Cybersecurity Assessment Flow

Flow Start
Please config questionnaire global setup.
How often is the Installed Base Inventory assessed?
How often is the Installed Base Inventory assessed?
How often is the Installed Base Inventory assessed?
Hourly
Daily
Weekly
Monthly
Quarterly
Less frequently than quarterly
How often is a Supply Chain Risk assessment performed?
How often is a Supply Chain Risk assessment performed?
How often is a Supply Chain Risk assessment performed?
On an ongoing basis
Last 3 months
Last 6 months
Last 12 months
Planned
Not yet planned
System criticality: Business critical systems have been identified and prioritized.
System criticality: Business critical systems have been identified and prioritized.
System criticality: Business critical systems have been identified and prioritized.
In place
In progress
Planned
Not yet planned
Identity Management Systems: What is the status of remote access controls allowing secure offsite login?
Identity Management Systems: What is the status of remote access controls allowing secure offsite login?
Identity Management Systems: What is the status of remote access controls allowing secure offsite login?
In place
In progress
Planned
Not yet planned
Identity Management Systems: What is the status of physical access controls that discern and prevent unauthorized system access?
Identity Management Systems: What is the status of physical access controls that discern and prevent unauthorized system access?
Identity Management Systems: What is the status of physical access controls that discern and prevent unauthorized system access?
In place
In progress
Planned
Not yet planned
What’s the status of implementation of an Industrial Demilitarized Zone (IDMZ) within OT security architecture?
What’s the status of implementation of an Industrial Demilitarized Zone (IDMZ) within OT security architecture?
What’s the status of implementation of an Industrial Demilitarized Zone (IDMZ) within OT security architecture?
In place
In progress
Planned
Not yet planned
What’s the status of effective OT patch management?
What’s the status of effective OT patch management?
What’s the status of effective OT patch management?
In place
In progress
Planned
Not yet planned
Operational systems data backup processes are regularly executed?
Operational systems data backup processes are regularly executed?
Operational systems data backup processes are regularly executed?
In place
In progress
Planned
Not yet planned
Protective technology: what is the status of effective removable media security procedures?
Protective technology: what is the status of effective removable media security procedures?
Protective technology: what is the status of effective removable media security procedures?
In place
In progress
Planned
Not yet planned
What’s the status of network segmentation / microsegmentation architecture implementation, placing security perimeters around business-critical systems?
What’s the status of network segmentation / microsegmentation architecture implementation, placing security perimeters around business-critical systems?
What’s the status of network segmentation / microsegmentation architecture implementation, placing security perimeters around business-critical systems?
In place
In progress
Planned
Not yet planned
Use of a Security Information Event Management (SIEM) system, providing real-time analysis of security alerts generated by applications and network hardware?
Use of a Security Information Event Management (SIEM) system, providing real-time analysis of security alerts generated by applications and network hardware?
Use of a Security Information Event Management (SIEM) system, providing real-time analysis of security alerts generated by applications and network hardware?
In place
In progress
Planned
Not yet planned
Endpoint security – every endpoint is access controlled and monitored in real time 24/7?
Endpoint security – every endpoint is access controlled and monitored in real time 24/7?
Endpoint security – every endpoint is access controlled and monitored in real time 24/7?
In place
In progress
Planned
Not yet planned
Employee security awareness training and testing?
Employee security awareness training and testing?
Employee security awareness training and testing?
In place
In progress
Planned
Not yet planned
What’s the status of implementing a converged IT / OT cybersecurity roadmap?
What’s the status of implementing a converged IT / OT cybersecurity roadmap?
What’s the status of implementing a converged IT / OT cybersecurity roadmap?
In place
In progress
Planned
Not yet planned
What’s the status of using Common Industrial Protocol (CIP) certified products to secure and encrypt Ethernet communications?
What’s the status of using Common Industrial Protocol (CIP) certified products to secure and encrypt Ethernet communications?
What’s the status of using Common Industrial Protocol (CIP) certified products to secure and encrypt Ethernet communications?
In place
In progress
Planned
Not yet planned
The organization works with one or more established cybersecurity partners, delivering dynamically updated and scalable OT SOC services.
The organization works with one or more established cybersecurity partners, delivering dynamically updated and scalable OT SOC services.
The organization works with one or more established cybersecurity partners, delivering dynamically updated and scalable OT SOC services.
In place
In progress
Planned
Not yet planned
Real-time threat and anomaly detection via OT SOC (owned or managed services) for malware, ransomware, vulnerabilities?
Real-time threat and anomaly detection via OT SOC (owned or managed services) for malware, ransomware, vulnerabilities?
Real-time threat and anomaly detection via OT SOC (owned or managed services) for malware, ransomware, vulnerabilities?
In place
In progress
Planned
Not yet planned
What’s the status of cyber threat analysis, threat containment and threat mitigation capabilities?
What’s the status of cyber threat analysis, threat containment and threat mitigation capabilities?
What’s the status of cyber threat analysis, threat containment and threat mitigation capabilities?
In place
In progress
Planned
Not yet planned
Status of systems, data and operational procedures to restore operations quickly in the event of a cyber attack? 
Status of systems, data and operational procedures to restore operations quickly in the event of a cyber attack? 
Status of systems, data and operational procedures to restore operations quickly in the event of a cyber attack? 
In place
In progress
Planned
Not yet planned
Result
Flow End