首页> 外文会议>Advanced machinery technology symposium >A Phased Approach to Cyber Hardening a Machinery Control System (MCS) - CG47 Class MCS Implementation
【24h】

A Phased Approach to Cyber Hardening a Machinery Control System (MCS) - CG47 Class MCS Implementation

机译:机械控制系统(MCS)网络加固的分阶段方法-CG47类MCS实施

获取原文
获取外文期刊封面目录资料

摘要

Unlike the Navy Network Connected Centrally Managed (NCCM) implementation of cyber requirements, implementation on a ship machinery control system (MCS) presents special implications. Implementing Defense Information Security Agency (DISA) requirements on the NCCM network may follow an approach of "meet the cyber requirements and fix the operational issues later." This approach may not be feasible for critical shipboard machinery control systems (MCS) where errors can lead to system non-availability or, in severe circumstances, equipment and personnel safety issues. If not done as a part of an overall software development strategy, security patching and Security Technical Implementation Guides (STIGs) can cause issues with the functionality of a complex and integrated MCS. With the potential for extensive testing required to ensure system functionality, meeting STIG and Information assurance Vulnerability Management (IAVM) requirements requires an approach that will allow for a robust and development process while not impeding fielding plans and delivery schedules.Random implementation of all the requirements for typical internet connected devices can cripple components, connections, or whole systems. To maintain the integrity and reliability of a MCS, a phased approach to cyber hardening implementation is utilized by the CG47 MCS In-Service Engineering Agent (ISEA).The objectives of this paper include a presentation of the CG47 MCS methodology of cyber hardening, including the process of planning, testing, and implementing cyber security updates for the MCS. The paper will address ways to implement cyber security in phases with consideration for flexibility to meet schedules and fielding plans. The paper will also discuss some of the issues that may arise during cyber-hardening of a MCS. The concentration ofthis paper is the CG47 MCS methods applied to the operator console software system. The greatest chance for vulnerability to cyber compromise exists on the Microsoft Windows based operator consoles. While physical methods for system isolation and security are also implemented, the goal of this paper is to discuss the methodology, processes, and techniques of operator console cyber hardening.Key Points to be presented include1. MCS operational needs and basic system security.2. CG MCS generic process for cyber implementation.3. Scan, remediation, and testing.4. Patching and STIGing of systems and issue mitigation.5. Lessons learned from CG MCS design and ongoing problems.
机译:与网络要求的海军网络连接集中管理(NCCM)实现不同,在船舶机械控制系统(MCS)上实现具有特殊的含义。在NCCM网络上实施国防信息安全局(DISA)要求可以遵循“满足网络要求并在以后解决操作问题”的方法。这种方法对于关键的船用机械控制系统(MCS)可能不可行,在这些系统中,错误可能导致系统不可用,或者在严重情况下会导致设备和人员安全问题。如果不作为整体软件开发策略的一部分进行操作,则安全修补程序和《安全技术实施指南》(STIG)可能会导致复杂且集成的MCS的功能出现问题。为了确保系统功能需要进行广泛的测试,要满足STIG和信息保证漏洞管理(IAVM)的要求,就需要一种方法,该方法应能够进行稳健的开发过程,同时又不妨碍部署计划和交付进度。 随机实施典型的Internet连接设备的所有要求可能会削弱组件,连接或整个系统。为了保持MCS的完整性和可靠性,CG47 MCS服务工程代理(ISEA)使用了分阶段的网络强化实施方法。 本文的目标包括介绍CG47 MCS网络强化方法,包括为MCS计划,测试和实施网络安全更新的过程。本文将探讨分阶段实施网络安全的方法,同时考虑到满足时间表和部署计划的灵活性。本文还将讨论在MCS的网络强化过程中​​可能出现的一些问题。浓度 本文是CG47 MCS方法应用于操作员控制台软件系统的方法。基于Microsoft Windows的操作员控制台上最容易遭受网络攻击的机会。虽然还实现了用于系统隔离和安全性的物理方法,但本文的目的是讨论操作员控制台网络强化的方法,过程和技术。 提出的要点包括 1. MCS的操作需求和基本的系统安全性。 2. CG MCS网络实施的通用流程。 3.扫描,修复和测试。 4.对系统进行修补和标记以及缓解问题。 5.从CG MCS设计和持续存在的问题中学到的经验教训。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号