Navigation and service

Tools

Programs and Tools to improve cyber-security

Ein Maulschlüssel auf einer Tastatur
Source: © kmiragaya / Fotolia.com

LARS ICS

Light and Right Security ICS (LARS ICS) is a free tool that makes it easier for small and midsize enterprises involved in industrial control systems to take their first steps towards achieving cyber security. It provides organisations with questions they can use to assess the current state of their own cyber security and recommends the safeguards they should implement next (and in which areas). All safeguards are assigned to corresponding parts of the standards and procedures of IT-Grundschutz, ISO 27001, IEC 62443, and the BSI ICS Security Compendium, which facilitates the transition to using a holistic management system for information security.

In addition to the actual program, the archive contains a manual and the complete source text of LARS ICS.

LARS ICS (tool and manual)

RAPSN SETS

RAPSN SETS (Recognizing Anomalies in Protocols of Safety Networks: Schneider Electric‘s TriStation) is a set of rules for the Intrusion Detection System (IDS) Snort. They have been developed for Schneider Electric‘s proprietary TriStation protocol and are published under Mozilla Public License Version 2.0. This protocol is used, amongst other things, to retrieve data of a diagnosis and configure or program a safety controller produced by Schneider Electric. The rules come across as an additional layer of a defense-in-depth strategy.

The provided archive contains the Snort rules with the associated license.

RAPSN SETS

CSAF

A reported and fixed vulnerability is only the beginning of the vulnerability handling process on the operator side. In order to be protected from the vulnerability as a user, the corresponding update must be installed. Since the installation of updates can have far-reaching consequences, a prior risk assessment makes sense. In order to carry out such an assessment, the user must be provided with all relevant information about the vulnerability in a timely and efficient manner. Up to now, human-readable security information, so-called security advisories, have been published by the manufacturers or the coordinating bodies for this purpose.

CSAF