Coverage

Requirements coverage ENS Supplier ROCKWELL AUTOMATION

Requeriments Capacities Services/Solutions Coverage
org.1 Security Policy Compliance, Cybersecurity assessment, Risk and Vulnerability Management, Communications plan
Hygiene Level Consulting - Security Posture Survey Partial coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
OT Network Assestment Partial coverage
Convergent Plant Wide Ethernet IT-OT Network design, including iDMZ Partial coverage
Industrial Data Center Partial coverage
Continuous Threat Detection in OT Infrastructures Partial coverage
org.2 Security standard Compliance
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
org.3 Security procedures Compliance, Use control policy, Activity log policy, Backup Policy
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Partial coverage
Industrial Data Center Partial coverage
Continuous Threat Detection in OT Infrastructures Partial coverage
Solution for Secure Remote Access Partial coverage
org.4 Authorization process Account management, PKI infrastructure
Solution for Secure Remote Access Partial coverage
op.pl.1 Risk analysis Cybersecurity assessment, Risk and Vulnerability Management
Hygiene Level Consulting - Security Posture Survey Full coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Continuous Threat Detection in OT Infrastructures Partial coverage
op.pl.2 Security architecture Network communications control, Secure network design
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
OT Network Assestment Full coverage
Convergent Plant Wide Ethernet IT-OT Network design, including iDMZ Partial coverage
Continuous Threat Detection in OT Infrastructures Partial coverage
op.pl.3 Acquisition of new components Configuration control, Equipment use control, Device control
Hygiene Level Consulting - Security Posture Survey Partial coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Convergent Plant Wide Ethernet IT-OT Network design, including iDMZ Partial coverage
Industrial Data Center Partial coverage
Continuous Threat Detection in OT Infrastructures Partial coverage
Solution for Secure Remote Access Full coverage
op.pl.4 Sizing / Capacity Management Hardware and software inventory, Redundancy system
Hygiene Level Consulting - Security Posture Survey Partial coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Partial coverage
Convergent Plant Wide Ethernet IT-OT Network design, including iDMZ Partial coverage
Continuous Threat Detection in OT Infrastructures Partial coverage
op.pl.5 Certified components Certification of the main ICS providers
Hygiene Level Consulting - Security Posture Survey Full coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Solution for Secure Remote Access Full coverage
op.acc.1 Identification Hardware and software inventory, Access control policy
Hygiene Level Consulting - Security Posture Survey Partial coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Convergent Plant Wide Ethernet IT-OT Network design, including iDMZ Partial coverage
Continuous Threat Detection in OT Infrastructures Partial coverage
op.acc.2 Access requirements Basic user access control, Multi-factor user access control, Access control policy
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Partial coverage
Solution for Secure Remote Access Partial coverage
op.acc.3 Segregation of functions and tasks Account management
Solution for Secure Remote Access Full coverage
op.acc.4 Access rights management process Device control, Account management
Hygiene Level Consulting - Security Posture Survey Partial coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Partial coverage
Convergent Plant Wide Ethernet IT-OT Network design, including iDMZ Partial coverage
Industrial Data Center Partial coverage
Continuous Threat Detection in OT Infrastructures Partial coverage
Solution for Secure Remote Access Full coverage
op.acc.5 op.acc.5 Authentication methods (external users) Hardware Security Keys, Basic user access control, Multi-factor user access control
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Partial coverage
Solution for Secure Remote Access Full coverage
op.acc.6 op.acc.6 Authentication methods (organization\'s users) Hardware Security Keys, Basic user access control, Multi-factor user access control
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Partial coverage
Solution for Secure Remote Access Full coverage
op.exp.1 Asset inventory Hardware and software inventory
Hygiene Level Consulting - Security Posture Survey Full coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Convergent Plant Wide Ethernet IT-OT Network design, including iDMZ Full coverage
Continuous Threat Detection in OT Infrastructures Full coverage
op.exp.2 Security configuration Configuration control
Hygiene Level Consulting - Security Posture Survey Full coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Convergent Plant Wide Ethernet IT-OT Network design, including iDMZ Full coverage
Industrial Data Center Full coverage
Continuous Threat Detection in OT Infrastructures Full coverage
Solution for Secure Remote Access Full coverage
op.exp.3 Security Configuration Management Configuration control
Hygiene Level Consulting - Security Posture Survey Full coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Convergent Plant Wide Ethernet IT-OT Network design, including iDMZ Full coverage
Industrial Data Center Full coverage
Continuous Threat Detection in OT Infrastructures Full coverage
Solution for Secure Remote Access Full coverage
op.exp.4 Maintenance and security updates Reliable updates, Upgrade testing support
Hygiene Level Consulting - Security Posture Survey Full coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Industrial Data Center Full coverage
op.exp.5 Change Management Configuration control
Hygiene Level Consulting - Security Posture Survey Full coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Convergent Plant Wide Ethernet IT-OT Network design, including iDMZ Full coverage
Industrial Data Center Full coverage
Continuous Threat Detection in OT Infrastructures Full coverage
Solution for Secure Remote Access Full coverage
op.exp.6 Protection against malicious code Advanced antimalware
Continuous Threat Detection in OT Infrastructures Full coverage
op.exp.7 Incident Management Incident response support
Continuous Threat Detection in OT Infrastructures Full coverage
op.exp.8 Activity log Inspect endpoint logs, Activity log policy
Continuous Threat Detection in OT Infrastructures Partial coverage
Solution for Secure Remote Access Partial coverage
op.exp.9 Incident management log Inspect endpoint logs, Activity log policy
Continuous Threat Detection in OT Infrastructures Partial coverage
Solution for Secure Remote Access Partial coverage
op.exp.10 Protection of cryptographic keys PKI infrastructure
op.ext.1 Contracting and service level agreements Certification of the main ICS providers
Hygiene Level Consulting - Security Posture Survey Full coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Solution for Secure Remote Access Full coverage
op.ext.2 Day-to-day management Account management
Solution for Secure Remote Access Full coverage
op.ext.3 Supply Chain Protection Awareness and Training
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
OT Network Assestment Full coverage
op.ext.4 Systems interconnection Network communication visualization
Hygiene Level Consulting - Security Posture Survey Full coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Continuous Threat Detection in OT Infrastructures Full coverage
op.nub.1 Cloud services protection Data Protection
op.cont.1 Impact analysis Risk and Vulnerability Management
Hygiene Level Consulting - Security Posture Survey Full coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Continuous Threat Detection in OT Infrastructures Full coverage
op.cont.2 Continuity plan Redundancy system, Backup system
Industrial Data Center Partial coverage
op.cont.3 Periodic tests Upgrade testing support
Hygiene Level Consulting - Security Posture Survey Full coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Industrial Data Center Full coverage
op.cont.4 Alternative means Redundancy system
op.mon.1 Intrusion detection Industrial DPI for anomaly detection, Advanced detection of anomalies in the IP layer
Hygiene Level Consulting - Security Posture Survey Partial coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Partial coverage
Continuous Threat Detection in OT Infrastructures Partial coverage
op.mon.2 Metrics system SIEM integration
Continuous Threat Detection in OT Infrastructures Full coverage
op.mon.3 Monitoring Network communication visualization
Hygiene Level Consulting - Security Posture Survey Full coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Continuous Threat Detection in OT Infrastructures Full coverage
mp.if.1 Separate and access controlled areas Physical security in the installation of devices, Separation of environments
Hygiene Level Consulting - Security Posture Survey Partial coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Partial coverage
Convergent Plant Wide Ethernet IT-OT Network design, including iDMZ Full coverage
Industrial Data Center Full coverage
Continuous Threat Detection in OT Infrastructures Partial coverage
mp.if.2 Identification of persons Hardware Security Keys
Solution for Secure Remote Access Full coverage
mp.if.3 Fitting out of the premises Physical security in the installation of devices
Convergent Plant Wide Ethernet IT-OT Network design, including iDMZ Full coverage
Industrial Data Center Full coverage
mp.if.4 Electrical energy Redundancy system
mp.if.5 Fire protection Physical security in the installation of devices
Convergent Plant Wide Ethernet IT-OT Network design, including iDMZ Full coverage
Industrial Data Center Full coverage
mp.if.6 Flood protection Physical security in the installation of devices
Convergent Plant Wide Ethernet IT-OT Network design, including iDMZ Full coverage
Industrial Data Center Full coverage
mp.if.7 Entry and exit registration of equipment log Equipment protection diagnostics
Continuous Threat Detection in OT Infrastructures Full coverage
mp.per.1 Job description Awareness and Training
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
OT Network Assestment Full coverage
mp.per.2 Duties and obligations Awareness and Training
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
OT Network Assestment Full coverage
mp.per.3 Awareness Awareness and Training
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
OT Network Assestment Full coverage
mp.per.4 Training Awareness and Training
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
OT Network Assestment Full coverage
mp.eq.1 Clear workstation Equipment use control
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Solution for Secure Remote Access Full coverage
mp.eq.2 Workstation locking Equipment use control
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Solution for Secure Remote Access Full coverage
mp.eq.3 Protection of portable equipment Equipment use control
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Solution for Secure Remote Access Full coverage
mp.eq.4 Other network-connected devices Device control
Hygiene Level Consulting - Security Posture Survey Full coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Convergent Plant Wide Ethernet IT-OT Network design, including iDMZ Full coverage
Industrial Data Center Full coverage
Continuous Threat Detection in OT Infrastructures Full coverage
Solution for Secure Remote Access Full coverage
mp.com.1 perimeter security Host-based firewall
mp.com.2 Confidentiality protection Data Protection
mp.com.3 Integrity and authenticity protection Verification of integrity of software and hardware code
Hygiene Level Consulting - Security Posture Survey Full coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Industrial Data Center Full coverage
Continuous Threat Detection in OT Infrastructures Full coverage
mp.com.4 Separation of information flows in the network Secure network design
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
OT Network Assestment Full coverage
Convergent Plant Wide Ethernet IT-OT Network design, including iDMZ Full coverage
mp.si.1 Support marking Industrial network event log (forensic analysis)
Continuous Threat Detection in OT Infrastructures Full coverage
mp.si.2 Cryptography PKI infrastructure
mp.si.3 Custody Equipment protection diagnostics
Continuous Threat Detection in OT Infrastructures Full coverage
mp.si.4 Transport WI-FI control, Network communications control, Network integrity control, Data Protection
Hygiene Level Consulting - Security Posture Survey Partial coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Partial coverage
OT Network Assestment Partial coverage
Continuous Threat Detection in OT Infrastructures Partial coverage
mp.si.5 Erased and destruction Backup Policy
Industrial Data Center Full coverage
mp.sw.1 Application development Software usage control, Verify PLC integrity
Hygiene Level Consulting - Security Posture Survey Partial coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Partial coverage
Continuous Threat Detection in OT Infrastructures Partial coverage
mp.sw.2 Acceptance and commissioning Cybersecurity assessment
Hygiene Level Consulting - Security Posture Survey Full coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
mp.info.1 Personal information Data Protection
mp.info.2 Information qualification Use control policy
mp.info.3 Electronic signature PKI infrastructure
mp.info.4 Timestamps Security log, File integrity monitoring
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Partial coverage
mp.info.6 Backup Backup system
Industrial Data Center Full coverage
mp.s.1 E-mail protection Network communications control, Host-based firewall
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Partial coverage
OT Network Assestment Partial coverage
Continuous Threat Detection in OT Infrastructures Partial coverage
mp.s.2 Protection of web services and applications Device control
Hygiene Level Consulting - Security Posture Survey Full coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Full coverage
Convergent Plant Wide Ethernet IT-OT Network design, including iDMZ Full coverage
Industrial Data Center Full coverage
Continuous Threat Detection in OT Infrastructures Full coverage
Solution for Secure Remote Access Full coverage
mp.s.3 Web browsing protection Network communications control, Host-based firewall
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Partial coverage
OT Network Assestment Partial coverage
Continuous Threat Detection in OT Infrastructures Partial coverage
mp.s.4 Denial of service protection Network communications control, Device control, Host-based firewall
Hygiene Level Consulting - Security Posture Survey Partial coverage
Industrial Cybersecurity Risk Assessment and Consulting according to ISA 62443 Partial coverage
OT Network Assestment Partial coverage
Convergent Plant Wide Ethernet IT-OT Network design, including iDMZ Partial coverage
Industrial Data Center Partial coverage
Continuous Threat Detection in OT Infrastructures Partial coverage
Solution for Secure Remote Access Partial coverage
mp.info.5 Document cleaning Backup Policy
Industrial Data Center Full coverage