工业控制系统安全评估流程 i g u th 5 b m o .c 关于绿盟科技 北京神州绿盟信息安全科技股份有限公司(以下简称绿盟科技公司),成立于 2000 年 4 月, 总部位于北京。公司于 2014 年 1 月 29 日在深圳证券交易所创业板上市,证券代码:300369。 绿盟科技在国内设有 40 多个分支机构,为政府、运营商、金融、能源、互联网以及教育、医疗 等行业用户,提供全线网络安全产品、全方位安全解决方案和体系化安全运营服务。公司在美国 硅谷、日本东京、英国伦敦、新加坡设立海外子公司,深入开展全球业务,打造全球网络安全行 业的中国品牌。 u th i g 版权声明 5 b 为避免合作伙伴及客户数据泄露,所有数据在进行分析前都已经过匿名化处理,不会在中 间环节出现泄露,任何与客户有关的具体信息,均不会出现在本报告中。 m o .c 工业控制系统安全评估流程 目录 CONTENTS 目录 1. 综述 ·······································································································································································1 2. 目标定义与系统评定 ············································································································································3 2.1 目标定义······················································································································································································· 4 2.2 系统评定与分类 ·········································································································································································· 5 m o .c 3. 资产评估 ·······························································································································································6 3.1 资产识别与分类 ·········································································································································································· 7 3.2 网络拓扑审查··············································································································································································· 8 3.3 数据流审查··················································································································································································· 8 5 b 3.4 风险资产预筛··············································································································································································· 8 4. 脆弱性评估 ···························································································································································9 u th 4.1 安全策略脆弱性 ········································································································································································ 11 i g 4.2 架构与设计脆弱性 ···································································································································································· 12 4.3 配置与维护脆弱性 ···································································································································································· 12 4.4 物理环境脆弱性 ········································································································································································ 13 4.5 产品开发过程脆弱性 ································································································································································ 14 4.6 通信与配置脆弱性 ···································································································································································· 14 5. 风险场景构建 ·····················································································································································16 5.1 威胁评估····················································································································································································· 17 5.2 攻击向量评估············································································································································································· 18 5.3 威胁事件构建············································································································································································· 19 5.4 风险场景构建············································································································································································· 20 A 工业控制系统安全评估流程 目录 CONTENTS 6. 风险计算与缓解策略 ··········································································································································25 6.1 风险计算····················································

pdf文档 绿盟 工业控制系统安全评估流程

文档预览
中文文档 50 页 50 下载 1000 浏览 0 评论 0 收藏 3.0分
温馨提示:本文档共50页,可预览 3 页,如浏览全部内容或当前文档出现乱码,可开通会员下载原始文档
绿盟 工业控制系统安全评估流程 第 1 页 绿盟 工业控制系统安全评估流程 第 2 页 绿盟 工业控制系统安全评估流程 第 3 页
下载文档到电脑,方便使用
本文档由 路人甲 于 2022-07-17 01:21:07上传分享
加微信群 有优惠
站内资源均来自网友分享或网络收集整理,若无意中侵犯到您的权利,敬请联系我们微信(点击查看客服),我们将及时删除相关资源。