El Diario del CISO El Diario del CISO (The CISO Journal) Edición 24 - Page 4

Influencers Isiah Jones MPS, CISSP, GICSP, C|CISO, VP, Global ICS Security Service Delivery SECURITY PRACTICES FOR IEC 61131-3 PLC PROGRAMMING LANGUAGES PART 3: FBD Within the industrial control systems (ICS), automation, operational technology (OT), cyber-physical systems (CPS), industrial internet of things (IIoT) and instrumentation communities many of the devices with some form of computing and logical capabilities rely on 5 primary programming languages specific to programmable logic controllers (PLCs) that are defined in IEC 61131-3 as Sequential Function Chart (SFC), Ladder Diagram aka Ladder Logic (LD), Function Block Diagram (FBD), Instruction List (IL) and Structure Text (ST). In the IT community OWASP, NIST, SANS, CMMI, ISC2 and EC-Council, among others, have already created secure coding and secure development guidelines, best practices, testing tools and tips for higher level languages such as C, C++, Java, Python, JSON, HTML, XML, SQL and others. Some could argue that Structure Text includes several of these high-level languages. However, there has not been much focus by international standards organizations or industry experts on implementing security within the other 4 primary PLC focused languages in ICS. As a result, we wanted to share some of our recommendations for each of the IEC 61131-3 PLC languages in a 5-part blog series and aggregated white paper. In part 1 of our series we focused on Sequential Function Chart (SFC) and in part 2 we focused on Ladder Diagram or Ladder Logic (LD). Here in part 3 we will focus on Function Block Diagram (FBD). The complete article is here Caitlin Durkovich Futurist and infrastructure security expert Security by Design: Creating the Critical Infrastructure of the Future We are regularly asked about the biggest risks to critical infrastructure. Recent news headlines blare concern about Russians infiltrating US utility control rooms, child hackers laying waste to voting machines, bridge collapses that serve as a reminder to crumbling infrastructure worldwide, and extreme weather that is exacerbating a taxed, highly interdependent and increasingly fragile infrastructure ecosystem. I subscribe to the 2013 National Infrastructure Protection Plan’s characterization of risk, which refers to the “potential for an unwanted outcome resulting from an incident, event, or occurrence, as determined by its likelihood [a function of threats and vulnerabilities] and the associated consequences.” I also subscribe to the notion that security and resilience are strengthened through risk management. The complete article is here Paul Stewart Security Tester at 'Confidential' What you really need for Pentesting I've been a pentester for about a year and a half now. Been very quiet lately, since my last post about OSCP, but at that time it was all I knew. PWK/OSCP was my life, and I gave up a lot to do it. Working as a pentester is a very different thing to training to be one. I wanted to shed a little light on what you really need to be a competent pentester. Networking A wise man once said to me "Doing the test isn't the issue, getting to the thing you need to test is". The complete article is here