Friday, September 29, 2006

RFC :: NIST :: SCADA & BGP

September 26, 2006: Draft Special Publication 800-82, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security
 
Adobe PDF (2273 KB)
Zip File (1726 KB)
 
NIST announces the release of draft SP 800-82, Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems Security. SP 800-82 provides guidance for establishing secure industrial control systems (ICS), including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other smaller control system configurations such as skid-mounted Programmable Logic Controllers (PLC). ICSs are typically used in industries such as electric, water, oil and gas, transportation, chemical, pharmaceutical, pulp and paper, food and beverage, and discrete manufacturing (automotive, aerospace, and durable goods). The document provides an overview of ICSs and typical system topologies, identifies typical threats and vulnerabilities to these systems, and provides recommended security countermeasures to mitigate the associated risks. NIST requests comments on SP 800-82 by December 22, 2006. Please submit comments to 800-82comments@nist.gov with "Comments SP800-82" in the subject line.

September 26, 2006: Draft Special Publication 800-54, Border Gateway Protocol Security
 
Adobe PDF (1133 KB)
Zip File (640 KB)
 
NIST announces the release of draft SP 800-54, Border Gateway Protocol Security. This document introduces the Border Gateway Protocol (BGP), explains its importance to the Internet, and provides a set of best practices that can help in protecting BGP. Best practices described here are intended to be implementable on nearly all currently available BGP routers without requiring installation of new protocols. To improve the security of BGP routers, a series of recommendations are made. NIST requests public comments on SP 800-54 by November 30, 2006. Please submit comments to sp800-54comments@nist.gov with "Comments SP800-54" in the subject line

For more information see Cybertelecom :: Security :: Protection www.cybertelecom.org/security/protection.htm
Post a Comment