SI-5: SECURITY FUNCTION VERIFICATION
TAILORED FOR INDUSTRIAL CONTROL SYSTEMS
ICS Control Baselines:
The information system:
- a. Verifies the correct operation of [Assignment: organization-defined security functions];
- b. Performs this verification [Selection (one or more): [Assignment: organization-defined system transitional states]; upon command by user with appropriate privilege; [Assignment: organization-defined frequency]];
- c. Notifies [Assignment: organization-defined personnel or roles] of failed security verification tests; and
- d. [Selection (one or more): shuts the information system down; restarts the information system; [Assignment: organization-defined alternative action(s)]] when anomalies are discovered.
The United States Computer Emergency Readiness Team (US-CERT) generates security alerts and advisories to maintain situational awareness across the federal government. Security directives are issued by OMB or other designated organizations with the responsibility and authority to issue such directives. Compliance to security directives is essential due to the critical nature of many of these directives and the potential immediate adverse effects on organizational operations and assets, individuals, other organizations, and the Nation should the directives not be implemented in a timely manner. External organizations include, for example, external mission/business partners, supply chain partners, external service providers, and other peer/supporting organizations.
ICS SUPPLEMENTAL GUIDANCE
The DHS Industrial Control Systems Cyber Emergency Response Team (ICS- CERT) generates security alerts and advisories relative to ICS http://ics-cert.us-cert.gov/ .
RELATED CONTROLS: SI-5
SI-5 (1) SECURITY ALERTS, ADVISORIES, AND DIRECTIVES | AUTOMATED ALERTS AND ADVISORIES
The organization employs automated mechanisms to make security alert and advisory information available throughout the organization.
The significant number of changes to organizational information systems and the environments in which those systems operate requires the dissemination of security-related information to a variety of organizational entities that have a direct interest in the success of organizational missions and business functions. Based on the information provided by the security alerts and advisories, changes may be required at one or more of the three tiers related to the management of information security risk including the governance level, mission/business process/enterprise architecture level, and the information system level.
No ICS Supplemental Guidance.
- NIST Special Publication 800-40