The updated Security Vision CII product ensures the implementation of legislative requirements in terms of critical information infrastructure in automatic mode.
Security Vision CII automates the following processes:
- Formation of an up-to-date list of CII objects and critical processes
- Categorisation of CII objects for the purpose of determining the category of significance
- Information security threat modelling to identify relevant threats to the CII subject matter
- Assessment of Compliance of IIP Objects with Information Security Requirements
- Handling regulator requests and related tasks.
Security Vision KII can be used both in small and medium-sized businesses and in large enterprises with a geographically distributed structure. For the latter, it is possible to separate powers and areas of responsibility (e.g., isolation of each of the branches or controlled enterprises).
Categorisation of CII facilities
The process of categorising CII objects with the help of Security Vision CII starts with the identification of the organisation's critical processes, which, if violated, may lead to negative consequences. The product generates a list of critical processes and identifies critical information infrastructure objects that automate these processes.
The indicators of the significance criteria and their values for determining the significance category are assessed, and all necessary information on the CII object is filled in. All information on related assets is filled in automatically from the asset model.
As a result of the categorisation process, documents are generated that fully comply with the requirements of the FSTEC of Russia:
- Information on the results of assigning a category of significance to an CII object or on the absence of the need to assign it one of such categories
- The act of categorisation of an ICI facility.
Information security threat modelling
The threat modelling process for CII facilities takes into account all objects of influence and their components, with the ability to flexibly shape the modelling domain.
Threat modelling includes:
- Determining the negative consequences in the form of damage to the organisation in the event of a computer incident that could disrupt or stop the execution of a critical process
- Identification of potential intruders (threat sources)
- Adding threat groups automatically or manually
- Adding ways to implement threats automatically or manually
- Add threats automatically or manually.
Threat modelling is carried out in accordance with the methodological document of the FSTEC of Russia - "Methodology for Assessing Threats to Information Security". The result of the modelling is a list of actual threats in relation to the impact objects and their components, which, in turn, are part of the CII object.
Assessment of Compliance of IIP Objects with Information Security Requirements
The conformity assessment process is carried out with respect to CII objects to assess the requirements and security measures implemented in accordance with FSTEC Orders No. 235 and No. 239.The assessment is carried out by filling in information on the current state of the CII object with the possibility to delegate (fully or partially) the questionnaires to the relevant experts.
A list of unrealised and incompletely realised requirements is generated with the possibility of creating tasks to eliminate nonconformities.
Requests from regulators
Security Vision CII processes requests from the following regulators:
- Bank of Russia
- FSTEC of Russia
- Russian Federal Security Service.
The request received from the regulator is entered into the system. If necessary, a task is formed for a certain executor with a deadline for fulfilment, as well as the ability to control the execution. Two-way integration with the main external ITSM systems with the ability to create requests and track their statuses is realised.
Reports and dashboards
Security Vision KII has deeply elaborated the main reports on KII processes both for submission to the FSTEC of Russia and for internal use.
Dashboards highlight the CII objects that need to be categorised and threat modelled in the near future, helping to track current threats and intruders on an ongoing basis. An interactive map displays statistics on all controlled organisations and branches distributed across the country.