<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>OT Cyber Security Frameworks Comparison Tool (CSFCTool)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>G. Mùrino</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>M. Ribaudo</string-name>
          <email>marina.ribaudo@unige.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>S. P. Romano</string-name>
          <email>spromano@unina.it</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>A. Tacchella</string-name>
          <email>armando.tacchella@unige.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>DIBRIS, Università degli Studi di Genova</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>DIETI, Università degli Studi di Napoli Federico II</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This paper proposes a holistic cybersecurity online tool to support implementation activities of the “National Framework for Cybersecurity &amp; Data Protection”, one of its contextualizations, as well as the iffteen “Essential Cybersecurity Controls”. It also aims at promoting its wide dissemination by SMEs. All the regulations, standards and national/international laws mentioned as “Informative References” for each Subcategory in the Framework Core are, in fact, made available through a web application where they can be consulted with a few clicks, guiding even less experienced users in the creation of their cybersecurity compliance projects. The research and analysis activities conducted with a systematic, global and conceptual approach - consistent with the original document - have been aimed at highlighting the substantial diferences between IT/OT cybersecurity requirements in order to increase, through a comparative analysis, the cyber resilience of national critical infrastructures. Meanwhile, since an important step towards cyberspace security is a global increase in the level of cyber risk awareness, the tool aims to be used for education and training programs too, both at the corporate and academic levels, in order to bridge the skills gap in the job market between job seekers and employers. For this purpose, some of the main reference standards used for auditing, vulnerability assessment and risk management activities have been included.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Legal aspects and compliance tool</kwd>
        <kwd>cyber education and training tool</kwd>
        <kwd>cyber risk awareness</kwd>
        <kwd>National Framework for Cybersecurity &amp; Data Protection</kwd>
        <kwd>Data security and Privacy</kwd>
        <kwd>Operational Technology</kwd>
        <kwd>Critical Infrastructures security</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The publication of Presidential Policy Directive 21 (PPD-21/2013) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] commissioned by past
U.S. President Barack Obama, introduced the concept of resilience as “the ability to prepare for
and adapt to changing conditions and withstand and recover rapidly from disruptions. Resilience
includes the ability to withstand and recover from deliberate attacks, accidents, or naturally
occurring threats or incidents”, which was used to coin the new term of cyber-resilience as “the
ability to continuously deliver the intended outcome despite adverse cyber events” [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>To better address these risks, the Cybersecurity Enhancement Act of 20141 (CEA) updated the
role of the National Institute of Standards and Technology (NIST) to include, identify and develop
cybersecurity risk frameworks for voluntary use by critical infrastructure owners and operators.
More specifically, the goal was “...to identify a prioritized, flexible, repeatable, performance-based,
and cost-efective approach, including information security measures and controls that may be
voluntarily adopted by owners and operators of critical infrastructure to help them identify, assess,
and manage cyber risks”. This formalized NIST’s previous work developing Framework Version
1.0 under Executive Order (EO) 13636, “Improving Critical Infrastructure Cybersecurity”2
(February, 2013), and provided guidance for the future evolution of the Framework up to the
release of version 1.1 (April, 2018).</p>
      <p>
        Meanwhile, at national level, as illustrated in Figure 1, the joint activities of the Cyber
Intelligence and Information Security Center (CIS) at Sapienza University of Rome and the
Cyber Security National Lab (CINI), led to the publication of the “National Framework for
Cyber Security” (version 1.0, 2015) [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] which was followed in 2016 by the publication of the
“Essential Cyber Security Controls” [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], until the publication in 2019 of version 2.0 of the
“National Framework for Cybersecurity and Data Protection” (FNCS&amp;DP) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] which integrates
the national implementation of EU Regulation 2016/679 (GDPR) on personal data protection.
      </p>
      <p>As per the NIST Framework, from which our National Framework is derived, the Framework
Core includes an Informative References section that provides specific standards, guidelines, and
practices common among critical infrastructure sectors that illustrates a method to achieve the
outcomes associated with each Subcategory.</p>
      <p>Compared to the list initially provided by NIST, the National Framework versions have been
extended to national reference laws and regulations (including transposition decrees of EU
directives).</p>
      <sec id="sec-1-1">
        <title>1https://www.congress.gov/bill/113th-congress/senate-bill/1353/text</title>
        <p>2https://www.federalregister.gov/documents/2013/02/19/2013-03915/improving-critical-infrastructurecybersecurity</p>
        <p>The use of Informative References is non-compulsory for the implementation of the National
Framework. Organizations have the flexibility to mix and match Informative References as best
suits their needs. They may use all, some, none, or even choose to map additional practices
not included in the Informative References catalog. While this, on the one hand, represents
an advantage to the application of the National Framework, on the other hand it represents a
major problem for SMEs facing further dificulties as they often do not have the skills and/or
economic resources necessary to cope with this complexity.</p>
        <p>Having in mind this scenario, this work proposes a web-based tool which has three main
objectives:
1. Providing personnel involved in cybersecurity activities with an automatic consultation
and design tool able to support their choices based on a selection of documents that are
quickly accessible and constantly updated, saving research and selection time in the mare
magnum of national and international Informative References currently existing.
2. Pointing out the security requirements substantial diferences in an Operational
Technology (OT) vs Information Technology (IT) environment.
3. Providing a self-learning support for training, at both corporate and academic level, in
order to standardize the required cybersecurity best practises and skills.</p>
        <p>The paper is organised as follows: in Section 2 we present some related work, while in
Section 3 we describe the objectives of the proposed framework. In Section 4 we briefly describe
the architecture of the current proof-of-concept and its main functionalities. Finally, Section 5
concludes this work presenting possible future extensions.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Related Work</title>
      <p>
        The adoption of a cybersecurity framework may represent a best practice and a way to
demonstrate that the organization adopted a well-grounded duty of care. This represents an important
step to properly face fines and the legal liability of lawsuits [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>Unfortunately, nowadays this is no longer enough. The digital transformation of society
(intensified by the COVID- 19 crisis) has expanded the threat landscape and is bringing about
new challenges, which require adapted and innovative responses to avoid that any disruption,
even those initially confined to just one entity or one sector, can have cascading efects more
broadly, potentially resulting in far-reaching and long-lasting negative impacts in the delivery
of services across the whole internal market, as underlined in the recent EU Proposal for NIS
2.0 (December, 2020)3.</p>
      <p>
        A significant change of pace is required to rapidly increase cybersecurity awareness overall in
SMEs [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. A change which can only go through a digitization of the tools provided to support this
activity. In this sense, a confirmation is also provided by the american NIST which, by publishing
its NIST SP 800 − 53 rev.5, declares that “...In the near future, NIST also plans to ofer the content
3https://ec.europa.eu/digital-single-market/en/news/proposal-directive-measures-high-common-levelcybersecurity-across-union
of SP 800 − 53, SP 800 − 53, and SP 800 − 53 to a web-based portal to provide its customers
interactive, online access to all control, control baseline, overlay, and assessment information” [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>In this context, another key element is is represented by the IT/OT convergence. The advent
of the 4ℎ industrial revolution, also known as Industry 4.0, introduced cyber-physical systems.
Industrial Control Systems (ICS) - such as Supervisory Control and Data Acquisition (SCADA),
Distributed Control Systems (DCS) and Programmable Logic Controllers (PLC) - introduced
by the third industrial revolution to support and improve operational activity in the industrial
sector and in critical infrastructures, traditionally “closed” to the outside world, have been
connected to the Internet with unavoidable serious consequences deriving from the need to
integrate the Operational Technology (OT) world, on the one hand, with that of Information
Technology (IT) on the other hand. The convergence point between these two distinct worlds
is a figurative “red dot” that represents the weak point of the entire system.</p>
      <p>
        This new trend in industry to let IT and OT systems converge comes from the need to access
real time data and to interconnect all facilities in order to enhance productivity/production. The
convergence is driven by the need to obtain quantitative management reporting, assisted by big
data and sensor technology, artificial intelligence, physical automation, remote operations, cloud
computing, analytics [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. This requires operators to increase network connectivity and access to
both IT and OT systems using Ethernet, Wi-Fi and TCP/IP standards [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] with consequent new
challenges to be faced (e.g., network performance considerations related to diferent latency,
jitter, bandwidth and throughput between IT/OT protocols [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]).
      </p>
      <p>
        Finally, as reported by ENISA “CyberSecurity Skills development in the EU” 4 report, published
in December 2019, the cybersecurity skills shortage, which refers to the lack of qualified
cybersecurity professionals in the labour market [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], represents an issue for both economic
development and national security, especially in the rapid digitization of the global economy. It
poses threats with a high impact on the data, information technology systems and networks
that form the dorsal spine of modern societies.
      </p>
      <p>This skills shortage can be further analysed into two concurrent issues: a quantitative one
and a qualitative one. The quantitative issue is related to the insuficient supply of cybersecurity
professionals to meet the requirements of the job market; the qualitative one is related to the
inadequacy of professional skills to meet market needs. This report focuses on the status of
the cybersecurity education system and its inability to attract more students in the field of
cybersecurity. It argues that many of the current issues in cybersecurity education could be
ameliorated by redesigning educational and training pathways that define knowledge and skills
that students should possess upon graduation and after entering the labour market.</p>
      <p>Diferent causes might be attributed to the skills shortage 5, credited with issues in the
workplace or in the education and training system. Two elements that compound the shortage
can be attributed to employers or, more generally, to the labour market:
1. The high expectations that employers have about the skill level of candidates that the
current labour market can ofer.</p>
      <sec id="sec-2-1">
        <title>2. The lack of suficient and suitable training provided to employees.</title>
        <p>4https://www.enisa.europa.eu/topics/cybersecurity-education/european-cybersecurity-skills-framework
5https://www.newamerica.org/cybersecurity-initiative/reports/cybersecurity-workforce-development/
The cybersecurity job market is relatively immature and very dynamic, and the job specifications
are highly dependent on the organisation size and sector. ENISA report emphasizes that “...Small
and Medium-sized enterprises not specialised in job security tend to prefer generalist IT staf with
some understanding of cybersecurity, whereas larger firms and firms specialised in cybersecurity
have need of specialised staf focused on one of the sub-disciplines of cybersecurity" .</p>
        <p>
          Concerning tools availability, to the best of the authors’ knowledge, there is no tool featuring
the same capabilities as the one proposed in this paper. While several automated tools are
available to support technical auditing tasks (i.e., information gathering, penetration, exploitation,
forensics [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]) or to support cybersecurity learning activities [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ], none is able to simultaneously
ofer support to regulatory compliance, starting from our FNCS &amp; DP, highlighting diferences
in OT vs IT worlds. Last but not least, our tool follows up previous proposals (i.e., Cyber Security
Framework Tool6, CRUMBS [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]) intended to disseminate the National Framework.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Cyber Security Framework Comparison Tool</title>
      <p>As anticipated in Section 1, we present in this section the Cyber Security Framework Comparison
Tool (abbreviated with CSFCTool in the following). We first illustrate the implementation of the
three main project objectives. Then, we briefly describe the architecture of the tool and some of
its main functions.</p>
      <sec id="sec-3-1">
        <title>3.1. Objective 1: Simplifying the use of the National Framework by SMEs</title>
        <p>The CSFCTool is based on the assumption that the aforementioned National Framework (in
all its versions), for each identified Subcategory, proposes a list of corresponding Informative
References (see Figure 2), e.g., a list of specific national/international standards, regulations or
laws to refer to in order to achieve the outcomes associated with the selected Subcategory.</p>
        <sec id="sec-3-1-1">
          <title>6http://tool.cybersecurityframework.it</title>
          <p>The adoption of cybersecurity standards is often a technical challenge for SMEs, where
the staf involved in cybersecurity assessment activities has to face daily overlapping of roles,
shortage of time, and training gaps or inadequate skills.</p>
          <p>The first objective of CSFCTool can be reached thanks to the adoption of four phases, detailed
below, which correspond to as many steps within the security assessment process.
• Step 1 - Automate security assessment activities</p>
          <p>Through direct access to the consultation of all national/international standards,
regulations and law articles listed in correspondence with each selected Subcategory, the
CSFCTool allows to automate the use of the National Framework for Cybersecurity and
Data Protection (FNCS&amp;DP), one of its contextualization or fifteen Essential Cybersecurity
Controls (CEC) in a simple, clear and fast way.
• Step 2 - Verify regulatory compliance</p>
          <p>By creating an individual Portfolio, the CSFCTool allows each user to access the various
projects created, verify and note their regulatory compliance with the aid of an interactive
NOTES section associated with each Subcategory of a selected project.
• Step 3 - Plan and manage all projects in a unique personal Portfolio
Using the CSFCTool users can quickly create projects with diferent maturity levels or
profiles , collect them in their personal PORTFOLIO and manage them intelligently. In
this way they will be able to plan and control the organization’s continuous improvement
in an easy way, always having under control the progress of all transition processes.
• Step 4 - Save hours of design</p>
          <p>Within the CSFCTool it is possible to access all national and international references
related to the use of the National Framework and to understand their time allocation
(and/or updates) in a few clicks. Staf will thus be able to save hours of work lost in
collecting, selecting and understanding the rules to be used. For each reference, in fact,
there is also a quick self-learning tutorial that can be easily consulted. Furthermore, all
attached and linked documents are made available in downloadable format.</p>
        </sec>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Objective 2: Identification of OT vs IT Cybersecurity requirements</title>
        <p>The second main objective of CSFCTtool is to highlight the application diferences between
OT and IT cybersecurity requirements using the so-called CIA TRIAD paradigm based on
Confidentiality, Integrity and Availability (as illustrated in Figure 3), to arise security of critical
infrastructures by increasing the level of awareness of all personnel involved in their operations.</p>
        <p>
          The process consists in a cross-mapping mechanism based on the use of NIST SP 800 − 82
rev.2 “Guide to Industrial Control Systems (ICS) Security” [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] a document that provides guidance
on how to secure ICS, including SCADA systems, DCS, and other control system configurations
such as PLC, while addressing their unique performance, reliability, and safety requirements [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ].
This document7 includes (in Appendix G) an overlay based on NIST SP 800− 53 Rev.4 [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. More
specifically, Table G-1 provides a summary of the security controls and control enhancements
        </p>
        <sec id="sec-3-2-1">
          <title>7Cited also in ECSO Guidelines [18] as reference for ICS in Industry 4.0</title>
          <p>from NIST SP 800 − 53 Appendix F that have been allocated to the initial security control
baselines (i.e., Low, Moderate, and High) along with indications of ICS Supplemental Guidance
and ICS tailoring. Controls and control enhancements for which there is ICS Supplemental
Guidance are bolded. If the control baselines are supplemented by the addition of a control to the
baseline, the control or control enhancement is underlined. If a control or control enhancement
is removed from the baseline, the control or control enhancement is struck out.</p>
          <p>Example in Figure 4, compares initial control baseline values for NIST SP 800− 53 rev.4 (above)
vs NIST SP 800 − 8 rev.2 overlay (below). It is highlighted how an ICS Supplemental Guidance
was added to Control Enhancement 1 of AU-4 (bolded). In addition, Control Enhancement 1 of
AU-4 was added to the Low, Moderate and High baselines (underlined).</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Objective 3: Training and self-training activities</title>
        <p>Helping to bridge the skills gap is the third key objective of the CSFCTool project. To support the
training and self-learning activities two strictly interconnected actions have been implemented:
• Extension of standards, regulations and laws list</p>
        <p>As shown in Figure 5, the Informative References of the FNCS &amp; DP have been extended
by adding eight new documents which are briefly explained in Appendix A.
• Creation of eight educational sections</p>
        <p>Starting from the complete Informative Reference list, up to now, eight sections have been
created (as shown in Figure 6), which present all documents listed in Figure 5. Each
section includes:
1. A landing page with a brief introductory summary and links to all related standards,
regulations or laws.
2. A timeline that allows to contextualize all related documents over time and national
vs international panorama.
3. A subsection for each standard/regulation or law previously summarized. Each
subsection proposes synthetic content aimed at self-orientation and/or self-learning
(which can also be used for face-to-face or online training) and, in compliance with
the original document, allows interactive access to all cited crossed contents.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Prototype description</title>
      <p>CSFCTool is built as a standard web application. Its front-end is developed in HTML and CSS,
taking advantage of the Bootstrap8 framework to improve the look and feel of the user interface.
The server-side code is written using the PHP programming language and the back-end data
storage is handled via a MySQL9 server using MySQL Workbench, an Oracle unified visual tool
that provides data modeling, SQL development, server configuration, user administration and
backup. The current implementation is still a proof-of-concept built to demonstrate the potential
of such an application. Some refactoring is needed to go online, but the current proof-of-concept
version provides a view of all the functions that have been designed and implemented.</p>
      <p>A visual sitemap of CSFCTool showing the full website structure is presented in Figure 7.
The eight educational sections are available in the HOME page. From the menu bar it is possible
to reach the services (SERVIZI) and other resources (RISORSE).</p>
      <p>Figure 8 shows a small portion of the back-end relational database, presenting the tables
(Function, Category, Subcategory, Ref ) which allow to map all Subcategories with their
corresponding Informative References as discussed in Section 3.1. Thanks to the data stored in these
tables, the users can access all Informative References, and find all the details presented in a
tabular form. This allows them to have a direct access to specific articles without having to
browse the whole document.</p>
      <p>In order to use the available services, the users must register to the platform providing their
name, surname and a valid e-mail address. After authentication a user can:
1. Consult all articles from regulations, standards and laws listed for each Subcategory
in the Informative References section, starting from FNCS &amp; DP, CEC or an existing
contextualization (e.g., GDPR).
2. Create a new project, e.g., select Subcategories they might decide to implement within
their organization starting from FNCS &amp; DP, CEC or from a new contextualization
(consultation function for Informative References is still available to support choices).
3. Visualize all projects in a personal PORTFOLIO area. All diferent projects created and
stored are here available in order to be used synergistically, e.g., to monitor continuous
improvement when moving from the current to the target profile.</p>
      <p>After selecting the starting point users are presented a page with the corresponding Functions,
Categories, Subcategories and Informative References to be selected by checking boxes in a
guided procedure.</p>
      <p>Figure 9 shows the four steps of this procedure, with the first one highlighted in blue. All
projects are reachable from the section PORTFOLIO. Opening a created project makes available
two sections. The first one presents a summary of the selected Subcategories while the second,
for each Subcategory, provides the user with a section NOTE where to add information obtained
from the normative or any other type of comment useful for its implementation. Currently,
only textual comments can be added, but the extension to other types of documents, e.g., pdf
ifles or images, can easily be added.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions and future work</title>
      <p>This paper presented the main features of CSFTool, a new web-based application with the
objective of raising awareness about IT/OT cybersecurity and empowering end users (in particular
SMEs) with actionable knowledge on standards, regulations and laws related to protection of
critical infrastructure.</p>
      <p>We have discussed the main rationale behind the project, as well as provided information
about both the design and the implementation of a proof-of-concept prototype of the overall
system.</p>
      <p>As part of our future work, we plan to refine the current implementation in order to arrive
at a fully fledged product. The goal is to enable companies to leverage such a product for
implementing efective strategies aimed at increasing the overall resilience level of their critical
infrastructures.</p>
      <p>A second line of exploitation concerns the use of the CSFCTool as an efective means for
carrying out education and training campaigns, both at the academic level and as part of
dedicated professional training initiatives tailored to private companies.</p>
      <p>Finally, we also plan to integrate the CSFCTool with state-of-the-art monitoring frameworks
like, e.g., the well-known ELK (Elasticsearch, Logstash and Kibana)10 stack. Namely, our tool
might become an ELK component tailored to analyzing and catalyzing information about a
company’s IT/OT cybersecurity compliance level, as well as optimizing IT/OT data management
processes for the long term.</p>
    </sec>
    <sec id="sec-6">
      <title>Appendix A</title>
      <p>The documents listed in Figure 5 are briefly described in the following.</p>
      <p>
        • NIST SP 800-53 Rev.5 Revision of foundational NIST SP 800-53 rev.4, this publication
represents a multi-year efort to develop the next generation of security and privacy
controls that will be needed "...to develop and make available to a broad base of public and
private sector organizations a comprehensive set of safeguarding measures for all types of
computing platforms, including general purpose computing systems, cyber-physical systems,
cloud-based systems, mobile devices, Internet of Things (IoT) devices, weapons systems, space
systems, communications systems, environmental control systems, super computers, and
industrial control systems". It includes changes to make these controls more usable by
diverse consumer groups (as enterprises conducting mission and business functions;
engineering organizations developing information systems, IoT devices, and
systems-ofsystems; and industry partners building system components, products, and services).
• NIST SP 800-82 Rev. 2 which provides the overlay tool for ICS described in CSFCTool
objectives of Section 3.2.
• ISO 19011:2018 "Guidelines for auditing management systems" [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] This document
provides the third edition of ISO standard guidance on auditing management systems,
including the principles of auditing, managing an audit program and conducting
management system audits, as well as guidance on the evaluation of competence of individuals
involved in the audit process.
• ISO/IEC 27000:2018 "Information technology - Security techniques - Information
security management systems - Overview and vocabulary" (fifth edition) [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] This
document provides an overview of Information Security Management Systems (ISMS)
and describes terms and definitions commonly used in the ISMS family of standards.
• ISO/IEC 27005:2018 "Information technology - Security techniques - Information
security risk management" [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] that provides ISO standard guidelines for information
security risk management in an organization. This document supports the general
concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation
of information security based on a risk management approach.
• ISO 31000:2018 "Risk management - Guidelines" [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] This document provides ISO
standard guidelines on managing risk faced by organizations. It provides a common
approach to managing any type of risk and is not industry or sector specific. It can be
used throughout the life of the organization.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>B.</given-names>
            <surname>Obama</surname>
          </string-name>
          ,
          <source>Presidential Policy Directive</source>
          <volume>21</volume>
          (
          <issue>PPD21</issue>
          ):
          <article-title>Critical infrastructure security and resilience</article-title>
          (Washington, DC (
          <year>2013</year>
          )).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>F.</given-names>
            <surname>Bjorck</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Henkel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Stirna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zdravkovic</surname>
          </string-name>
          ,
          <article-title>Cyber resilience-fundamentals for a definition</article-title>
          ,
          <source>in: New Contributions in Information Systems and Technologies</source>
          , Springer,
          <year>2015</year>
          , pp.
          <fpage>311</fpage>
          -
          <lpage>316</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R.</given-names>
            <surname>Baldoni</surname>
          </string-name>
          , L. Montanari,
          <source>Un Framework Nazionale per la Cyber Security</source>
          ,
          <source>2015 Italian Cyber Security report</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>CIS-Sapienza/</surname>
            <given-names>CINI</given-names>
          </string-name>
          , Controlli essenziali di cybersecurity,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>[5] CIS-Sapienza/CINI, Framework nazionale per la cybersecurity e la data protection</article-title>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Angelini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Ciccotelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Franchina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Marchetti-Spaccamela</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Querzoni</surname>
          </string-name>
          ,
          <article-title>Italian national framework for cybersecurity and data protection</article-title>
          ,
          <source>in: Annual Privacy Forum</source>
          , Springer,
          <year>2020</year>
          , pp.
          <fpage>127</fpage>
          -
          <lpage>142</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>B. Y.</given-names>
            <surname>Ozkan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Spruit</surname>
          </string-name>
          ,
          <article-title>Cybersecurity Standardisation for SMEs: The Stakeholders' Perspectives and a Research Agenda</article-title>
          ,
          <source>International Journal of Standardization Research (IJSR) 17</source>
          (
          <year>2019</year>
          )
          <fpage>41</fpage>
          -
          <lpage>72</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>N. N. I. of Standards</surname>
          </string-name>
          , Technology),
          <source>NIST SP 800-53 rev. 5 - Security and Privacy Controls for federal Information Systems and Organizations</source>
          (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>G.</given-names>
            <surname>Murray</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Johnstone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Valli</surname>
          </string-name>
          ,
          <article-title>The convergence of it and ot in critical infrastructure</article-title>
          ,
          <source>in: 15th Australian Information Security Management Conference</source>
          ,
          <year>2017</year>
          , p.
          <fpage>149</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Shahzad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N. N.</given-names>
            <surname>Xiong</surname>
          </string-name>
          , G. Jeong,
          <string-name>
            <given-names>Y.-K.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-Y.</given-names>
            <surname>Choi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. W.</given-names>
            <surname>Mahesar</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Ahmad</surname>
          </string-name>
          ,
          <article-title>A secure, intelligent, and smart-sensing approach for industrial system automation and transmission over unsecured wireless networks</article-title>
          ,
          <source>Sensors</source>
          <volume>16</volume>
          (
          <year>2016</year>
          )
          <fpage>322</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>E. D.</given-names>
            <surname>Knapp</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. T.</given-names>
            <surname>Langill</surname>
          </string-name>
          , Industrial Network Security:
          <article-title>Securing critical infrastructure networks for smart grid</article-title>
          ,
          <source>SCADA, and other Industrial Control Systems, Syngress</source>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>T. De</surname>
            <given-names>Zan</given-names>
          </string-name>
          ,
          <article-title>Future research on the cyber security skills shortage, Cyber Security Education: Principles and Policies (</article-title>
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>O. M.</given-names>
            <surname>Al-Matari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. M. A.</given-names>
            <surname>Helal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Mazen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Elhennawy</surname>
          </string-name>
          ,
          <article-title>Cybersecurity Tools for IS Auditing</article-title>
          , in: 2018
          <source>Sixth International Conference on Enterprise Systems (ES)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>217</fpage>
          -
          <lpage>223</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>L.</given-names>
            <surname>Topham</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kifayat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. A.</given-names>
            <surname>Younis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Askwith</surname>
          </string-name>
          ,
          <article-title>Cyber security teaching and learning laboratories: A survey</article-title>
          ,
          <source>Information &amp; Security</source>
          <volume>35</volume>
          (
          <year>2016</year>
          )
          <fpage>51</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Angelini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lenti</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Santucci, CRUMBS: a cyber security framework browser</article-title>
          ,
          <source>in: 2017 IEEE Symposium on Visualization for Cyber Security (VizSec)</source>
          , IEEE,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>N. N. I. of Standards</surname>
          </string-name>
          , Technology),
          <source>NIST SP 800-82 rev</source>
          . 2
          <article-title>- Guide to Industrial Control Systems (ICS) Security (</article-title>
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>W.</given-names>
            <surname>Knowles</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Prince</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Hutchison</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. F. P.</given-names>
            <surname>Disso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Jones</surname>
          </string-name>
          ,
          <article-title>A survey of cyber security management in industrial control systems</article-title>
          ,
          <source>International journal of critical infrastructure protection 9</source>
          (
          <year>2015</year>
          )
          <fpage>52</fpage>
          -
          <lpage>80</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>E. E. C. S.</given-names>
            <surname>Organization</surname>
          </string-name>
          ,
          <article-title>State of art Syllabus - Overview of existing Cybersecurity standards</article-title>
          and
          <source>certification schemes v2</source>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>N. N. I. of Standards</surname>
          </string-name>
          , Technology),
          <source>NIST SP 800-53 rev. 4 - Security and Privacy Controls for federal Information Systems and Organizations</source>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>I. I. O. for Standardization)</surname>
          </string-name>
          ,
          <source>ISO</source>
          <volume>19011</volume>
          :
          <fpage>2018</fpage>
          -
          <article-title>Guidelines for auditing management system (</article-title>
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>I. I. O. for Standardization)</surname>
          </string-name>
          ,
          <source>ISO 27000:2018 - Information technology - Security techniques - Information Security Management Systems - Overview and vocabular (</source>
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>I. I. O. for Standardization)</surname>
          </string-name>
          ,
          <source>ISO 27001:2017 Information technology - Security techniques - Information Security Management Systems - Requirements</source>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>I. I. O. for Standardization)</surname>
          </string-name>
          ,
          <source>ISO 27001:2013 Information technology - Security techniques - Information Security Management Systems - Requirements</source>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>I. I. O. for Standardization)</surname>
          </string-name>
          ,
          <source>ISO 27002:2017 Information technology - Security techniques - Code of practice for information security control</source>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>I. I. O. for Standardization)</surname>
          </string-name>
          ,
          <source>ISO 27002:2013 Information technology - Security techniques - Code of practice for information security control</source>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>I. I. O. for Standardization)</surname>
          </string-name>
          ,
          <source>ISO 27005:2018 Information technology - Security techniques - Information security risk management</source>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>I. I. O. for Standardization)</surname>
          </string-name>
          ,
          <source>ISO 31000:2018 Risk management - Guideline</source>
          (
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <source>• ISO/IEC 27001:2017 "Information technology - Security techniques - Information security management systems - Requirements" [22] Review of ISO/IEC 27001:2013 [23] including Cor 1:2014 and Cor</source>
          <volume>2</volume>
          :
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <source>• ISO/IEC 27002:2017 "Information technology - Security techniques - Code of practice for information security controls" [24] Review of ISO/IEC 27002:2013 [25] including Cor 1:2014 and Cor</source>
          <volume>2</volume>
          :
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>