www.sectrio.com

15 Questions to ask your  IACS risk assessment vendor or team

Will your assessment require any part of the plant to be shut down or rendered inoperative?

1

2

How will you ensure that the p-caps are handled securely?

How will your tools read unique protocols that my devices use?

3

4

If any severe vulnerabilities are discovered? Then what will be the next steps? Can you help us address them?

Will the business impact be considered as a factor while delineating SUCs?

5

6

What is your assessment framework and what is it that you will be looking for in our networks?

Find out how Sectrio can help you with your OT/ICS and IoT Cybersecurity needs and requirements

Will you also be looking at aspects such as firewall configuration?

7

8

How will you assess threats in an air-gapped environment?

How will the interviews be conducted? How will the responses be evaluated?

9

10

How do you calculate the risk score of a security issue?

How is the cybersecurity maturity score derived?

11

12

What industrial standards will be considered?

How will device-level issues be identified?

13

14

What will be the next steps after the assessment? When will the report be shared?

What will be the nature of the recommendations shared?

15

Other stories

LockBit Down

Know everything about 'Operation Cronos'

Sectrio Blogs

Get the latest and the most important updates