Industrial Internet Security Framework v 1.0 | Page 138

Security Framework Annex C: Security Capabilities and Techniques Tables optimal. For this reason, the organization should have a target security profile with desired MIL ratings for each domain to meet its business objectives and security strategy. Comparing the target security profile with the assessment guides investment priorities for improving system security posture. To reach the desired maturity level as defined by the target security profile, perform a costbenefit analysis of the gaps and identify the activities to address them. In the process, objective criteria should be used, such as how gaps affect organizational objectives, how important the business objectives supported by the domain are, and what costs are associated with implementing the required practices. Based on this analysis, plans to address the gaps should be developed, implemented and tracked to ensure progress. It is required to cycle through evaluation, gap analysis, prioritization, planning and implementation as the business, technology, market, risks and threat environment change. B.2.1 ASSESSMENT PROCESS REQUIREMENTS An organization’s assessment procedures should be properly documented, with materials available for the training of new members. The process should include a presentation to the parties involved that outlines expectations, rationale and expected outcomes. The scoring activity is solely as an attempt at quantification for the purposes of process improvement. Participants must understand that an assessment is not a corporate audit, and that no penalties apply for non-compliance. Full cooperation and truthful exchange of information is necessary for accurate measurement, and anecdotal information about activities should be supported with documented evidence of repeatable procedures. B.2.2 ASSESSMENT ARTIFACT REQUIREMENTS Artifacts used as evidence to support stated activities should be classified and handled accordingly. The assessment generates observations and action plans that must also be managed appropriately. The quantitative portions of an assessment should be recorded and tracked over time to indicate and analyze trends. Assessments should be scheduled regularly, with slightly greater frequency at the beginning of a program rollout. This high-level process helps organizations ensure they methodically capture and prioritize required security activities within the constraints set by business strategy, risks and availability of resources. IIC:PUB:G4:V1.0:PB:20160926 - 138 -