<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Loïc Lebain, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/loic-lebain/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/loic-lebain/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 24 Apr 2026 15:35:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Loïc Lebain, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/loic-lebain/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Part-IS in 2026: from regulatory framework to operational reality</title>
		<link>https://www.riskinsight-wavestone.com/en/2026/04/part-is-in-2026-from-regulatory-framework-to-operational-reality/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2026/04/part-is-in-2026-from-regulatory-framework-to-operational-reality/#respond</comments>
		
		<dc:creator><![CDATA[Loïc Lebain]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 16:20:32 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[règlementation]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=29850</guid>

					<description><![CDATA[<p>Following an initial phase focused on understanding the scope and framework of Part-IS and on drafting Information Security Management Systems (ISMS), the aviation sector has entered a new phase. In 2026, Part-IS is no longer a theoretical or purely documentary topic — it has...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/04/part-is-in-2026-from-regulatory-framework-to-operational-reality/">Part-IS in 2026: from regulatory framework to operational reality</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;"><span data-contrast="none">Following an initial phase focused </span><a href="https://www.riskinsight-wavestone.com/en/2025/01/part-is-a-pillar-of-cybersecurity-in-european-aviation/"><span data-contrast="none">on understanding the scope and framework of Part-IS</span></a><span data-contrast="none"> and on drafting Information Security Management Systems (ISMS), the aviation sector has entered a new phase. In 2026, Part-IS is no longer a theoretical or purely documentary topic — it has become a matter of operational deployment, with clear expectations from authorities and regulatory adjustments designed to facilitate its implementation.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:180,&quot;335559740&quot;:240}"> </span></p>
<h1 style="text-align: justify;">Where does the sector stand? </h1>
<p style="text-align: justify;"><img fetchpriority="high" decoding="async" class="size-full wp-image-29842 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/friseEN.png" alt="" width="1280" height="324" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/friseEN.png 1280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/friseEN-437x111.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/friseEN-71x18.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/friseEN-768x194.png 768w" sizes="(max-width: 1280px) 100vw, 1280px" /></p>
<p style="text-align: justify;"><span data-contrast="none">The rise of Part-IS has been gradual. After the progressive entry into force of the texts in 2022 and 2023, 2025 was marked by the preparation of compliance files and the structuring of ISMS</span><span data-contrast="none">.</span></p>
<p style="text-align: justify;"><span data-contrast="none">Since 22 February 2026, the implementing regulation has been fully applicable, meaning that new scopes are now covered — in particular, maintenance and repair activities through Part-145. </span><span data-contrast="none">Part-IS now applies across the entire operational chain, from design through to operations and support.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:180,&quot;335559740&quot;:240}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">Today, the organisations concerned by Part-IS have acknowledged the subject and submitted their ISMS. In this context of broad engagement, EASA has on its side adjusted the framework by clarifying and easing certain modalities through the update of the Part-IS AMC and GM.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:180,&quot;335559740&quot;:240}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">EASA provides for an 18-month development phase after the applicability date to reach a fully operational implementation. This progression can be read simply in three steps: a system that is first present and suitable (</span><i><span data-contrast="none">P+S</span></i><span data-contrast="none">), then operational (</span><i><span data-contrast="none">O</span></i><span data-contrast="none">), before reaching effective long-term functioning (</span><i><span data-contrast="none">E</span></i><span data-contrast="none">).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:180,&quot;335559740&quot;:240}"> </span></p>
<p style="text-align: justify;"><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:180,&quot;335559740&quot;:240}"><img decoding="async" class=" wp-image-29838 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/LigneEN.png" alt="" width="736" height="438" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/LigneEN.png 955w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/LigneEN-321x191.png 321w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/LigneEN-66x39.png 66w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/LigneEN-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/LigneEN-768x457.png 768w" sizes="(max-width: 736px) 100vw, 736px" /></span></p>
<h1 style="text-align: justify;"><span data-teams="true">EASA updates: What you need to know in practice</span></h1>
<p style="text-align: justify;"><span data-contrast="none">In late 2025, EASA updated the AMC and GM relating to Part-IS and consolidated these changes in a new version of the associated Easy Access Rules.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:180,&quot;335559739&quot;:180,&quot;335559740&quot;:240,&quot;335559991&quot;:180}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">In concrete terms, these changes introduce several significant easements:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:180,&quot;335559739&quot;:180,&quot;335559740&quot;:240,&quot;335559991&quot;:180}"> </span></p>
<ul style="text-align: justify;">
<li><span data-contrast="none">Declared organisations no longer need prior approval of their ISMS.</span>
<ul>
<li>As a reminder, approved organisations are subject to a formal approval process by the authority (EASA or national authority). They must obtain approval, have their ISMS manual approved, and submit certain modifications for prior validation — unlike declared organisations, which are supervised ex post by the authority. The list of declared organisations subject to Part-IS can be found <a style="font-size: revert;" href="https://www.easa.europa.eu/en/faq/142354"><span data-contrast="none">here</span></a><span style="font-size: revert; color: initial;" data-contrast="none">.</span><span style="font-size: revert; color: initial;" data-ccp-props="{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559739&quot;:180,&quot;335559740&quot;:240}"> </span></li>
</ul>
</li>
<li><span data-contrast="none">ISMS modifications, when covered by a defined internal procedure, no longer require formal sign-off from the authority: a notification is sufficient.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:180,&quot;335559740&quot;:240}"> </span></li>
<li><span data-contrast="none">The role of the authority is refocused on supervision and audit, rather than on a systematic approval logic.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:180,&quot;335559740&quot;:240}"> </span></li>
</ul>
<p style="text-align: justify;"><img decoding="async" class="size-full wp-image-29834 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/TableEN.png" alt="" width="1280" height="548" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/TableEN.png 1280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/TableEN-437x187.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/TableEN-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/TableEN-768x329.png 768w" sizes="(max-width: 1280px) 100vw, 1280px" /></p>
<p style="text-align: justify;"><span data-contrast="none">However, expectations remain the same: the ISMS (SGSI in the regulatory sense) must be robust, consistent, traceable, and genuinely applied. The relief brought by the AMC and GM update is therefore administrative, not operational.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:180,&quot;335559740&quot;:240}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">On the ground, this resonates with the first OSAC feedback on ISMS: governance around the ISMS appears as a central point. Authorities are paying increased attention to the cybersecurity dimension that identified actors must demonstrate. Document quality is also scrutinised — not only in substance, but also in form (structure, consistency…).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:180,&quot;335559740&quot;:240}"> </span></p>
<h1 style="text-align: justify;">The five key challenges for scaling Part-IS across the sector </h1>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="size-full wp-image-29846 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/5EN.png" alt="" width="1280" height="446" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/5EN.png 1280w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/5EN-437x152.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/5EN-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/04/5EN-768x268.png 768w" sizes="auto, (max-width: 1280px) 100vw, 1280px" /></p>
<p style="text-align: justify;"><span data-contrast="none">Beyond these initial observations, we have seen during our support engagements that the implementation of Part-IS brings five recurring challenges for most organisations: governance &amp; coordination, inventory validation, completion of risk analyses, training of managers and teams, HR constraints and personnel controls.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:180,&quot;335559740&quot;:240}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The most time-consuming, however, remains the risk analysis — particularly for large multi-site organisations. This can no longer be purely centralised; it must be broken down locally, integrating the realities of each site, functional chains, and subcontractors. This holistic approach is demanding, but essential to demonstrate consistent application of Part-IS.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:180,&quot;335559740&quot;:240}"> </span></p>
<h1 style="text-align: justify;">A pragmatic approach to scaling up </h1>
<p style="text-align: justify;"><span data-contrast="none">Faced with these challenges, the key lies in anticipating deployment. An effective ISMS relies on a solid common foundation, but also on concrete tools enabling local adaptation: templates, guides, risk analysis methods tailored to operational realities.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:180,&quot;335559740&quot;:240}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">The success of Part-IS depends on coordination between cybersecurity teams, business teams, and quality and compliance functions. Part-IS is not an additional layer: it is a cross-cutting framework that durably structures cyber risk management in the service of aviation safety.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:180,&quot;335559740&quot;:240}"> </span></p>
<h1 style="text-align: justify;">Conclusion </h1>
<p style="text-align: justify;"><span data-contrast="none">In 2026, Part-IS enters its implementation phase. The consolidation of the AMC/GM sets a clear baseline and reduces the administrative burden compared to the first version.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:180,&quot;335559740&quot;:240}"> </span></p>
<p style="text-align: justify;"><span data-contrast="none">In addition, the late-2025 updates notably extended the scope of Part-IS.D.OR to ground handling service providers via Delegated Regulation (EU) 2025/22 amending (EU) 2022/1645, applicable from 27 March 2031. No immediate operational impact in 2026, but a useful signal to anticipate interface mapping — with no short-term urgency.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:180,&quot;335559740&quot;:240}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/04/part-is-in-2026-from-regulatory-framework-to-operational-reality/">Part-IS in 2026: from regulatory framework to operational reality</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2026/04/part-is-in-2026-from-regulatory-framework-to-operational-reality/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Industrial cybersecurity: the ANSSI “Detailed Measures” guide overhaul </title>
		<link>https://www.riskinsight-wavestone.com/en/2026/03/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2026/03/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul/#respond</comments>
		
		<dc:creator><![CDATA[Loïc Lebain]]></dc:creator>
		<pubDate>Wed, 18 Mar 2026 07:52:59 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=29433</guid>

					<description><![CDATA[<p>Classifying an industrial system is a first step; making that classification operational in the field is another matter altogether. This is precisely where version 2.0 of the guide “Industrial Systems Cybersecurity – Detailed Measures”, published on November 27, 2025, positions itself: translating cybersecurity classes into...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/03/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul/">Industrial cybersecurity: the ANSSI “Detailed Measures” guide overhaul </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span data-contrast="auto">Classifying an industrial system is a first step; making that classification operational in the field is another matter altogether.</span> <br /><span data-contrast="auto">This is precisely where version 2.0 of the guide </span><i><span data-contrast="auto">“Industrial Systems Cybersecurity – Detailed Measures”</span></i><span data-contrast="auto">, published on November 27, 2025, positions itself: translating cybersecurity classes into concrete measures, at a time when OT environments must contend with a more acute threat landscape, increasingly interconnected architectures, and more visible compliance requirements.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:300}"> </span></p>
<p><span data-contrast="auto">This guide directly follows the publication of the second version of ANSSI’s </span><i><span data-contrast="auto">Industrial Systems Classification Method</span></i><span data-contrast="auto"> in March 2025, which we had already analyzed in a previous </span><a href="https://www.riskinsight-wavestone.com/en/2025/06/enhancing-industrial-cybersecurity-changes-introduced-by-the-new-anssi-guide-for-industrial-systems-classification/"><span data-contrast="none">article</span></a><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:300}"> </span></p>
<h1>An update built on continuity: the same structure, the same underlying logic<i></i></h1>
<p style="text-align: center;"><i><span data-contrast="auto"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-29423 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en1.png" alt="" width="961" height="420" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en1.png 961w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en1-437x191.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en1-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en1-768x336.png 768w" sizes="auto, (max-width: 961px) 100vw, 961px" /></span></i><em>Key differences between the first and second versions of the detailed measures guide </em></p>
<p><span data-contrast="auto">In terms of structure, the 2025 guide remains very close to the 2014 version. It opens with a reminder of the constraints and weaknesses specific to industrial environments, followed by a clear separation between organizational and technical measures. The themes themselves will come as no surprise: governance, access control, network segmentation, remote access, backups, supervision, vulnerability management, cybersecurity integration throughout the system lifecycle, and incident preparedness. Continuity is clearly intentional.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">This stability has an advantage: organizations already aligned with the 2014 guide do not have to start from scratch. At the same time, it also highlights the fact that most of the “core topics” were already well identified more than a decade ago. The real question is therefore less “what is new?” than “what has become more actionable — and at what cost?”.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">On this point, the guide is explicit about its scope. It proposes a </span><b><span data-contrast="auto">minimum baseline</span></b><span data-contrast="auto"> intended, among other things, to support security accreditation processes. However, it does not claim to replace IEC 62443, nor does it position itself as a certification framework. It simply reuses some of its principles and requirements, while clearly stating that the measures alone are not sufficient for the most critical systems.</span><span data-ccp-props="{}"> </span></p>
<h1>What has changed in concrete terms </h1>
<p><span data-contrast="auto">The most visible change is not the introduction of new topics, but a new way of expressing requirements.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">In 2014, the guide relied on a structuring distinction between </span><b><span data-contrast="auto">recommendations (R)</span></b><span data-contrast="auto"> and </span><b><span data-contrast="auto">directives (D)</span></b><span data-contrast="auto">, with a hardening mechanism depending on the cybersecurity class. In 2025, this grammar disappears. The guide now introduces a class based reading (C1 to C4) and several variants:</span> <br /><span data-contrast="auto">– </span><i><span data-contrast="auto">state of the art </span></i><em>recommendations</em><span data-contrast="auto">,</span> <br /><span data-contrast="auto">– </span><i><span data-contrast="auto">lower level alternatives</span></i><span data-contrast="auto">, indicated by a “–”,</span> <br /><span data-contrast="auto">– and </span><i><span data-contrast="auto">reinforced complementary recommendations</span></i><span data-contrast="auto">, indicated by a “+”.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: center;"><span data-ccp-props="{}"><img loading="lazy" decoding="async" class="size-full wp-image-29419 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en2.png" alt="" width="1392" height="391" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en2.png 1392w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en2-437x123.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en2-71x20.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en2-768x216.png 768w" sizes="auto, (max-width: 1392px) 100vw, 1392px" /></span><i><span data-contrast="auto">Typical structure of a recommendation</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p><span data-contrast="auto">A second major evolution is the explicit introduction of a fourth cybersecurity class and the strengthened alignment with IEC 62443, in line with the updated classification method. For each recommendation, a correspondence with an IEC 62443 requirement is indicated when it exists and referenced in a dedicated appendix.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">According to Appendix B, a large proportion of the 214 recommendations have a direct equivalent in the previous version. This confirms that the overhaul is primarily based on reorganization and reformulation rather than a fundamental shift in doctrine. After analyzing the 35 measures identified as having no direct equivalence, it appears that they are not necessarily new. They typically reflect:</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-29435 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en5-1.png" alt="" width="1746" height="627" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en5-1.png 1746w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en5-1-437x157.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en5-1-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en5-1-768x276.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en5-1-1536x552.png 1536w" sizes="auto, (max-width: 1746px) 100vw, 1746px" /><i><span data-contrast="auto">Categories of reasons for no direct equivalence, with illustrated examples</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p><span data-ccp-props="{}"> <img loading="lazy" decoding="async" class="size-full wp-image-29415 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en3.png" alt="" width="1657" height="814" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en3.png 1657w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en3-389x191.png 389w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en3-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en3-768x377.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en3-1536x755.png 1536w" sizes="auto, (max-width: 1657px) 100vw, 1657px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="auto">Summary of recommendations with no direct equivalents in Annex B</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<h1>A more architecture-driven doctrine on interconnections and remote access </h1>
<p><span data-contrast="auto">Where the 2025 version truly changes the dynamic is in certain topics that are handled in a more structured way. In the first version, the doctrine on interconnections and remote access was already relatively prescriptive: it emphasized that remote management greatly increases the attack surface, set out operational rules, and even went as far as banning remote maintenance in class 3, using a logic of one-way (unidirectional) data flows.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">The modernization brought by the 2025 version makes the whole set more coherent and better structured: it moves from a reasoning mainly centered on components and means (firewalls, VLANs, data diodes, VPNs) to an interpretation in terms of security functions that must be combined and positioned according to the classes and the flow directions in Table 3. The rows of the latter correspond to the issuing class (“from”) and the columns to the receiving class (“to”); the icons indicate the security functions to implement in order to authorize the flow in that direction. For example, from class C1 to IT, only a system that can verify whether the data comes from an authorized source—Aut(IT)—is required.</span><span data-ccp-props="{}"> </span></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-29411 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en4.png" alt="" width="1018" height="789" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en4.png 1018w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en4-246x191.png 246w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en4-50x39.png 50w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/03/anssi2_en4-768x595.png 768w" sizes="auto, (max-width: 1018px) 100vw, 1018px" /></p>
<p style="text-align: center;"><i><span data-contrast="auto">Summary of Table 3 – Section 4.2.1: all listed measures are associated with a data transfer </span></i><b><i><span data-contrast="auto">unidirectionality</span></i></b><i><span data-contrast="auto"> function</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p><span data-contrast="auto">It should be noted, however, that the definition of </span><i><span data-contrast="auto">Inno (OT)</span></i><span data-contrast="auto"> is not explicitly provided in the document.</span><span data-ccp-props="{}"> </span></p>
<h1>From framework to on-the-ground implementation </h1>
<p><span data-contrast="auto">The 2025 version of the Detailed Measures logically brings to a close the overhaul initiated with the publication of the second version of the classification method, and it strengthens compatibility with IEC 62443. In a context where the threat to industrial environments is now highly visible, this document comes at just the right time: it’s an opportunity to adjust your action plan—or even to launch a full 2030 roadmap. A guide that isn’t put into practice has never stopped an attacker!</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Among the priority workstreams that are regularly identified, we often see:</span><span data-ccp-props="{}"> </span></p>
<ul>
<li><span data-contrast="auto">Revisit the IT mapping and the business’s dependencies on IT</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Adapt the technical architecture by trading “new authorizations” for stronger authentication and better content control</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Harden and centralize remote access, especially given the many suppliers present in industrial environments</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Strengthen industrial environments or connect them to your SOC</span><span data-ccp-props="{}"> </span></li>
</ul>
<p><span data-ccp-props="{}"> </span></p>
<p><span data-ccp-props="{}"> </span></p>
<p><span data-ccp-props="{}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/03/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul/">Industrial cybersecurity: the ANSSI “Detailed Measures” guide overhaul </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2026/03/industrial-cybersecurity-the-anssi-detailed-measures-guide-overhaul/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Post-Quantum Cryptography for products &#038; OT: From trends to industrial reality</title>
		<link>https://www.riskinsight-wavestone.com/en/2026/02/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2026/02/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality/#respond</comments>
		
		<dc:creator><![CDATA[Loïc Lebain]]></dc:creator>
		<pubDate>Wed, 18 Feb 2026 15:42:58 +0000</pubDate>
				<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=29022</guid>

					<description><![CDATA[<p>Post-Quantum Cryptography (PQC) has fueled debates for years, but since the European Commission’s June 2025 communication on the PQC transition roadmap, the acceleration is undeniable. It is no longer a question of “if” but rather “when”, quantum computing will disrupt our cryptographic foundations. As the Wavestone RiskInsight article  « Quantum computing and post-quantum cryptography: what strategy should companies adopt to deal with these issues? » reminds us, this subject shifts...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/02/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality/">Post-Quantum Cryptography for products &amp; OT: From trends to industrial reality</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><b><span data-contrast="auto">Post-Quantum Cryptography</span></b><span data-contrast="auto"> </span><b><span data-contrast="auto">(PQC)</span></b><span data-contrast="auto"> has fueled debates for years, but since the </span><b><span data-contrast="auto">European Commission’s June 2025 communication </span></b><a href="https://digital-strategy.ec.europa.eu/en/library/coordinated-implementation-roadmap-transition-post-quantum-cryptography"><b><span data-contrast="none">on the PQC transition roadmap</span></b></a><span data-contrast="auto">, the acceleration is undeniable. It is no longer a question of “if” but rather “when”, quantum computing will disrupt our cryptographic foundations. As the Wavestone RiskInsight article  </span><a href="https://www.riskinsight-wavestone.com/en/2025/03/quantum-computing-and-post-quantum-cryptography-how-to-deal-with-these-issues/"><span data-contrast="none">« Quantum computing and post-quantum cryptography: what strategy should companies adopt to deal with these issues? »</span></a><span data-contrast="auto"> </span><span data-contrast="auto">reminds us, this subject shifts from a long-term perspective to a </span><b><span data-contrast="auto">strategic imperative </span></b><span data-contrast="auto">for CISOs, CTOs and product teams. How does that change your </span><b><span data-contrast="auto">industrial environments </span></b><span data-contrast="auto">as well as your </span><b><span data-contrast="auto">smart products</span></b><span data-contrast="auto">, and how to act as of now?</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1><span data-contrast="none">Quantum Threats: a new era for industrial cryptography</span><span data-ccp-props="{}"> </span></h1>
<p><span data-contrast="auto">Quantum computing represents a threat to traditional cryptographic algorithms which guarantee integrity, authenticity and confidentiality of communications, including those of OT systems and products. Even if “</span><b><span data-contrast="auto">Q-Day</span></b><span data-contrast="auto">” (the day quantum computers will break current cryptography) is still several years away, the risk is already present: threat actors can already use </span><b><span data-contrast="auto">« </span></b><b><i><span data-contrast="none">H</span></i></b><b><i><span data-contrast="auto">arvest Now, Decrypt Later</span></i></b><b><span data-contrast="auto"> »</span></b><span data-contrast="auto"> attacks by storing encrypted data today to decrypt them as soon as current cryptographic algorithms are broken. Another risk, just as critical, is already appearing: </span><b><span data-contrast="auto">«</span></b><b><span data-contrast="auto"> </span></b><b><span data-contrast="auto">Trust Now, Forge Later</span></b><b><span data-contrast="auto"> </span></b><b><span data-contrast="auto">»</span></b><span data-contrast="auto">. Digital signatures or certificates seen as reliable today could be falsified tomorrow, allowing transparent deployment of malwares or even compromising supply chains. Unlike progressive data breach, this attack triggers </span><b><span data-contrast="auto">an immediate collapse of trust and integrity</span></b><span data-contrast="auto">, with massive impacts on </span><b><span data-contrast="auto">industrial environments</span></b><span data-contrast="auto"> and </span><b><span data-contrast="auto">smart products</span></b><span data-contrast="auto">. With the </span><b><span data-contrast="auto">European roadmap</span></b><span data-contrast="auto">, structuring 2026, 2030 and 2035, the question hinges on the sequencing of the transition.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Within the industrial sector, where assets are used for </span><b><span data-contrast="auto">multiple decades</span></b><span data-contrast="auto">, this represents a major concern: OT environments and embedded products depend on critical cryptographic usage that will be directly impacted by the arrival of post-quantum algorithms.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Key OT and product use cases include:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Secure administration of OT systems and products</span></b><span data-contrast="auto">: guarantee the integrity and confidentiality of operations.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Digital signatures and firmware integrity</span></b><span data-contrast="auto">: guarantee the reliability of software updates (secure boot, code signing, X.509…).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Secure remote access to industrial assets and products</span></b><span data-contrast="auto">: protect VPN, SSH, RDP connections as well as other protocols from future attacks.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Data exchanges IT/OT</span></b><span data-contrast="auto">: secure flows between information systems and industrial environments (TLS, MQTTS, HTTPS…).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Data confidentiality of industrial processes</span></b><span data-contrast="auto">: preserve the confidentiality of sensitive data in transit or at rest.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><b><span data-contrast="auto">Secure logging and event history</span></b><span data-contrast="auto">: ensure the traceability and integrity of logs and historical data.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<p><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> <img loading="lazy" decoding="async" class="alignnone  wp-image-29019 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en1.png" alt="" width="687" height="368" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en1.png 1027w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en1-357x191.png 357w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en1-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en1-768x411.png 768w" sizes="auto, (max-width: 687px) 100vw, 687px" /></span></p>
<h1><span data-contrast="none">PQC for OT &amp; Products: Address the constraints while preserving crypto-agility</span><span data-ccp-props="{}"> </span></h1>
<h2><span data-contrast="none">OT &amp; Products context: specific constraints</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h2>
<p><span data-contrast="auto">OT systems and products were never conceived for </span><b><span data-contrast="auto">crypto-agility</span></b><span data-contrast="auto">. Numerous industrial protocols, for instance DNP3, Modbus or MQTT, are not encrypted as of today because OT architecture historically depends more on network isolation than on cryptography, thus there is no reason to think they will be encrypted tomorrow with post-quantum algorithms.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Nevertheless, encrypted communications will undergo this cryptographic disruption.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">In a second step, multiple OT devices face significant hardware constraints (CPU, memory, storage capacity) and have a very long lifespan, often between 10 and 30 years. Those characteristics make updates difficult and expensive: secure remote update mechanisms are still rare, and firmware signing is not consistently implemented, which is in fact bad practice.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Those constraints explain why OT environments cannot integrate new cryptographic primitives at the same speed as IT, and why PQC isn’t yet natively considered.</span><span data-ccp-props="{}"> </span></p>
<p><strong>Nevertheless, even if current products and OT systems aren’t conceived for post-quantum cryptography, the emergence of PQC standards, the evolution of regulatory obligations and the rise of risks linked to quantum computing make this transition essential in the medium term. </strong></p>
<p><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"><img loading="lazy" decoding="async" class=" wp-image-29017 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en2.png" alt="" width="743" height="285" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en2.png 1402w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en2-437x168.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en2-71x27.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en2-768x295.png 768w" sizes="auto, (max-width: 743px) 100vw, 743px" /></span></p>
<h2><span data-contrast="none">Making crypto-agility operational for the industry and products</span><span data-ccp-props="{}"> </span></h2>
<p><span data-contrast="auto">The scoping of the PQC project for Products and OT can be broken down into four main components:</span><span data-ccp-props="{}"> </span></p>
<p><b><span data-contrast="auto">1. Conduct the cryptographical inventory and prioritize critical assets </span></b><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Start the dialogue with your cryptographic platform providers (PKI, KMS, HSM) now, to anticipate the migration.</span><span data-ccp-props="{&quot;335559685&quot;:720}"> </span></p>
<p><b><span data-contrast="auto">2. Conceive and deploy crypto-agile architectures</span></b><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Rely exclusively on NIST-standardized algorithms (for instance: </span><b><span data-contrast="auto">ML-KEM, ML-DSA, SLH-DSA</span></b><span data-contrast="auto">) and prohibit any </span><b><span data-contrast="auto">internal development</span></b><span data-contrast="auto"> or </span><b><span data-contrast="auto">non-standard</span></b><span data-contrast="auto"> library for cryptographical components; prioritizing validated and proven solutions.</span><span data-ccp-props="{&quot;335559685&quot;:708}"> </span></p>
<p><span data-contrast="auto">Conceiving crypto-agile architecture implies accounting for the </span><b><span data-contrast="auto">embedded aspect and its constraints</span></b><span data-contrast="auto"> (limited memory, PCBs, energy resources). The implementation of PQC algorithms on those systems remains uncertain. Nevertheless, optimized algorithms for embedded systems are starting to emerge and open the way to its realistic adoption.</span><span data-ccp-props="{&quot;335559685&quot;:708}"> </span></p>
<p><span data-ccp-props="{&quot;335559685&quot;:720}"><img loading="lazy" decoding="async" class="alignnone  wp-image-29015 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en3.png" alt="" width="747" height="258" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en3.png 1444w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en3-437x151.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en3-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2026/02/PQC_en3-768x265.png 768w" sizes="auto, (max-width: 747px) 100vw, 747px" /></span></p>
<p><b><span data-contrast="auto">3. Progressively migrate through hybridization and iteration </span></b><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Transition towards post-quantum cryptography cannot be approached as a one-off project or a “one-shot” migration. </span><span data-contrast="none">It is an iterative process that must be managed and governed over time, by starting with hybridization of algorithms:</span><span data-contrast="auto"> this is explicitly recommended by ANSSI (France’s National Cybersecurity Agency) and the European Commission.</span><span data-ccp-props="{&quot;335559685&quot;:720}"> </span></p>
<p><span data-contrast="auto">Crypto-agility isn’t an option, but a necessity to ensure resilience and compliance for industrial environments and products from the quantum threat. This depends on a </span><b><span data-contrast="none">structured approach, driven by inventory, architecture, hybrid migration and governance.</span></b><span data-contrast="auto"> </span><span data-ccp-props="{}"> </span></p>
<h1><span data-contrast="none">Operational feedback &amp; concrete use cases: stakeholders at different stages</span><span data-ccp-props="{}"> </span></h1>
<p><span data-contrast="auto">Our field experience reveals a noteworthy maturity gap between two industrial organizations when dealing with post-quantum cryptography:</span><span data-ccp-props="{}"> </span></p>
<p><b><span data-contrast="auto">1. Organizations with a rudimentary understanding</span></b><span data-ccp-props="{}"> </span></p>
<ul>
<li><b><span data-contrast="auto"> Observation</span></b><span data-contrast="auto">: In numerous industrial environments, PQC remains an abstract concept, often seen as distant or limited to experts. </span><span data-ccp-props="{}"> </span></li>
<li><b><span data-contrast="auto">Symptoms</span></b><span data-contrast="auto">: </span><span data-ccp-props="{}"> </span>
<ul>
<li><span data-contrast="auto">Operational and business teams aren’t part of strategic deliberations on cryptography.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:278}"> </span></li>
<li><b><span data-contrast="auto">Current roadmaps lack maturity and clarity</span></b><span data-contrast="auto">; the underlying projects costs are often underestimated. Priority remains on service availability; quantum security is therefore deprioritized.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:278}"> </span></li>
<li><b><span data-contrast="auto">HNDL &amp; TNFL</span></b><span data-contrast="auto"> concepts are poorly understood, if not outright ignored.</span>  </li>
</ul>
</li>
<li><b><span data-contrast="auto">Risks</span></b><span data-contrast="auto">: </span><span data-ccp-props="{}"> </span>
<ul>
<li><b><span data-contrast="auto">Disruption of industrial production processes and data breaches</span></b><span data-contrast="auto">: vulnerable communications between critical assets, based on outdated algorithms, expose sensitive data and can cause interruptions or major disturbances in industrial operations (loss of integrity of the data).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:278}"> </span></li>
<li><b><span data-contrast="auto">Production downtime caused by abrupt migration:</span></b><span data-contrast="auto"> A forced transition towards post-quantum cryptography, without preparation nor crypto-agility, can lead to production interruptions, significant additional costs and severe impacts on operational continuity.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:278}"> </span></li>
</ul>
</li>
</ul>
<p><b><span data-contrast="auto">2. Product suppliers: pioneers already undergoing industrialization</span></b><span data-ccp-props="{}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Observation: </span></b><span data-contrast="auto">On the contrary, some product suppliers are already ahead (including automotive and smart objects).</span><span data-ccp-props="{}"> </span></li>
<li><b><span data-contrast="auto">Symptoms: </span></b><span data-ccp-props="{}"> </span>
<ul>
<li><span data-contrast="auto">PQC projects are prioritized over critical use cases: firmware and update signatures (OTA), device identity management, secure remote access, etc.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">Pilot projects are being launched on product lines or representative environments, with concrete feedback on performance, compatibility and robustness of hybrid solutions </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:278}"> </span></li>
<li><span data-contrast="auto">The process is being industrialized: Integration of PQC clauses in supplier contracts, automation of cryptographic inventory </span><b><span data-contrast="auto">CBOM</span></b><span data-contrast="auto">, team upskilling, and dedicated governance.</span></li>
</ul>
</li>
</ul>
<h1><span data-contrast="none">Conclusion &amp; Roadmap: Take action to build a quantum-safe future</span><span data-ccp-props="{}"> </span></h1>
<p><span data-contrast="auto">Quantum threat is no longer a distant prospect: it already demands a significant transformation of industrial and product cybersecurity.</span><span data-ccp-props="{}"> </span></p>
<ol>
<li><b><span data-contrast="auto">Plan ahead to protect the future</span></b><span data-ccp-props="{}"> </span></li>
</ol>
<p><span data-contrast="auto">Demystify quantum concepts and incorporate them in your cybersecurity processes, including your products, your OT environments or your IT systems. Planning ahead is the key to preventing a major disruption.</span><span data-ccp-props="{&quot;335559685&quot;:708}"> </span></p>
<ol start="2">
<li><b><span data-contrast="auto"> Make crypto-agility a strategic vision</span></b></li>
</ol>
<p><span data-contrast="auto">Stop viewing it as merely a technical project, but as a pillar of your resilience and of your digital sovereignty. Build a clear roadmap, with milestones in the short, medium and long term.</span><span data-ccp-props="{&quot;335559685&quot;:708}"> </span></p>
<ol start="3">
<li><b><span data-contrast="auto">Rely on trusted partners</span></b><span data-ccp-props="{}"> </span></li>
</ol>
<p><span data-contrast="auto">The market is ready: experts and solutions exist to support you through the modernization and securing of your critical infrastructure. Don’t face complexity on your own. </span><span data-ccp-props="{&quot;335559685&quot;:708}"> </span></p>
<ol start="4">
<li><b><span data-contrast="auto"> Industrialize the process</span></b></li>
</ol>
<p><span data-contrast="auto">Move from pilot projects to broader rollout: </span><span data-ccp-props="{}"> </span></p>
<ul>
<li><span data-contrast="auto">Implement a PQC strategy to map out, prioritize and pilot the migration of critical uses (include PQC clauses in contracts).</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Start a transition program to modernize trust infrastructure components (PKI, CLM, HSM), automate the inventory and ensure the operational continuity.</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Rely on peers’ feedback as well as feedback from sectors already engaged in PQC.</span><span data-ccp-props="{}"> </span></li>
</ul>
<h6><strong>Quantum risk is already there: weakened asymmetric encryption, leaving signatures and data exposed. </strong></h6>
<p><span data-contrast="auto">As mentioned previously, we start from the observation that elements that aren’t encrypted today in OT environments are not meant to be encrypted tomorrow with post-quantum algorithms, because already existing measures ensure a risk level judged acceptable.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">In other words, PQC doesn’t aim to transform the entirety of OT, but to protect the uses that </span><b><span data-contrast="none">really rely on cryptographical components exposed to quantum risk.</span></b><span data-ccp-props="{}"> </span></p>
<p><b><span data-contrast="none">However, this observation doesn’t reduce the importance of planning.</span></b><span data-ccp-props="{}"> </span></p>
<h6><strong>The two priorities remain as follows: </strong></h6>
<ul>
<li><span data-contrast="none">Migrate your assets before 2030 and act today to protect data confidentiality</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="none">Define your perimeter, build your roadmap, and above all, begin the migration process today.</span><span data-ccp-props="{}"> </span></li>
</ul>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2026/02/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality/">Post-Quantum Cryptography for products &amp; OT: From trends to industrial reality</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2026/02/post-quantum-cryptography-for-products-ot-from-trends-to-industrial-reality/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Enhancing Industrial Cybersecurity: Changes Introduced by the New ANSSI Guide for Industrial Systems Classification</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/06/enhancing-industrial-cybersecurity-changes-introduced-by-the-new-anssi-guide-for-industrial-systems-classification/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/06/enhancing-industrial-cybersecurity-changes-introduced-by-the-new-anssi-guide-for-industrial-systems-classification/#respond</comments>
		
		<dc:creator><![CDATA[Loïc Lebain]]></dc:creator>
		<pubDate>Wed, 18 Jun 2025 14:46:15 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=26349</guid>

					<description><![CDATA[<p>A new guide amid growing attention to industrial cybersecurity  As cyber threats become more targeted, sophisticated and persistent—particularly against industrial systems and critical infrastructure—the ANSSI (French Cybersecurity Agency) has strengthened its cybersecurity framework by publishing a revamped version of its...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/06/enhancing-industrial-cybersecurity-changes-introduced-by-the-new-anssi-guide-for-industrial-systems-classification/">Enhancing Industrial Cybersecurity: Changes Introduced by the New ANSSI Guide for Industrial Systems Classification</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h1><span data-contrast="auto">A new guide amid growing attention to industrial cybersecurity</span><span data-ccp-props="{}"> </span></h1>
<p><span data-contrast="auto">As cyber threats become more targeted, sophisticated and persistent—particularly against industrial systems and critical infrastructure—the ANSSI (French Cybersecurity Agency) has strengthened its cybersecurity framework by publishing a revamped version of its guide for the classification of industrial systems, originally released in 2012.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">This guide is intended for all stakeholders involved in industrial system security: operators, operators of vital importance (OIV), essential service operators (OES), integrators, and service providers responsible for aligning technical requirements with business imperatives.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Its aim is to provide a methodology for determining the criticality of industrial systems, classifying them into one of four cybersecurity levels—</span><i><span data-contrast="auto">minor, moderate, major or catastrophic</span></i><span data-contrast="auto">—based on the maximum severity of potential impacts on: the population, the economy, and the environment. This classification helps identify the appropriate level of security needed and guides the implementation of cybersecurity measures.</span><span data-ccp-props="{}"> </span></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-26342 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo1.png" alt="" width="1567" height="543" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo1.png 1567w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo1-437x151.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo1-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo1-768x266.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo1-1536x532.png 1536w" sizes="auto, (max-width: 1567px) 100vw, 1567px" /></p>
<p style="text-align: center;"><i><span data-contrast="none">Figure 1: The 4 cybersecurity classes of the guide</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<h1><span data-contrast="auto">Why revisit the existing framework?</span><span data-ccp-props="{}"> </span></h1>
<p><span data-contrast="auto">The first edition of the classification guide, published in 2012, laid the foundation for a tiered security approach by introducing a three-class segmentation model based on risk (impact × likelihood).</span><span data-ccp-props="{}"> </span></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-26338 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo2.png" alt="" width="1567" height="685" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo2.png 1567w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo2-437x191.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo2-71x31.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo2-768x336.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo2-1536x671.png 1536w" sizes="auto, (max-width: 1567px) 100vw, 1567px" /></p>
<p style="text-align: center;"><em>Figure 2: Key differences between the first and second versions of the guide </em></p>
<p><span data-contrast="auto">While this initial version played a key role in fostering a culture of industrial cybersecurity in France—at a time when sector-specific references were still scarce—it encountered several limitations over time.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Firstly, the integration of likelihood into the classification process led to a so-called &#8220;</span><i><span data-contrast="auto">looping effect</span></i><span data-contrast="auto">&#8220;, as described in the new guide. As security measures were implemented, the likelihood of an attack was considered to decrease, which in turn could lower the system’s classification level. This phenomenon compromised the stability of classification over time, making it difficult to maintain consistency between classification and actual protective measures.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Moreover, the initial guide proposed only three classes, which resulted in systems being assigned to the highest one too often. There was also a lack of granularity in perimeter definition and limited alignment with international standards such as IEC 62443.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">The new version addresses these challenges by basing classification exclusively on impact, ensuring more stable classifications, consistent comparisons between zones, and better integration with structured risk analysis frameworks like EBIOS RM. This evolution also makes the approach more adaptable to the diversity and complexity of modern industrial systems.</span><span data-ccp-props="{}"> </span></p>
<h1><span data-contrast="auto">A methodology compatible with existing frameworks</span><span data-ccp-props="{}"> </span></h1>
<p style="text-align: center;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"><img loading="lazy" decoding="async" class="wp-image-26334 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo3.png" alt="" width="603" height="498" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo3.png 1042w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo3-231x191.png 231w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo3-47x39.png 47w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo3-768x635.png 768w" sizes="auto, (max-width: 603px) 100vw, 603px" /></span><i><span data-contrast="none">Figure 3: Classification methodology diagram from the new guide</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<p><span data-contrast="auto">The new methodology is structured around three key activities:</span><span data-ccp-props="{}"> </span></p>
<ol>
<li><span data-contrast="auto">Definition of the technical perimeter</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Segmentation into coherent zones</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Classification of each zone based on the potential severity of impacts in case of compromise</span><span data-ccp-props="{}"> </span></li>
</ol>
<p><span data-contrast="auto">This approach enables organizations to assign each zone to one of the four cybersecurity classes according to the severity of potential impacts. It provides a rational and scalable understanding of security needs, with a focus on two key criteria: availability and integrity, which align with the core concerns of industrial environments.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">The guide does not replace risk analysis frameworks but is designed to integrate seamlessly with them. It was specifically built to feed into EBIOS RM workshops, providing a classification baseline that supports the identification of feared events and associated security measures. This structure eliminates the need to adapt or distort EBIOS RM to accommodate industrial contexts.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">The guide also draws on concepts from IEC 62443, such as zones, conduits, and security levels, helping align with international industrial cybersecurity best practices.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">This alignment is part of a broader push toward a structured deployment of cybersecurity. The guide provides a practical framework organized around key thematic areas, as illustrated below, to help effectively integrate cybersecurity into industrial environments.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: center;"><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"><img loading="lazy" decoding="async" class="wp-image-26330 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo4.png" alt="" width="415" height="406" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo4.png 865w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo4-195x191.png 195w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo4-40x39.png 40w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/06/annsi_vo4-768x752.png 768w" sizes="auto, (max-width: 415px) 100vw, 415px" /></span><i><span data-contrast="none">Figure 4: Key themes for deploying cybersecurity (Chapter 3.1 of the guide)</span></i><span data-ccp-props="{&quot;335551550&quot;:2,&quot;335551620&quot;:2}"> </span></p>
<h1><span data-contrast="auto">What comes next: a detailed measures guide — bridging the gap between strategy and action</span><span data-ccp-props="{}"> </span></h1>
<p><span data-contrast="auto">Expected in the coming months, the detailed measures guide is the logical continuation of the classification methodology. It aims to equip industrial stakeholders with practical tools to move from theory to implementation, translating the cybersecurity classes into concrete operational requirements.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Inspired by the 2012 guide, which already proposed a set of baseline measures for each class, this new version promises a more refined, up-to-date approach that reflects current threat landscapes and security practices. It will offer decision-makers and system owners a clear and actionable toolbox, detailing technical, organizational, and human measures adapted to the criticality level of each zone.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Scheduled for publication in 2025, the guide will ensure continuity with risk analysis and compliance efforts already underway, while clarifying expectations regarding the concrete implementation of protective measures. </span><span data-ccp-props="{}"> </span></p>
<h1><span data-contrast="auto">Securing the present, anticipating the future</span><span data-ccp-props="{}"> </span></h1>
<p><span data-contrast="auto">Beyond its publication, the real challenge now lies in adopting the methodology and integrating it into the cybersecurity strategies for both existing and upcoming industrial systems.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">For existing systems, the new guide naturally fits into the security lifecycle recommended by ANSSI in its EBIOS RM guide. Impacts should be assessed on a case-by-case basis to determine whether modifying current architectures is worthwhile, weighing the cost of change, evolving business needs, and expected security benefits. Integration can occur: </span><span data-ccp-props="{}"> </span></p>
<ul>
<li><span data-contrast="auto">During the strategic cycle, typically conducted periodically or following a major change, which offers an opportunity to revise perimeter definitions, update functional zones, and reassess system classifications using the new methodology;</span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Or during the operational cycle, focused on reviewing feared events, checking whether existing measures align with the defined cybersecurity classes, and adjusting protection strategies as needed.</span><span data-ccp-props="{}"> </span></li>
</ul>
<p><span data-contrast="auto">For new industrial projects, the new guide officially replaces the 2012 version and should be incorporated from the earliest design phases. It provides a framework for building a secure architecture aligned with business priorities, while also easing compliance with current and upcoming regulatory frameworks (NIS2, LPM, etc.) or contractual obligations.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">At Wavestone, we are integrating this guide into our industrial cybersecurity maturity evaluation framework and Cyber Benchmark methodology, alongside international standards such as IEC 62443 and NIST SP 800-82. All that remains is to wait for the operational measures guide to complete the picture!</span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/06/enhancing-industrial-cybersecurity-changes-introduced-by-the-new-anssi-guide-for-industrial-systems-classification/">Enhancing Industrial Cybersecurity: Changes Introduced by the New ANSSI Guide for Industrial Systems Classification</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/06/enhancing-industrial-cybersecurity-changes-introduced-by-the-new-anssi-guide-for-industrial-systems-classification/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>PART-IS: A pillar of cybersecurity in European aviation</title>
		<link>https://www.riskinsight-wavestone.com/en/2025/01/part-is-a-pillar-of-cybersecurity-in-european-aviation/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2025/01/part-is-a-pillar-of-cybersecurity-in-european-aviation/#respond</comments>
		
		<dc:creator><![CDATA[Loïc Lebain]]></dc:creator>
		<pubDate>Thu, 16 Jan 2025 08:20:54 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=25140</guid>

					<description><![CDATA[<p>In a world where aviation safety is increasingly based on digital systems, the PART-IS regulation introduced by the European Union Aviation Safety Agency (EASA) marks a decisive turning point.     This innovation is due to increasing numbers of cybersecurity standards, regulations,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/01/part-is-a-pillar-of-cybersecurity-in-european-aviation/">PART-IS: A pillar of cybersecurity in European aviation</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><b><span data-contrast="auto">In a world where aviation safety is increasingly based on digital systems, the PART-IS regulation introduced by the European Union Aviation Safety Agency (EASA) marks a decisive turning point.</span></b><span data-contrast="auto">   </span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">This innovation is due to increasing numbers of cybersecurity standards, regulations, and directives- such as NIS2 (Network and Information Systems Security Directive), the Cyber Resilience Act (CRA), and sector-specific regulations. This expanding regulatory framework reflects the need to secure critical infrastructures and technological products in the face of growing threats. </span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">This article explores the PART-IS regulation, its implication, scope, stakeholders involved, essential requirements, and steps involved in complying with it. </span><span data-ccp-props="{}"> </span></p>
<h1>What is PART-IS? Why is it essential?  </h1>
<p><span data-contrast="auto">PART-IS was introduced to enhance aviation security by</span><b><span data-contrast="auto"> protecting critical information systems in aviation</span></b><span data-contrast="auto">. Its main objective is to ensure that these systems, which include technologies such as avionics communications and air traffic management, are resilient in the face of cyber threats to guarantee the continuity and safety of aviation operations in a sector where any failure can have serious consequences. With the growing integration of digital technologies into aviation operations, from navigation systems to ground infrastructure, the sector&#8217;s vulnerability to cyber-attacks has increased considerably. </span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">By requiring aviation industry players to identify and assess the vulnerabilities of their systems, PART-IS is a </span><b><span data-contrast="auto">proactive response</span></b><span data-contrast="auto"> to today&#8217;s challenges. </span><span data-ccp-props="{}"> </span></p>
<h1>Which systems are concerned?  </h1>
<p><span data-contrast="auto">PART-IS applies to all digital systems used in civil aviation. This includes, for example:</span><span data-ccp-props="{}"> </span></p>
<ul>
<li><span data-contrast="auto">On-board systems, such as Flight Management Systems (FMS) </span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Air Traffic Management (ATM) infrastructures </span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Predictive maintenance systems </span><span data-ccp-props="{}"> </span></li>
</ul>
<p><span data-contrast="auto">Due to the increasing interconnectivity between these systems, a vulnerability in one component can cause a chain reaction across the entire aviation ecosystem; jeopardising the safety of operations. </span><span data-ccp-props="{}"> </span></p>
<h1>Who are the stakeholders?  </h1>
<p><span data-contrast="auto">The implementation of the PART-IS is based on collaboration between several stakeholders. The main players involved include:</span><span data-ccp-props="{}"> </span></p>
<ul>
<li><b><span data-contrast="auto">Airline operators</span></b><span data-contrast="auto">, who are responsible for the safety of on-board systems </span><span data-ccp-props="{}"> </span></li>
<li><b><span data-contrast="auto">Manufacturers</span></b><span data-contrast="auto">, who must incorporate cybersecurity measures into the design of aircraft and equipment </span><span data-ccp-props="{}"> </span></li>
<li><b><span data-contrast="auto">Air navigation service providers</span></b><span data-contrast="auto">, responsible for protecting traffic management systems </span><span data-ccp-props="{}"> </span></li>
<li><b><span data-contrast="auto">National authorities</span></b><span data-contrast="auto">, whose role is to supervise and verify regulatory compliance </span><span data-ccp-props="{}"> </span></li>
<li><b><span data-contrast="auto">Ground service providers  </span></b><span data-ccp-props="{}"> </span></li>
</ul>
<p><span data-ccp-props="{}"> <img loading="lazy" decoding="async" class="size-full wp-image-25133 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/part_IS_01.png" alt="" width="1456" height="526" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/part_IS_01.png 1456w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/part_IS_01-437x158.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/part_IS_01-71x26.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/part_IS_01-768x277.png 768w" sizes="auto, (max-width: 1456px) 100vw, 1456px" /></span></p>
<p><span data-contrast="auto">Part-IS will be mandatory from October 2025 for organisations approved by EASA under Delegated Regulation (EU) 2022/1645, i.e. production and design organisations. Maintenance organisations under Delegated Regulation (EU) 2023/203 will have to comply by February 2026. </span><span data-ccp-props="{}"> </span></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-25131 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/part_IS_02.png" alt="" width="1412" height="246" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/part_IS_02.png 1412w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/part_IS_02-437x76.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/part_IS_02-71x12.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/part_IS_02-768x134.png 768w" sizes="auto, (max-width: 1412px) 100vw, 1412px" /></p>
<h1>What are the PART-IS requirements?  </h1>
<p><span data-contrast="auto">The PART-IS regulation imposes fundamental principles for guaranteeing the security of critical systems. The organisations concerned must adopt a rigorous approach to meet these requirements and ensure their compliance. </span><span data-ccp-props="{}"> </span></p>
<p><span data-ccp-props="{}"><img loading="lazy" decoding="async" class="size-full wp-image-25129 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/part_IS_03.png" alt="" width="1448" height="864" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/part_IS_03.png 1448w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/part_IS_03-320x191.png 320w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/part_IS_03-65x39.png 65w, https://www.riskinsight-wavestone.com/wp-content/uploads/2025/01/part_IS_03-768x458.png 768w" sizes="auto, (max-width: 1448px) 100vw, 1448px" /></span></p>
<h2>Risk management (ISMS)  </h2>
<p><span data-contrast="auto">This regulation is part of a proactive approach aimed at identifying, analysing, and mitigating the risks that could compromise the confidentiality, integrity, and availability of sensitive information. Based on a structured framework such as ISO/IEC 27001, the ISMS becomes a central tool for establishing robust security policies, deploying appropriate technical and organisational measures, and raising stakeholders&#8217; awareness of cybersecurity issues. </span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Risk management, a fundamental pillar of this approach, enables efforts to be prioritised on the basis of identified vulnerabilities, while ensuring continuous improvement through the PDCA (Plan-Do-Check-Act) cycle. Regulations require civil aviation operators and entities to have robust information security governance in line with best practice.  </span><span data-ccp-props="{}"> </span></p>
<h2>Risk assessment  </h2>
<p><span data-contrast="auto">Organisations must establish a structured methodology for identifying, analysing, and mitigating the cyber risks associated with their information systems. This includes carrying out vulnerability analyses, assessing the impact in the event of a compromise, and implementing appropriate controls. </span><span data-ccp-props="{}"> </span></p>
<h2>Continuous monitoring </h2>
<p><span data-contrast="auto">Real-time monitoring of systems is essential for detecting and responding rapidly to security incidents. This requires the use of advanced tools and the implementation of incident response protocols. All incidents must be reported quickly and accompanied by a clear response plan to limit their impact. </span><span data-ccp-props="{}"> </span></p>
<h2>Training and awareness  </h2>
<p><span data-contrast="auto">Staff must be trained in cyber security best practice to reduce the risk of human error. Regular awareness programmes are essential to maintain a high level of vigilance. </span><span data-ccp-props="{}"> </span></p>
<h2>Audits and documentation  </h2>
<p><span data-contrast="auto">Compliance with PART-IS is verified through regular audits conducted by EASA or national authorities. Organisations must also maintain full documentation covering safety policies, procedures implemented, and incidents encountered. </span><span data-ccp-props="{}"> </span></p>
<h1>What are the key stages in achieving compliance?   </h1>
<p><span data-contrast="auto">Compliance with PART-IS offers a strategic opportunity for companies to strengthen the security of their critical systems and modernise their practices. </span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">With the compliance deadline set for October 2025 for at least part of the perimeter, is an appropriate time to start the compliance process. </span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">To achieve this, we are currently supporting our customers in 3 main areas:  </span><span data-ccp-props="{}"> </span></p>
<ul>
<li><span data-contrast="auto">Firstly, it is essential to </span><b><span data-contrast="auto">precisely define the scope concerned</span></b><span data-contrast="auto">, based on the scope of the approvals issued by the EASA, in order to effectively frame the efforts.  </span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Next, </span><b><span data-contrast="auto">drawing up an Information Security Management System</span></b><span data-contrast="auto"> (ISMS) will help structure the policies and processes required for proactive risk management.  </span><span data-ccp-props="{}"> </span></li>
<li><span data-contrast="auto">Finally, </span><b><span data-contrast="auto">carrying out the first risk analyses</span></b><span data-contrast="auto"> to identify vulnerabilities and draw up appropriate action plans.  </span><span data-ccp-props="{}"> </span></li>
</ul>
<p><span data-contrast="auto">These steps lay the foundations for a solid, long-term information security strategy, which will then have to be nurtured and developed in the spirit of the continuous improvement process advocated by PART-IS.</span><span data-ccp-props="{}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2025/01/part-is-a-pillar-of-cybersecurity-in-european-aviation/">PART-IS: A pillar of cybersecurity in European aviation</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2025/01/part-is-a-pillar-of-cybersecurity-in-european-aviation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>IT for OT: What process to develop cybersecurity solutions adapted to industrial businesses?</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/01/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/01/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses/#respond</comments>
		
		<dc:creator><![CDATA[Loïc Lebain]]></dc:creator>
		<pubDate>Tue, 23 Jan 2024 07:54:20 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=22294</guid>

					<description><![CDATA[<p>During the Wavestone OT Cyber Day, Loïc Lebain and Benoit Bouffard conducted a workshop in which they noted that IT departments were still struggling to develop a catalogue of cybersecurity solutions for OT. Based on their experience with our customers,...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/01/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses/">IT for OT: What process to develop cybersecurity solutions adapted to industrial businesses?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>During the Wavestone OT Cyber Day, Loïc Lebain and Benoit Bouffard conducted a workshop in which they noted that IT departments were still struggling to develop a catalogue of cybersecurity solutions for OT. Based on their experience with our customers, they presented an overview of the difficulties with cybersecurity in OT today, and then, presented a method to enable the industrialization of IT services for OT. The stated goal is to set up a <em>Solution Factory</em> to be able to develop a catalogue of ready-to-use cybersecurity products adapted to the industrial world.</p>
<p> </p>
<h1>The Current Perception of Cybersecurity in OT</h1>
<p>In industrial environments, cybersecurity does not always have a positive image and is seen as a potential obstacle to business development. Cybersecurity teams are often criticised for defining rules but delegating their implementation without providing a solution or any help for the implementation of requested changes. For example, it is difficult to regularly change the passwords of dozens of generic industrial accounts, even though this rule is standard on a traditional IT perimeter. As a result, OT teams are often left alone to meet the criteria for security policy requirements.</p>
<p>Left alone, industrial operational teams develop &#8220;homemade&#8221; solutions designed with their <strong>very local point of view</strong>, at the scale of their site. These solutions <strong>are beyond the group&#8217;s control</strong> and are very specific (dependence on a local supplier, in-house solution designed for the site&#8217;s specific network architecture, etc.), and <strong>scalability capabilities are not evaluated</strong>. All these solutions are developed by expert and passionate teams who can question security practices and standards, but who rarely have in mind any strategic vision, even at the local scale, making the integration of their solutions at the scale of a group of industrial sites nearly impossible.</p>
<h3>Short-term solutions&#8230; or even dangerous</h3>
<p>In the long run, these local solutions have many disadvantages:</p>
<ul>
<li>They are not up to production standards and <strong>remain in the POC phase</strong>.</li>
<li>They are poorly documented, which makes <strong>maintenance difficult</strong>.</li>
<li><strong>Scaling up </strong>to a group of industrial sites is <strong>nearly impossible</strong> in the long term.</li>
</ul>
<p>As shown below, some of the &#8220;homemade&#8221; solutions encountered have even proven to be dangerous:</p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="alignnone  wp-image-22296" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN1.png" alt="" width="649" height="320" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN1.png 1291w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN1-387x191.png 387w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN1-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN1-768x379.png 768w" sizes="auto, (max-width: 649px) 100vw, 649px" /></p>
<p style="text-align: center;"><em>Real-life examples taken from the 2020-2023 industrial sites audits</em></p>
<h3>Standardise cybersecurity integration in operations</h3>
<p>Industrial companies stand out by their strong needs of availability and the substantial real-world implications of the operations. Consequently, investments in this sector must align with the magnitude of these challenges which require cybersecurity solutions of <strong>very large scale and complexity</strong>. <strong>IT, cybersecurity, and OT departments must cooperate </strong>throughout the development process to ensure that solutions are suitable for operations while meeting the group&#8217;s security standards. The goal is to <strong>industrialise the development</strong> of cybersecurity solutions for the OT perimeter, providing <strong>ready-to-use solutions ready to be deployed</strong> at scale.</p>
<p>The solution is the development of a catalogue of cybersecurity services in which services are selected and developed <strong>at the group level, </strong>in <strong>collaboration with all the players</strong> (Cyber, operations, IT) and integrating <strong>the management of the entire life cycle </strong>of the solution (maintenance, documentation, decommissioning, etc.). Thus, the cybersecurity department and the IT department can create, with the industrial department, a product management roadmap, with an industrialized process for the creation of solutions.</p>
<p> </p>
<h1>Designing an OT Cybersecurity Solution</h1>
<p>The process of creating a solution must address several issues:</p>
<ul>
<li><strong>Collect the needs</strong> of all stakeholders.</li>
<li><strong>Transcribing needs</strong></li>
<li><strong>Ensuring Large-Scale Adoption</strong> by all industrial sites.</li>
</ul>
<p>To ensure the efficiency of the process and the solutions, the development of the different solutions is necessarily long and can extend over a period of <strong>2 to 3 years</strong>. Wanting to go faster means exposing oneself to poor <strong>coverage of operational needs,</strong> which could lead to the <strong>development of uncontrolled local solutions</strong> or <strong>poorly controlled and incomplete deployment</strong>.</p>
<h3>Providing security solutions: a 6-step process</h3>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="alignnone  wp-image-22298" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN2.png" alt="" width="650" height="260" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN2.png 1377w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN2-437x175.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN2-71x28.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN2-768x307.png 768w" sizes="auto, (max-width: 650px) 100vw, 650px" /><br /> <em>Solution Factory Process</em></p>
<h6>1.     Research &amp; Development</h6>
<p>The goal of the R&amp;D phase is<strong> to find the best solution to meet all cybersecurity needs</strong>. Thus, in the event of an audit of the central office, compliance with security policies is guaranteed if the tool is used. During R&amp;D, a few points are crucial:</p>
<ul>
<li>Assemble a <strong>project team with representatives from IT, cybersecurity as well as the operations, </strong>to guarantee the usefulness and usability of the solution.</li>
<li><strong>Define operational constraints at the right level</strong> (availability, resistance in a harsh environment, support, etc.) in order to control costs without compromising the usability of the product.</li>
<li><strong>Plan maintenance, update and release processes </strong>as early as R&amp;D to avoid getting stuck with an imperfect or obsolete product.</li>
<li><strong>Plan the budget and business model </strong>of the product. In particular, who has to pay and what are the operating and investment costs. This helps prevent the project from getting stuck at the deployment step due to budget issues.</li>
</ul>
<p>During the R&amp;D phase, it is also interesting to <strong>start from what already exists</strong>. This makes it possible to identify <strong>talents or solutions</strong> that could be <strong>adapted at scale and across an OT perimeter</strong>. There are two possible approaches to finding solutions:</p>
<ul>
<li>Find solutions that OT teams use locally and scale them up.</li>
<li>Search for cybersecurity solutions from the IT for<em> IT catalogue </em>and adapt them to the industrial world.</li>
</ul>
<p style="text-align: center;"><em><img loading="lazy" decoding="async" class="alignnone  wp-image-22300" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN3.png" alt="" width="649" height="275" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN3.png 1531w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN3-437x185.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN3-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN3-768x326.png 768w" sizes="auto, (max-width: 649px) 100vw, 649px" /><br />Two methods to take into account the existing situation</em></p>
<h6>2.     Prototype</h6>
<p>It is essential <strong>to think about the user experience and to take care of the image of the</strong> product from the prototype. The prototype is first and foremost a <strong>showcase that should facilitate the adoption of the product</strong>, but which can also damage its image if it is not practical and functional. When presenting the prototype, it is important to <strong>frame the use cases</strong> covered, and to have a functional and <strong>simple product</strong>. The first image of the prototype is the one that the operational staff will remember.</p>
<h6>3.     Minimum Viable Product</h6>
<p>The MVP phase has two main challenges: <strong>to test the product</strong>, and <strong>to bring together promoters</strong>. Communication around the MVP must be neat, and everything must be done to avoid failures. When testing, you should not only test the solution itself, but also all the support functions and the integration with the rest of the production environment.</p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="alignnone  wp-image-22302" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN4.png" alt="" width="649" height="194" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN4.png 1521w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN4-437x130.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN4-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN4-768x229.png 768w" sizes="auto, (max-width: 649px) 100vw, 649px" /></p>
<p>Because the MVP can be a <em>Single Point of Failure</em> for production, it is also necessary to take into account <strong>the needs of high availability</strong> and set up <strong>bypass mechanisms</strong> in case of problems to reassure operational team and facilitate the integration. <strong>A MVP can severely damage</strong> a product&#8217;s reputation in the long run if it fails.</p>
<h6>4.     Packaging</h6>
<p>The packaging stage allows you to define all the prerequisites for the deployment of the product. It is necessary to define:</p>
<ul>
<li><strong>Processes throughout the life cycle</strong> such as the management of deployment requests, defining the obligation or not to deploy, maintenance processes, update processes considering operational needs, etc.</li>
<li><strong>Define responsibilities</strong>, but considering that <strong>industrial sites must maintain a stronger independence</strong> than what is usually done on IT perimeters. There needs to be <strong>a clear definition of what is delegated</strong> to on-site managers in nominal mode and in the event of an emergency.</li>
<li>The <strong>cost model, </strong>including long-term cost, <strong>must be clearly defined</strong> and compared to external solutions.</li>
<li>Support should be considered as <strong>Support as a Service </strong><em>and all processes and tools should be set up and communicated.</em></li>
</ul>
<h6>5.     Preparing for maintenance</h6>
<p>The last step before the actual deployment is the preparation for operational maintenance. For each product, a <strong><em>Solution Owner</em></strong> must be identified to manage <strong>the relationships between users, suppliers</strong> and – during the integration – the integrator. This person should be identified <strong>internally</strong> prior to deployment to ensure that maintenance is operational throughout <strong>the lifecycle </strong>without having to rely on an external.</p>
<p>Prior to deployment, there are three things that need to be taken care of to prepare for the product lifecycle and promote its widespread adoption:</p>
<p style="text-align: center;"><img loading="lazy" decoding="async" class="alignnone  wp-image-22304" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN5.png" alt="" width="651" height="207" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN5.png 1333w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN5-437x139.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN5-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/01/EN5-768x244.png 768w" sizes="auto, (max-width: 651px) 100vw, 651px" /></p>
<h6>6.     Deployment</h6>
<p>During the deployment of the product, <strong><em>early adopters</em> must be supported</strong> as much as possible to maximize the chances of adoption of the project by other sites. <strong>Financial</strong> <strong>incentives</strong>, such as discounts for early adopters, can also be put in place. <strong>Different scenarios of speed of adoption must be anticipated</strong> in order to be able to deploy quickly enough in case of great success, but without cost issues in case of adoption difficulties.</p>
<p> </p>
<h1>Conclusion</h1>
<p>In an industrial environment<strong>, cybersecurity</strong> is still seen as too <strong>restrictive</strong>, an obstacle to productivity, and too <strong>prescriptive</strong>. IT departments set up security policies but do not provide solutions to comply with them, which leads to the development of <strong>poorly controlled local solutions</strong>. To control these risks, one solution is the development of an <strong>IT solution catalogue for OT.</strong> The development of these solutions is a <strong>lengthy process </strong>that can take several years, especially when several projects are launched in parallel. To maximize the chances of success, the <strong>operational needs must be considered </strong>from the R&amp;D phase up until deployment. Integration with <strong>operational processes, support processes, </strong>and all <strong>budget</strong> issues must be considered. Finally, the final key to the success of the solution development process is <strong>communication</strong>. The image of the product must be carefully maintained and controlled to <strong>maximize adoption</strong> by industrial sites after the start of deployment.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/01/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses/">IT for OT: What process to develop cybersecurity solutions adapted to industrial businesses?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/01/it-for-ot-what-process-to-develop-cybersecurity-solutions-adapted-to-industrial-businesses/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Energy sector: A cybersecurity obligation in the face of attacks to ensure the provision of essential services</title>
		<link>https://www.riskinsight-wavestone.com/en/2022/03/17662/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2022/03/17662/#respond</comments>
		
		<dc:creator><![CDATA[Loïc Lebain]]></dc:creator>
		<pubDate>Wed, 30 Mar 2022 18:02:09 +0000</pubDate>
				<category><![CDATA[Focus]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[energy]]></category>
		<category><![CDATA[Industry]]></category>
		<category><![CDATA[OT]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=17662</guid>

					<description><![CDATA[<p>Cyber issues in the energy sector The energy sector is made up of vital infrastructures and provides essential services for a country. The sector, shaped by increasing digitalization, is undoubtedly a prime target for cyber attackers with consequences that are liable...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/03/17662/">Energy sector: A cybersecurity obligation in the face of attacks to ensure the provision of essential services</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h2>Cyber issues in the energy sector</h2>
<p>The energy sector is made up of <strong>vital infrastructures</strong> and provides essential services for a country. The sector, shaped by <strong>increasing digitalization</strong>, is undoubtedly <strong>a prime target for cyber attackers</strong> with consequences that are liable to create shockwaves throughout the service industry as well as all major infrastructure. Taking electricity as an example, an outage spanning a few days would have grave consequences on transport, health and communication almost guaranteeing they cannot perform their core functions.</p>
<p> </p>
<h2>A sector undergoing transformation</h2>
<p>The energy sector began its <strong>transition with the arrival of renewable energy</strong>. The shift in the sector is also due to innovative techniques and systems that have been integrated into the power grid to<strong> help manage the complex task of balancing energy levels</strong><strong>,</strong> because it is vital that the energy pumped in and out of the grid at any one time always remain equal. This level of transformation leads to <strong>an increased need for flexibility</strong> to ensure security of both the power supply and the significant investments in the power grid. These are the objectives that have and will continue to drive concepts such as<strong> smart grids</strong>, to enable the control of energy consumption and optimization.</p>
<p>In response to these business evolutions (market shifts), <strong>the energy sector is undergoing a digital transformation</strong> that is disrupting the way energy is produced, processed, stored, transported, and consumed. Overall, information and communication technologies have helped optimize the supply chain. An example being the widespread deployment of <strong>industrial internet of things</strong> (IIOT) devices. The switch to these devices has led to an explosion in the volume of data in day to day activities. While energy companies must now use this data to be more <strong>agile </strong>in their decision making by effectively leveraging it, the large volumes of data expose the industry as a whole to a host of data based malicious actions, making <strong>cyber security a priority for the energy sector.</strong></p>
<p>Here is a concrete example: remotely piloted, wind turbines and solar panels are by nature connected objects. They must be accessible remotely and therefore secure. However, these new projects do not systematically consider all cybersecurity constraints and related technical solutions (secure protocols, appropriate access technologies, etc.) from the design phase.</p>
<p> </p>
<h2>An increasingly targeted sector</h2>
<p>Let’s look at the “history” of cybersecurity in relation to this sector: the discovery of <strong>Stuxnet</strong> in 2010 created a shock wave within the energy industry. This attack highlighted unknown vulnerabilities at the time.</p>
<p>In December 2016, some inhabitants of Kiev and its periphery were deprived of electricity for about 1 hour due to the disconnection of the substation of the Pivnichna electricity transmission power grid. The attack began as part of <strong>a massive phishing campaign</strong> in July of the same year, which exploited a vulnerability in Windows XP. The failure was caused by the remote switching of the circuit breakers to cut power.</p>
<p>Since then, cyber events have become recurring occurrences. Another example: renewable energies are new targets for cyber attackers. In 2019, in Utah in the United States, <strong>a wind and solar power system</strong> suffered connection losses with the company’s control center for 12 hours, causing power outages in surrounding homes. Cyber attackers had exploited a known vulnerability on unpatched firewalls causing a denial of service of equipment.</p>
<p>In 2021, the executives of Colonial Pipeline, which connects refineries across the United States, decided to block all their distribution operations following <strong>the spread of ransomware</strong>. The company said they paid $4.4 million in ransom for hackers to provide a computer tool to restore their business<sup> [1]</sup>.</p>
<p>The energy sector is one of the most targeted sectors. According to the X-Force Threat Intelligence Index 2022 <sup>[2]</sup>, the energy sector ranked <strong>as the fourth most affected sector</strong> in 2021, with 8.2% of all observed attacks, behind the manufacturing industry, the financial sector, and the professional services sector.</p>
<p>In 2021, <strong>ransomware was the most common type of attack</strong> against energy organizations with 25% of attacks. Oil and gas companies are particularly affected by this phenomenon. Remote Access Trojan (RAT), DDoS and Business Email Compromise (BEC) follow with 17% of attacks each.</p>
<p>While cyber-attacks are most often <strong>targeted for profit and espionage</strong>, the energy industry also deals with <strong>sabotage intentions</strong>, sometimes <strong>for geopolitical reasons</strong>. Some <strong>hacktivists</strong> can also pose a threat by attacking critical infrastructure. The recent ongoing major geopolitical destabilization events reinforce these risks.</p>
<p>The energy sector has critical infrastructure. In an increasingly interdependent world, any disruption, even initially limited to an entity or geographic area, can produce broader cascading effects as outlined below:</p>
<p> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-17663 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/03/Picture1-1.png" alt="" width="643" height="257" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2022/03/Picture1-1.png 643w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/03/Picture1-1-437x175.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2022/03/Picture1-1-71x28.png 71w" sizes="auto, (max-width: 643px) 100vw, 643px" /></p>
<p style="text-align: center;"><em>Impact Chain-Wavestone</em></p>
<p> </p>
<p>To fight effectively against these new threats, <strong>the States and the European Union have adopted binding regulations</strong> to ensure a higher level of cybersecurity on the most critical facilities.</p>
<h2> </h2>
<h2>What role for regulation?</h2>
<p>In France, the competent authority for cybersecurity is the <strong><em>Agence nationale de la sécurité des systèmes d&#8217;information</em></strong> (ANSSI). To respond to the increase in threats, the concept for the defence strategy has been based on the <strong>Military Programming Law</strong> (LPM) since 2013 in order to secure the <strong>Operators of Vital Importance</strong> (OIV). ANSSI mainly insists on procedures for the approval, control, and maintenance in security conditions of <strong>Vital Information Systems</strong> (SIIV).</p>
<p>At European level, the objective is also to protect sensitive organizations such as <strong>operators of essential services</strong> (OES) in the energy sector. The reference point for cybersecurity is currently the <strong>Network and Information System Security (NIS) directive</strong>. Its primary objectives are to <strong>increase cooperation between EU Member States</strong>, by facilitating the exchange of strategic and operational information, and to <strong>improve the cyber resilience of public and private entities in key sectors</strong> such as energy. When it comes to energy, ENISA wants to protect from large-scale threats with increasingly cross-border and interdependent power grid.</p>
<p><strong>The complexity lies in the operational application</strong> of specific measures in industrial environments where equipment and means of production are expected to last <strong>several decades</strong>. Thus, modifying operational processes and/or equipment to incorporate additional cybersecurity is a concrete challenge. The impacts of this transition are significant both in financial and operational terms. This makes <strong>cooperation and sharing even more important for energy stakeholders to find pragmatic and adapted solutions</strong>: adapted network architecture, technical solutions compatible with the industrial world, vulnerability management processes and updates built with operational teams for example.</p>
<p> </p>
<h2>Conclusion</h2>
<p>Considering the critical nature of the energy sector infrastructure, it is essential that business and cybersecurity actors in the energy sector communicate on good cybersecurity practices<strong>, learn from previous attacks,</strong> and contribute to changing the overall level of protection. It is in this context that the first forum dedicated to energy stakeholders <strong>«Cyber4Energy»</strong> will be held in Marseille on 30-31 March 2022. This event will be an opportunity for professionals <strong>to discuss cybersecurity challenges and dedicated solutions available to the sector.</strong></p>
<p>Références :</p>
<p>[1] <a href="https://www.lemonde.fr/international/article/2021/05/19/etats-unis-les-oleoducs-colonial-pipeline-ont-verse-une-rancon-de-4-4-millions-de-dollars-a-des-hackeurs_6080761_3210.html">Etats-Unis : les oléoducs Colonial Pipeline ont versé une rançon de 4,4 millions de dollars à des hackeurs (lemonde.fr)</a></p>
<p>[2] X-Force Threat Intelligence Index 2022, IBM Security <a href="https://www.ibm.com/downloads/cas/M1X3B7QG">X-Force Threat Intelligence Index 2022 (ibm.com)</a></p>
<p> </p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2022/03/17662/">Energy sector: A cybersecurity obligation in the face of attacks to ensure the provision of essential services</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2022/03/17662/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Industrial Cybersecurity in the Age of Industry 4.0 : how can we secure these new use cases and support business projects?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/02/industrial-cybersecurity-in-the-age-of-industry-4-0-how-can-we-secure-these-new-use-cases-and-support-business-projects/</link>
		
		<dc:creator><![CDATA[Loïc Lebain]]></dc:creator>
		<pubDate>Mon, 22 Feb 2021 13:14:51 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[detection]]></category>
		<category><![CDATA[industrial IS]]></category>
		<category><![CDATA[OT]]></category>
		<category><![CDATA[risks]]></category>
		<category><![CDATA[use case]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15280</guid>

					<description><![CDATA[<p>Industry 4.0, a milestone in the history of the technology race Let us make a detour through a page of history, before plunging into the heart of our subject : In the 18th century, James Watt&#8217;s steam engine and coal...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/industrial-cybersecurity-in-the-age-of-industry-4-0-how-can-we-secure-these-new-use-cases-and-support-business-projects/">Industrial Cybersecurity in the Age of Industry 4.0 : how can we secure these new use cases and support business projects?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 style="text-align: justify;">Industry 4.0, a milestone in the history of the technology race</h2>
<p style="text-align: justify;">Let us make a detour through a page of history, before plunging into the heart of our subject :</p>
<ul style="text-align: justify;">
<li>In the 18th century, James Watt&#8217;s <strong>steam engine</strong> and coal mining changed the way of working. The use of <strong>hydraulic machines</strong> made the artisan workshops evolve into much more efficient factories: the 1st industrial revolution was in full swing.</li>
<li>Then, the 2nd industrial revolution known for <strong>Taylorism and mass production</strong> is based on the use of <strong>electricity and oil</strong>. The long assembly lines, dear to Charlie Chaplin, replace the hydraulic and steam engines that are now obsolete.</li>
<li>The development of <strong>new information technologies, from 1970 onwards,</strong> supporting operators in the most difficult tasks characterizes the 3rd industrial revolution. In particular, it allowed for increased <strong>robotization</strong> and <strong>production of larger batches</strong>.</li>
</ul>
<figure id="post-15305 media-15305" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15305 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a1.png" alt="" width="1328" height="472" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a1.png 1328w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a1-437x155.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a1-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a1-768x273.png 768w" sizes="auto, (max-width: 1328px) 100vw, 1328px" /></figure>
<p>&nbsp;</p>
<h2>This 4th industrial revolution marks the arrival of new technologies that are increasingly connected, leading to a high level of dependence on information technology.</h2>
<p style="text-align: justify;">Industry 4.0 brings together a <strong>set of technological advances and technical tools for optimising industrial processes.</strong></p>
<figure id="post-15319 media-15319" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15319 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a2.png" alt="" width="1451" height="577" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a2.png 1451w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a2-437x174.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a2-71x28.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a2-768x305.png 768w" sizes="auto, (max-width: 1451px) 100vw, 1451px" /></figure>
<p>&nbsp;</p>
<p style="text-align: justify;">Let&#8217;s take a concrete example of a use case:</p>
<figure id="post-15324 media-15324" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15324 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a3.jpg" alt="" width="291" height="599" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a3.jpg 291w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a3-93x191.jpg 93w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a3-19x39.jpg 19w" sizes="auto, (max-width: 291px) 100vw, 291px" /></figure>
<p style="text-align: justify;">A company needs to accelerate its production rate and to robotise part of its actions to save time. For example, screwing actions. It chooses to use a collaborative robot, also called a « cobot »<a href="#_ftn1" name="_ftnref1"><sup>[1]</sup></a>, capable of carrying out actions simultaneously or on the same workspace as an operator. The operator will be responsible for presenting the parts to be screwed to the cobot.</p>
<p style="text-align: justify;">In addition to <strong>reducing turnaround time</strong>, the implementation of this binomial makes it possible to <strong>increase the quality of the finished product.</strong></p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Industry 4.0 use cases increase the cyber risk to business processes. There are two reasons for this: the need for new interconnections of industrial systems with the outside world and the increased potential impact in the event of compromise..</h2>
<p style="text-align: justify;">What are the impacts for cybersecurity in this whole story? If we continue with this cobot, the screwing, initially done manually by an operator, is now made easier by the use of the cobot. The cobot has to be connected to receive orders and be updated.</p>
<ul style="text-align: justify;">
<li>The manual operation is replaced by a computerised operation that is now exposed to a cyber attack</li>
</ul>
<p style="text-align: justify;">On a conventional robot, a &#8220;safety cage&#8221; is present to prevent intrusion by an operator during the operation of the machine tool. On a cobot, as there is collaboration with the operator, this protection does not exist. <strong>An impact in case of contact between the cobot&#8217;s screwdriver and the operator&#8217;s hand would be particularly serious for the operator</strong> <strong>!</strong></p>
<ul style="text-align: justify;">
<li>The introduction of new technologies can increase the severity of a cyber attack</li>
</ul>
<p style="text-align: justify;">This is not the only consequence of unsafe use of such technology :</p>
<ul style="text-align: justify;">
<li>Changing a value in the cobot regarding the screwing torque can lead to <strong>a quality defect in case of incorrect tightening ;</strong></li>
<li>Greater importance of assisted operations means that in the event of a failure, the impact on production will be greater&#8230; which will quickly lead to a financial impact.</li>
</ul>
<p style="text-align: justify;">Let&#8217;s sum up a little simplistically :</p>
<p>&nbsp;</p>
<figure id="post-15327 media-15327" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15327 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a4.png" alt="" width="748" height="599" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a4.png 748w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a4-239x191.png 239w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a4-49x39.png 49w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a4-155x125.png 155w" sizes="auto, (max-width: 748px) 100vw, 748px" /></figure>
<p>&nbsp;</p>
<p style="text-align: justify;">The question now is <strong>how to deal with these risks, without blocking the legitimate demands</strong> of operational staff. Spoiler: no, refusing the project is not the solution!</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">The teams responsible for cybersecurity can anticipate the needs for the implementation of 4.0 technologies by drawing up adapted reflex sheets</h2>
<p style="text-align: justify;">From a technical point of view, we can group the advances linked to Industry 4.0 around a few major themes: augmented reality, connected objects, additive manufacturing, etc. Upstream of projects and with a few well-informed industry players around the table, it is possible to anticipate potential demands.</p>
<p style="text-align: justify;">The objective for the cyber security team will then be to <strong>draw up a profile of typical use cases</strong>, deduce the potential risks and begin to identify appropriate security measures to respond to them. It is also an opportunity to propose <strong>&#8220;Industry 4.0&#8221; checklists to raise awareness upstream of projects.</strong></p>
<p style="text-align: justify;">Concretely, here is an example of a typical reflex card applied to our cobot seen previously :</p>
<figure id="post-15329 media-15329" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15329 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a5.png" alt="" width="650" height="450" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a5.png 650w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a5-276x191.png 276w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a5-56x39.png 56w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a5-245x170.png 245w" sizes="auto, (max-width: 650px) 100vw, 650px" /></figure>
<p>&nbsp;</p>
<p style="text-align: justify;">By preparing upstream, cybersecurity teams are more relevant and effective when a new project is about to start.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">Ready to embark on a &#8220;4.0&#8221; project? This is the ideal opportunity to support the industry in the transformation of its factory by offering adapted cyber security services.</h2>
<p style="text-align: justify;">The advantage of &#8220;Industry 4.0&#8221; projects lies in their ability to make in-depth changes to the foundations, sometimes a little dusty, of systems and networks already installed in the factory.</p>
<p style="text-align: justify;">Does a conveyor project need to exchange information with the outside world? This is an opportunity to propose a secure file exchange server in your industrial DMZ (if you don&#8217;t have one, this is also a good time to think about it). Does an augmented reality system need a more stable wireless connection? This is the time to start thinking about strengthening the control of the devices that can be connected to it…</p>
<p style="text-align: justify;">At the risk of repeating the obvious here, the ideal is to arrive upstream of the projects, through a constructive approach, rather than through a 100-page ISSP and guides to standards and technical rules that are not adapted to the cases of use presented.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">For the risk analysis of an &#8220;Industry 4.0&#8221; project, the EBIOS RM risk analysis method facilitates exchanges by sharing strategic scenarios that can be understood by the business</h2>
<p style="text-align: justify;">Once discussions have begun on a concrete project, it is useful to carry out a risk analysis to support the discussions. Its depth and method will depend on the size and risks of the project.</p>
<p style="text-align: justify;">This analysis will make it possible to refine the objectives we wish to protect, take a step back from the existing ecosystem and define the most convincing attack scenarios.</p>
<p style="text-align: justify;">Here are some examples of frequently found scenarios :</p>
<ul style="text-align: justify;">
<li><strong>Logical sabotage for financial purposes </strong>(long version of the Ransomware scenario): A targeted or non-targeted attack, making equipment unavailable for financial gain.</li>
<li><strong>Stopping/Slowing down production: </strong>Targeted sabotage to gain a competitive advantage, revenge by ideology or just by defiance can be carried out by a malicious competitor, an avenger, a terrorist, an activist or even a thrill-seeking amateur. Also be careful not to forget the errors of manipulation !</li>
<li><strong>The alteration of the quality of the part produced: </strong>rather sophisticated and targeted sabotage impacting the quality of the products to discredit the company or simply create damage.</li>
</ul>
<figure id="post-15331 media-15331" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-15331 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a6.png" alt="" width="847" height="144" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a6.png 847w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a6-437x74.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a6-71x12.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/03/a6-768x131.png 768w" sizes="auto, (max-width: 847px) 100vw, 847px" /></figure>
<p style="text-align: justify;">The conclusion of the risk analysis will make it possible to precisely define the cybersecurity measures to be put in place and the associated residual risks.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">To move away from the &#8220;fortified castle&#8221; model, i.e. to focus on the isolation of its industrial IS and perimeter security, and to propose adapted security measures: finer detection, encryption, MCS &#8230; in a way, it&#8217;s time to move on to &#8220;4.0&#8221; measures</h2>
<p style="text-align: justify;">Our feedback shows that the definition of an action plan is a balancing act in these &#8220;4.0&#8221; projects. Indeed, by applying an overly restrictive safety model, based on IEC 62443-3-3 type zones and ducts, we run the risk of misunderstanding between the stakeholders. In fact, <strong>not all business solutions are compatible or mature, and many have not yet integrated the standards we would like to see applied.</strong></p>
<p style="text-align: justify;">So what to do? One way might be to propose appropriate security measures, &#8220;4.0&#8221; measures (for the industrial environment in any case) that have already proved their worth in other environments:</p>
<ul style="text-align: justify;">
<li>To prevent a threat from spreading, one shall <strong>strengthen detection resources</strong>, especially the flows from and to industrial IS. This is the time to take advantage of this opportunity to dock with the Group SOC if it has not already done so.</li>
</ul>
<ul style="text-align: justify;">
<li>To ensure the integrity and traceability of transmitted/received data, <strong>encryption and authentication can be implemented.</strong> Do you already have a Group PKI? Why not think about extending it to industrial perimeters.</li>
</ul>
<ul style="text-align: justify;">
<li>It is also the right time to <strong>strengthen its OCM / SCM process.</strong> Is the solution connected with the outside? No more excuses for not <strong>installing an antivirus, updating it, installing security patches</strong> for your favourite OS, etc. This point should be anticipated prior to purchasing the solution, rather than once the product has already been installed!</li>
</ul>
<ul style="text-align: justify;">
<li>Finally the solution is critical for the business? A cyber-resilience component must be anticipated so that the solution can be quickly rebuilt and restarted in the event of an attack.</li>
</ul>
<p style="text-align: justify;">As we have just seen, there is no shortage of solutions, but they require adapted support from the cybersecurity teams and going beyond theoretical models. So<strong>, let&#8217;s take advantage of these &#8220;4.0&#8221; projects to make our industrial cyber security models evolve</strong> without a priori!</p>
<p>&nbsp;</p>
<p style="text-align: left;"><a href="#_ftnref1" name="_ftn1">[1]</a> <a href="https://commons.wikimedia.org/wiki/File:Cobot.jpg">https://commons.wikimedia.org/wiki/File:Cobot.jpg</a> license CC : https://creativecommons.org/licenses/by-sa/4.0/deed.en</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/02/industrial-cybersecurity-in-the-age-of-industry-4-0-how-can-we-secure-these-new-use-cases-and-support-business-projects/">Industrial Cybersecurity in the Age of Industry 4.0 : how can we secure these new use cases and support business projects?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Removable media decontamination tools &#8211; success factors for effective security gain and successful deployment</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/12/removable-media-decontamination-tools/</link>
		
		<dc:creator><![CDATA[Loïc Lebain]]></dc:creator>
		<pubDate>Tue, 10 Dec 2019 14:33:28 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[ICS]]></category>
		<category><![CDATA[removable media]]></category>
		<category><![CDATA[USB]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12324</guid>

					<description><![CDATA[<p>Because of their accessibility and ease of use, USB sticks and other USB storage devices are widespread and commonly used. In this article, all these devices will be referred to as ‘removable media’. Industrial networks also called ‘OT’ (Operating Technology)...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/12/removable-media-decontamination-tools/">Removable media decontamination tools &#8211; success factors for effective security gain and successful deployment</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Because of their accessibility and ease of use, USB sticks and other USB storage devices are widespread and commonly used. In this article, all these devices will be referred to as ‘removable media’.</em></p>
<p><em>Industrial networks also called ‘OT’ (Operating Technology) or ‘Production Networks’ include: production networks in factories, test benches, research laboratories or embedded networks in technological products: trains, cars, planes, etc.</em></p>
<p>&nbsp;</p>
<h2>USB flash drives, the real swiss army knives of industrial it, are proving to be formidable vectors for cyber attacks</h2>
<h3>Particularly vulnerable industrial networks</h3>
<p>Industrial systems have long service lifecycles lasting for several decades. These service lifecycles are much longer than those in traditional IT and often lead to problems of hardware or software degradation. These legacy systems are then no longer maintained by their suppliers as they stop publishing security updates for them. Maintaining their security is therefore complex or even impossible.</p>
<p>Even when updates are published, there are issues. For example, they require a maintenance window which can have an operational impact. In some cases, it may also be necessary to requalify the system or perform technical and functional testing before restarting.</p>
<p>In addition, system standardisation has become the norm. Windows or Linux operating systems are commonly found with fewer security patches and therefore may be more easily exploited by computer viruses.</p>
<p>The degradation of industrial systems, the difficulty of maintaining them in a secure state and their standardisation make them increasingly vulnerable to cyber threats. However, it is still necessary to access the industrial network to exploit these vulnerabilities, as they are historically less exposed&#8230;.</p>
<p>&nbsp;</p>
<h3>These vulnerabilities are regularly exploited using removable media as a vector</h3>
<p>Removable media is often used as a bridge between the internal office network or an external network and the industrial network. For example:</p>
<ul>
<li>USB storage devices can be used to deploy configurations or patches on disconnected systems. These configuration files or patches come from workstations that have an internet connection via the company network. These workstations are exposed to cyber threats, and as a result so are the USB storage devices, and through them, the disconnected systems.</li>
<li>Many service providers operating on the industrial network use USB sticks to deliver configuration files, debugging tools and other software. The multitude of subcontractors means there are many data exchanges from uncontrolled networks to industrial networks, each potentially representing a threat vector that can be exploited.</li>
</ul>
<p>These exchanges expose the industrial network to several types of threats:</p>
<ul>
<li>There are many viruses designed to exploit Windows vulnerabilities by spreading through removable media. One of the best-known ones is the Conficker virus, which exploits the automatic task launch mechanism of removable media and thus manages to automatically launch a virus or viral payload when the media is connected. Once a computer is infected, it can spread to other hosts through the network.</li>
<li>The original intended use of storage devices can also be maliciously changed; this type of attack is called a &#8220;Bad USB&#8221;. Rubber Ducky is an example: it makes a USB key look like an input device such as a keyboard, and then launches commands when connected to a computer.</li>
<li>When connected to a computer, USB killers, which look like ordinary USB sticks, store energy until they reach a high voltage, they then release this energy into the host computer to destroy its physical components.</li>
</ul>
<p>&nbsp;</p>
<h3>However, the use of these removable media devices is difficult to circumvent</h3>
<p>Removable media has several common uses such as data storage, backup, transfer or information sharing.</p>
<p>These different use cases have gradually emerged, often at the ingenuity of users without any real supervision from the IT department or the business. When we study these different scenarios, we can classify them into two categories:</p>
<ul>
<li>Those that can be easily removed by offering either a more secure alternative or an improved way of working. For example, with two industrial networks connected to each other, the implementation of a file sharing space on the network can replace a direct exchange by removable media.</li>
<li>Those that could be eliminated with major investment or be very difficult to remove immediately. For example, using an isolated network to install a new computer whereby the deployment of a master image by USB can be difficult to replace.</li>
</ul>
<p>It is difficult to do without removable media entirely, but their use remains problematic. Faced with these threats, solutions are beginning to emerge.</p>
<p>&nbsp;</p>
<h2><strong>Multiple technical solutions exist but provide only a partial solution</strong></h2>
<p>A myriad of increasingly available technical solutions</p>
<p>There are different technical solutions for controlling the content or use of removable media. They can be categorised into several families of solutions:</p>
<ul>
<li>Decontamination terminals or boxes, using one or more antivirus databases, allow us to analyse the USB key content, and if necessary, (re)format or quarantine files if they are considered malicious. Several manufacturers offer this type of solution, including KUB, HOGO, Orange and SOTERIA.</li>
<li>More complex ones can issue a certificate to the key after it has gone through the decontamination terminal. This certificate validates (to the host) that the key has been scanned. This requires that an agent is deployed on all workstations to enable certificate authentication. OPSWAT and FACTORY Systems are among the manufacturers. Previously mentioned KUB, also offers this more complex option on these boxes.</li>
<li>Lastly, there is a solution to group the devices that are used as filters, effectively acting as security airlocks between the host and the removable media. This is a small piece of equipment, connected directly to the USB port of the host on one side, and to the USB key on the other side. Its operation is based on white-list filtering and/or blocking writing from the workstation to the removable media. SECLAB is an example of a manufacturer for this solution.</li>
</ul>
<p>Since all solution offers have different characteristics, it is necessary to identify the one that best meets the security requirements and constraints of the user.</p>
<p>&nbsp;</p>
<h3>These technical solutions create additional steps and require time, which may hinder their adoption</h3>
<p>Depending on the technical solution, the cleansing of removable media is a step that can be time-consuming.  For example, if the key contains lots of small files that must all be checked, the processing time will increase. This task is also highly dependent on the performance of the media being tested.</p>
<p>Additionally, a problem of sizing the terminal arises if the removable media is used to push several large updates (Microsoft for example) or even a complete WSUS database (Windows Server Update Services) between 2 networks (this can reach a 100GB of data). If this time is not controlled and limited, removable media users will stay clear of this technology.</p>
<p>Difficult access also discourages users. In the industrial sector, there are many constraints depending on where users are located. A change of area may require a change of protective equipment, clothing or special controls. Insufficient equipment could lead to the same accessibility problem.</p>
<p>It is necessary to place the right equipment where decontamination is taking place or is unavoidable (reception, security office), and to find the right compromise between the different implementation of solutions: e.g. a solution applied centrally (terminal) vs. distributed (box or filter).</p>
<p>&nbsp;</p>
<h3>These technical solutions often require maintenance in operational condition (MOC) and maintenance in safety condition (MSC) which must not be neglected</h3>
<p>To properly function, the technical solutions must be maintained by updating them, updating their viral databases for when the solution integrates an anti-virus, updating the filtering rules, as well the certificate database for more complex systems. It is also useful to be able to issue reports and alerts when the tool permits.</p>
<p>For this purpose, the decontamination terminals require several types of access:</p>
<ul>
<li>antivirus updates on servers;</li>
<li>internal operating system updates on servers;</li>
<li>the supervision network for issuing reports and alerts;</li>
<li>Sometimes to a dedicated server that will manage the certificate database and centralise administration.</li>
</ul>
<p>These terminals can therefore be integrated into a more, or less complex architecture as required.</p>
<p>Decontamination terminals are equipped with an operating system and often standard applications, hence the importance of hardening their configurations so they themselves are not the victim of an attack.</p>
<p>It is necessary to conduct a study on the possible technical solutions by putting into perspective the reliability, utility, efficiency and cost of each option. Similarly, it is essential to review the governance of these facilities, which are at the crossroads between the management information system and the industrial information system. This should avoid problems of underestimating the implementation of these solutions and stop users turning away from the chosen solution.</p>
<p>The protection of industrial systems against USB-related threats requires a careful choice of technical solution and availability for users. Without this and without awareness of the cybersecurity issues, systems are exposed, and the impacts of an attack can be significant.</p>
<p>&nbsp;</p>
<h2><strong>These tools must be the subject of a full project: from the consideration of use cases and change management</strong></h2>
<h3>The use cases must be known to decide between the different solutions or even eliminate the use of the removable media</h3>
<p>Before proposing a technical solution, the first question to ask yourself is <em>why do we need to use the removable media?</em> To answer this question, you must list all the different use cases.</p>
<p>In each case, it must be determined whether their use is appropriate and whether there is no more effective and/or safe alternative. Here are some examples of commonly encountered situations for which alternative solutions exist:</p>
<ul>
<li>If a USB key is used as storage for config. files, then a centralised solution or at least storage on suitable equipment can be used.</li>
<li>In the case of media being used between two devices that are connected to a network, the implementation of an exchange server, for example using a secure protocol such as SFTP, can be considered.</li>
<li>For maintenance teams working on connected systems that use removable media to update configuration files, an MFT (Managed File Transfer) exchange gateway with antivirus control can be used. This application ensures the safety of a file from an external source before making it available internally. A third-party solution would be able to make secure removable media available to staff or maintenance teams by only allowing editing of media from workstations.</li>
</ul>
<p>In the remaining cases, an appropriate solution should be considered. The solution should be presented to users and its interest explained. For better adoption, it should have as little influence as possible on the pre-existing business process, and as a minimum, it should not lead to an excessive workload or time commitment.</p>
<p>&nbsp;</p>
<h3>In addition to being integrated with the business use case, the technical solution must meet the intended security objectives</h3>
<p>2 selection criteria must be taken into account when deploying a removable media security solution: the business use case and the security objectives targeted.</p>
<p>The security objectives are often the same: check that a storage device is genuinely a storage device (i.e. not a &#8220;Bad USB&#8221;) and check that it does not contain a virus or viral payload. These 2 objectives are covered by most solutions on the market.</p>
<p>It is therefore the business use case that will influence the ergonomics of the chosen solution:</p>
<ul>
<li>A fixed monobloc terminal integrates well into the entrance of an area reserved for operations such as a laboratory or workshop. On the other hand, a tablet will be much more mobile and can be used in several situations.</li>
<li>A certificate solution requiring an equipment agent on standard workstations without specific qualifications will not be difficult but can be problematic in qualified or already obsolete environments.</li>
<li>Mobiles always need a way to control; a filter solution can be considered for this.</li>
</ul>
<p>Once the type of solution has been chosen, the possibilities of integrating the solution into the existing ecosystem with proposed security measures will make it easier to select the most appropriate one.</p>
<p>&nbsp;</p>
<h3><u>The chosen solution must integrate administration and incident reporting functions while guaranteeing an appropriate level of security</u></h3>
<p>The chosen tool must be easily manageable and have a centralised administration function if there is a significant number of facilities being planned. It is also necessary that the following elements of the solution can be updated: the operating system, the embedded applications, antivirus applications, and the signature databases.</p>
<p>These features mean that the solution will need a connection to the administration network and an external connection to retrieve these updates. These connections must be secure, and the update server systematically identified.</p>
<p>In addition, it is necessary to take precautions to ensure that the solution has been hardened and that only the useful functions are available, especially at the operating system level. It would be pointless if the key decontamination tool itself was the vector of key contamination!</p>
<p>Finally, it is preferable that the generated reports and event logs can be sent in a standard Syslog format, centralised and also analysed by an existing SIEM to detect and track any suspicious activities.</p>
<p>&nbsp;</p>
<h3>In conclusion, the implementation must be approved by the people who will actually use the terminal every day</h3>
<p>There are many technical solutions that, by analysing and decontaminating these devices, can reduce exposure by removable media in industrial networks. There are 2 success factors for good implementation:</p>
<ul>
<li>A solution designed for business use cases with end users in mind; and</li>
<li>A solution where administrative factors, the update process and security aspects have been considered upstream.</li>
</ul>
<p>In addition to these, there is a 3<sup>rd</sup> success factor: change management, which must ensure that the new tool is properly integrated into existing processes with appropriate communication to end users.</p>
<p>It is necessary to formalise a procedure in case there is a virus or any other abnormality. Detecting is ultimately only the first step towards an appropriate response.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/12/removable-media-decontamination-tools/">Removable media decontamination tools &#8211; success factors for effective security gain and successful deployment</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
