SCADA Security Analysis Service Product

The move from proprietary technologies to more standardized and open solutions, together with the increased number of connections between SCADA systems and office networks and the Internet, has made them more vulnerable to attacks - see references. 1 2 3

Features

Technical

inspector.png

Socio-Technical

benefits-sociotech.png

Benefits

Technical

benefits-tech.png


Socio-Technical

inspector.png

Example workflow

Technical

analyzer.png

Socio-Techncal

peoplecomputers.png

Clarified Tools for and Infrastructure SCADA security audits

Due to the tools and infrastructure build by Clarified Networks, we can cost-efficiently map complex networks and their socio-technical relationships. This mapping helps us in providing you more valuable and accurate threat and risk assessment.

analyzer2.png

Clarified SCADA Related Experience

ClarifiedVisualizationGallery/f-secure.png


SCADA engagements in practice

1. Interface Analysis

We will utilize Clarified Analyzer and other tools to map your system. Interface analysis combines passive measurements from the actual traffic of the system, active scanning and other means to extract interfaces that are 1) directly, 2) indirectly exposed to external attacks.

One or more of these approaches will be used in your SCADA security analysis.

2. Vulnerability Scanning (through partners)

Identifying Stakeholders

Situational Awareness