security audits (Monitoring vulnerabilities in the OT-IIoT network) Partial coverage
VIRTUAL PRIVATE NETWORK FOR INDUSTRIAL ENVIRONMENTS (VPN-MPLS) Partial coverage
OT-IIoT contingency plans with remote cloud copies Partial coverage
OT Endpoint Security - EndPoint (Sarenet Managed Security) Partial coverage
mp.si.5 Erased and destruction Backup Policy
OT-IIoT contingency plans with remote cloud copies Full coverage
mp.sw.1 Application development Software usage control, Verify PLC integrity
Industrial IoT Security Partial coverage
SOC - IIoT Network Partial coverage
Evolutionary security audits (Monitoring vulnerabilities in the OT-IIoT network) Full coverage
mp.sw.2 Acceptance and commissioning Cybersecurity assessment
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
SOC - IIoT Network Full coverage
Evolutionary security audits (Monitoring vulnerabilities in the OT-IIoT network) Full coverage
Cloud/IT/OT NETWORK SEGMENTATION (NETWORK SEGMENTATION PROJECTS) Full coverage
OT Endpoint Security - EndPoint (Sarenet Managed Security) Full coverage
mp.info.1 Personal information Data Protection
OT-IIoT contingency plans with remote cloud copies Full coverage
OT Endpoint Security - EndPoint (Sarenet Managed Security) Full coverage
mp.info.2 Information qualification Use control policy
OT Endpoint Security - EndPoint (Sarenet Managed Security) Full coverage
mp.info.3 Electronic signature PKI infrastructure
mp.info.4 Timestamps Security log, File integrity monitoring
Industrial IoT Security Partial coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Partial coverage
SOC - IIoT Network Partial coverage
Evolutionary security audits (Monitoring vulnerabilities in the OT-IIoT network) Partial coverage
VIRTUAL PRIVATE NETWORK FOR INDUSTRIAL ENVIRONMENTS (VPN-MPLS) Partial coverage
OT Endpoint Security - EndPoint (Sarenet Managed Security) Partial coverage
mp.info.6 Backup Backup system
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
OT-IIoT contingency plans with remote cloud copies Full coverage
mp.s.1 E-mail protection Network communications control, Host-based firewall
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
SOC - IIoT Network Partial coverage
VIRTUAL PRIVATE NETWORK FOR INDUSTRIAL ENVIRONMENTS (VPN-MPLS) Partial coverage
mp.s.2 Protection of web services and applications Device control
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
SOC - IIoT Network Full coverage
mp.s.3 Web browsing protection Network communications control, Host-based firewall
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
SOC - IIoT Network Partial coverage
VIRTUAL PRIVATE NETWORK FOR INDUSTRIAL ENVIRONMENTS (VPN-MPLS) Partial coverage
mp.s.4 Denial of service protection Network communications control, Device control, Host-based firewall
Industrial IoT Security Full coverage
Monitoring Vulnerabilities in the IT/OT/IIoT Network Full coverage
SOC - IIoT Network Partial coverage
VIRTUAL PRIVATE NETWORK FOR INDUSTRIAL ENVIRONMENTS (VPN-MPLS) Partial coverage
mp.info.5 Document cleaning Backup Policy
OT-IIoT contingency plans with remote cloud copies Full coverage