The Industrial Cyber
Security Principle Method™

Methodology
There are six foundational principles for delivering a world-class industrial cyber security program.
The Industrial Cyber Security Principle Method™ is an OT security methodology created by SIS Industrial Cyber Security in direct response to the global need for OT-specific cyber security.

It blends established industry frameworks¹,²,³ with real-world experience, refined to better meet the changing nature of OT security threats.

When combined, these six principles are the vital ingredients in the SIS recipe for delivering world-class industrial cyber security programs.
1. Theodore J. Williams (1994) “The Purdue enterprise reference architecture.” Computers in industry Vol 24 (2). p. 141-158.

2. John Sherwood, Andrew Clark & David Lynas (2009) Enterprise Security Architecture Available at: https://sabsa.org/ [August 2024].

3. Michael J. Assante and Robert M. Lee (2015) The Industrial Control System Cyber Kill Chain Available at: https://sansorg.egnyte.com/dl/HHa9fCekmc [August,2024].

The Business-Driven Principle is about aligning your primary business functions with your industrial cyber security. It’s about ensuring what you do every day – your reason for being here – is properly serviced by your OT security requirements.

Typically, the Business-Driven Principle is the first to be executed in The Industrial Cyber Security Principle Method™ because it relies on a deep process of cross-organisation discovery that can be used to inform all other principles. This involves analysing business processes for OT systems, drawing from source data and information gathered from direct interviews with operational OT asset and engineering business managers.

The Risk-Based Principle is about customising your OT security to the specific risks associated with each system or subsystem in your business, rather than applying the same security control coverage across everything.

While organisations may implement point solutions for OT that provide some level of security, this is likely ad hoc. Often, no one in an organisation can confidently say whether the security level is appropriate to the risk, whether the benefit justifies the cost, or whether it meets a broader range of business requirements that aren’t directly related to OT (i.e. informed by The Business-Driven Principle).

The Enterprise-Wide Principle is about taking a whole-of-business perspective, right across every aspect of your organisation, to maximise the investment return and ensure the long-term value of your industrial cyber security.

Decisions made through an enterprise-wide lens ensure the time, effort and attention that goes into properly integrating your industrial cyber security into OT systems pays off in numerous ways. While OT may seem a very specific area of your business, it’s one that can have huge ramifications across all your departments and operations, especially if there’s a breach and/or your OT cyber security has been mismanaged.

The Methodical Principle is about approaching your OT cyber security in a meticulous and systematic manner. This relies on knowing the correct sequence of actions to take for optimal effectiveness of your OT.

Many organisations attempt to comply with multiple methodologies and standards at the risk of everything falling into a ‘muddy’ mess. A lack of refinement in implementation can be a major obstacle to achieving world-class security outcomes.

The OT Security-Focused Principle is about recognising and maintaining the importance of your OT. This means using specialist OT security teams that strictly adhere to industry-specific standards and certification.

Introducing a 100% laser-focused industrial cyber security approach will help keep your organisation at the forefront of the current and developing cyber threat landscape. It’s unlikely you can do it internally. Engaging external OT security specialists to unite with your internal team in adopting industry-specific security standards and certifications is ultimately the way to go.

The OT Security-Compliant Principle is about ensuring your organisation achieves and maintains compliance with the necessary regulatory frameworks governing OT – and then goes even further to give you the very best industrial cyber security.

If you’re OT security-compliant, this means you hit the minimal recognised targets for adequately securing your industrial assets. The process usually involves registering OT assets, reporting cyber incidents affecting essential services and adhering to mandated risk management programs. It’s a no-brainer for meeting your obligations.

How does your organisation measure up in Industrial Cyber Security?

See how
your organisation
stacks up against
the benchmark

Put your organisation to the test with the SIS Industrial Cyber Security Assessment Scorecard.

Tell us a bit about you

Our workshops are tailored, so please check any specific areas of interest you might have.

Tell us a bit about you

Our workshops are tailored, so please check any specific areas of interest you might have.