Logitek Receives the ICT Security Service Trophy of the Year 2016
LOGITEK has received the ICT Security Service Trophy of the year 2016, awarded by the magazine redseguridad for its service of “Auditing and Vulnerability Analysis of OT (Operation Technology) envir...
Logitek, Bronze sponsor of the Industrial Cybersecurity Center (CCI) and member of the National Network of Industrial Laboratories (RNLI), an initiative sponsored by INCIBE, has received the ICT Security Service Trophy of the Year 2016, awarded by the magazine redseguridad for its “Auditing and Vulnerability Analysis of OT (Operation Technology) environments based on MAASERISv2.1: “Methodology for the Analysis, Security Audit and Evaluation of the Operational Risk of Industrial Networks and SCADA Systems.” service.
Within the continuous improvement process of industrial cybersecurity, the need to analyze and identify the main assets and vulnerabilities associated with OT (Operation Technology) environments and carry out comprehensive management and evaluation of operational risk always appears as the first step or stage.
To carry out this analysis and evaluation, it is necessary to have specific methodologies that take into account the particular idiosyncrasies of these operating environments.
Logitek provides this new audit and vulnerability analysis service associated with OT environments based on an internally developed methodology called MAASERISv2.1 (Methodology for Analysis, Security Audit and Operational Risk Assessment of Industrial Networks and SCADA systems).
This methodology is a set of processes, tools and deliverables that allow:
- Analyze the current state of an industrial network from a security point of view, with special emphasis on the evaluation of availability.
- Facilitate an in-depth analysis of the main vulnerabilities associated with the OT environment.
- Provide a quantitative assessment of operational risk.
- Use the information collected for the correct definition of zones, conduits and channels and the determination of their target security levels, according to the IEC 62443/ISA99 standard.
- Serve as complementary and useful documentation for the development of the PSO (Operator Security Plan) and the PPE (Specific Protection Plan) that the PIC (Protection of Critical Infrastructures) law requires in Spain.
Why is this service innovative?
- Because it is based on a methodology that covers the existing space between strategic risk analysis and management methodologies and specific best practices for vulnerability analysis of an asset type or group of assets.
- Because it helps to overcome the most important challenges that have to be faced when carrying out this type of intervention in environments as critical and specific as those linked to the industrial and/or infrastructure sectors. These challenges include:
- Carry out the analysis without affecting the availability of the industrial network being evaluated or the correct functioning of the industrial processes (normally in operation while the necessary tests are carried out).
- Incorporate into the analysis all assets and groups of assets existing in the evaluated OT environment regardless of the manufacturer, version or degree of obsolescence.
- Obtain sufficient information about the OT devices involved in the analysis with the current configurations of the industrial network and with commonly used tools. In many cases it has been necessary to develop specific tools for technologies and protocols typical in OT environments that are also non-intrusive.
- Focus the analysis on operational risk, that is, on that linked to the operation of the OT environment, leaving the IT environment and strategic risk for other audits and analyses.
- Achieve the collaboration of production and systems teams during the audit process, normally very far from this type of analysis.
3. Because its usefulness is already being validated in numerous projects in clients from different sectors throughout the national territory.
4. Because the methodology has been endorsed by the scientific community by publishing the following article in the I National Conference on Research in Cybersecurity “Methodology for the Analysis, Security Audit and Evaluation of the Operational Risk of Industrial Networks and SCADA Systems (MAASERISv2.1) – Authors: Fernando Sevillano and Marta Beltran Pardo” presented on Wednesday, September 16, 2015 within the “Cybersecurity and Industry” session.
MAASERIS defines three areas of analysis; establishes an analysis and audit development cycle and includes a series of deliverables and dossiers.
For more information about the service, you can contact us through this form.





