Pop BP Taxonomy
Pop BP Taxonomy
Utilities
Vendor Taxonomy
(Topics and Companies)
Shining a light on Best Practice Cyber and Physical security for U.S. and Canadian
Electric and Natural Gas Utilities – moving to a Culture of Resilience
https://www.protectourpower.com/best-practices/pop-bp-taxonomy.pdf
Purple links are internal to this document; blue links are to external documents or sites.
Introduction:
There are about 1000 companies selling cyber security product to the Utilities in the U.S.
and Canada. That is a daunting number to consider on the buying end of the equation,
and a highly competitive market on the product and services end. Competition is
heightened by high demand and fairly low barriers to entry. The Protect Our Power’s
Best Practices Project is directed at organizing and analyzing these vendors to make it
easier for the Utilities to make good decisions and to pursue Best Practices as defined in
the Project.
The Taxonomy included here is an attempt to define meaningful Topics under the broad
heading of “Cybersecurity.” In general, a Topic relates to a Utility decision area – a
Utility would consider addressing the Topic via analyzing the Vendors that can address
the Topic/Cybersecurity need. From a Vendor standpoint, Topics are homogeneous
within and heterogeneous between (at least that is the intent).
The following is a list of Topics that already have an associated University that is
developing the Work Products associated with this Project with links to the Protect Our
Power Website for the Educational Institutions:
We recognize this Taxonomy is incomplete and welcome all suggestions for updating or
participation in building a more appropriate Taxonomy. Comments and suggestions can
be sent to [email protected]
Go to Additional Resources
Contact
Erick Ford | Project Manager
[email protected]
Links colored purple are internal to this document; links colored blue are to external
resources; links colored red are internal to this document, but are Topics where an
Educational Institution is developing materials to support moving to Best Practices.
1
a computer security technology for removing potentially malicious code from files. Unlike
malware analysis, CDR technology does not determine or detect malware's functionality
but removes all file components that are not approved within the system's definitions and
policies.
2
a cyber-security solution that differs from other endpoint protection platform (EPP) for
instance antivirus and anti-malware, where the major focus isn’t to automatically stop
threats in pre-execution phase on an endpoint. EDR is more focused on providing overall
endpoint visibility with the right insights, which help security analysts to investigate and
respond to a very advanced threat. This category deals with Enterprise IT endpoints, not
ICS/OT endpoints.
3
An Endpoint Protection Platform (EPP) is an integrated security solution designed to detect
and block threats at device level. Typically, this includes antivirus, anti-malware, data
encryption, personal firewalls, intrusion prevention (IPS) and data loss prevention (DLP).
Traditional EPP is inherently preventative, and most of its approaches are signature-based
– identifying threats based on known file signatures for newly discovered threats. The
latest EPP solutions have however evolved to utilize a broader range of detection
techniques.
4
Wikipedia – Host-Based Intrusion Detection Systems - https://en.wikipedia.org/wiki/Host-
based_intrusion_detection_system
5
Wikipedia – Intrusion Detection Systems -
https://en.wikipedia.org/wiki/Intrusion_detection_system
6
Radicati Market Quadrant - https://www.EnergyCollection.us/Companies/Radicati/MQ-
APT-2018.pdf
7
Recommended Practice: Updating Antivirus in an Industrial Control Systems (from DHS
NCCIC) - https://tinyurl.com/ybdcuywo
8
Comparison of Antivirus Software -
https://en.wikipedia.org/wiki/Comparison_of_antivirus_software
9
What is Application Control? Definition, Best Practices & More -
https://digitalguardian.com/blog/what-application-control
10
Application Control vs. Application Whitelisting -
https://www.airlockdigital.com/application-control-vs-application-whitelisting/
11
Gartner MQ for Cloud Access Security Brokers -
https://www.EnergyCollection.us/Companies/Gartner/MQ-CASB-2018.pdf
https://www.EnergyCollection.us/Companies/Gartner/MQ-CASB-2019.pdf
12
Forrester Wave: Cloud-Security-Gateways-2019 -
https://www.EnergyCollection.us/Companies/Forrester/Wave-Cloud-Security-2019.pdf
13
Critical Capabilities for Cloud Access Security Brokers – a 2019 Gartner publication -
https://www.EnergyCollection.us/Companies/Gartner/Critical-Capabilities-Cloud.pdf
14
Assured Compliance Assessment Solution - https://www.disa.mil/cybersecurity/network-
defense/acas
15
Wikipedia article with vendor listing - https://en.wikipedia.org/wiki/Content_Disarm_
%26_Reconstruction
19
Scan the dark web for threat intelligence -
https://www.csoonline.com/article/3245587/scan-the-dark-web-for-threat-
intelligence.html
20
Forrester New Wave™: Digital Risk Protection, Q3 2018 -
https://www.EnergyCollection.us/Energy-Security/Digital-Risk-Protection-01.pdf
21
Endpoint Detection and Response (EDR) platforms are security systems that combine
elements of next-gen antivirus with additional tools to provide real-time anomaly
detection and alerting, forensic analysis and endpoint remediation capabilities. By
recording every file execution and modification, registry change, network connection and
binary execution across an organization’s endpoints, EDR enhances threat visibility
beyond the scope of EPPs.
22
Wikipedia on Endpoint Security - https://en.wikipedia.org/wiki/Endpoint_security
23
IDC MarketScape - https://www.EnergyCollection.us/Companies/IDC/MarketScape-
Endpoint-Protection-2018.pdf
24
Forrester Endpoint Detection and Response 2018 -
https://www.EnergyCollection.us/Companies/Forrester/Wave-Endpoint-Detection-
2018.pdf ToC
25
SANS Survey, Endpoint Protection and Response -
https://www.EnergyCollection.us/Companies/SANS/Endpoint_Detection_Response.pdf
26
Top Endpoint Encryption Technology Vendors -
https://www.EnergyCollection.us/Energy-Security/Top-Endpoint-Encryption-Technology-
Vendors.pdf
27
Forrester Endpoint Security Suites 2018 -
https://www.EnergyCollection.us/Companies/Forrester/Wave-Endpoint-Security-2018.pdf
28
Network Access Control - Wikipedia -
https://en.wikipedia.org/wiki/Network_Access_Control - Network Access Control (NAC) is
an approach to computer security that attempts to unify endpoint security technology
(such as antivirus, host intrusion prevention, and vulnerability assessment), user or
system authentication and network security enforcement.
29
NSS Labs re Advanced Endpoint Protection - https://www.nsslabs.com/aep-test-
overview
30
Dell unveils endpoint security portfolio with CrownStrike, Secureworks -
http://www.energycollection.us/Best-Practices/Endpoint-Detection-And-Response/Dell-
Unveils-Endpoint.pdf
31
Gartner MQ on Endpoint Protection Platforms -
https://energycollection.com/Companies/Gartner/MQ-Endpoint-Protection-Platforms.pdf
32
Topic initially presented at the POP BP Conference 2019-02-04 by Steven Parker,
President, EnergySec -
33
Northeastern University has undertaken an analysis of Vendors for this Topic.
34
Forrester - The Future Of Identity And Access Management -
https://www.EnergyCollection.us/Best-Practices/Identity-Management-and-Governance/
Forrester-Future.pdf
35
Forrester Wave: Identity-As-A-Service (IDaaD) for Enterprise, Q2 2019 -
https://www.okta.com/resources/analyst-research-forrester-wave-leader-identity-as-a-
service/
36
SailPoint - the 2018 Identity Report -
https://www.EnergyCollection.us/Best-Practices/Identity-Management-and-
Governance/SailPoint-Identity-Report-2018.pdf
37
NCCoE on Identity Access Management - https://www.nccoe.nist.gov/projects/use-
cases/idam
38
Forrester Wave - https://www.EnergyCollection.us/Best-Practices/Identity-Management-
and-Governance/Forrester-2018.pdf
39
Gartner – Magic Quadrant for Identity Governance and Administration -
https://www.EnergyCollection.us/Companies/Gartner/MQ-Identity-Access.pdf
40
Gartner – Critical Capabilities for Access Management -
https://www.EnergyCollection.us\Companies\Gartner\Critical-Capabilities-Access-
Management.pdf
41
ICS Cyber Incident Response Plan RP - https://ics-cert.us-cert.gov/Abstract-ICS-Cyber-
Incident-Response-Plan-RP
42
Note: Vendors that have the capability to actively monitor IT Networks, or ICS networks
are potentially able to identify a given device is a rogue that is spoofing an IP Address for
a valid device
43
The Industrial Internet of Things - What's the Difference Between IoT and IIoT?
https://www.leverege.com/blogpost/difference-between-iot-and-iiot
44
A Grim Gap: Cybersecurity of Level 1 Field Devices - https://www.powermag.com/a-
grim-gap-cybersecurity-of-level-1-field-devices/
45
Forrester Wave 2018 - https://www.EnergyCollection.us/Companies/Forrester/Wave-
MSSPs-2018.pdf
46
Gartner MQ on Managed Security Service Providers – 2019 -
https://www.EnergyCollection.us/Companies/Gartner/MQ-MSSP-2019.pdf
47
Host-Based Intrusion Detection System Comparison -
https://en.wikipedia.org/wiki/Host-based_intrusion_detection_system_comparison
48
Mobile Device Security: Cloud and Hybrid Builds -
https://www.nccoe.nist.gov/projects/building-blocks/mobile-device-security/cloud-hybrid
49
Topic initially presented at the POP BP Conference 2019-02-04 by Dale Peterson,
Creator and Program Chair of S4 Events; Leader in ICS Security Research; Industry
Evangelist -
50
Securing Manufacturing Industrial Control Systems: Behavioral Anomaly Detection -
https://www.EnergyCollection.us/Companies/NIST/NISTIR-8219.pdf
51
NCCOE on Asset Management - https://www.nccoe.nist.gov/projects/use-cases/energy-
sector/asset-management
52
NIST Cybersecurity Practice Guide, Special Publication 1800-7: “Situational Awareness
for Electric Utilities" - https://www.nccoe.nist.gov/projects/use-cases/situational-
awareness
53
See NISTR 8219 – Securing Manufacturing Industrial Control Systems: Behavioral-
Anomaly Detection - https://www.nccoe.nist.gov/sites/default/files/library/mf-ics-nistir-
8219.pdf
54
See list of vendors at
https://en.wikipedia.org/wiki/Network_behavior_anomaly_detection#Commercial_produc
ts
55
The University of North Carolina Charlotte has undertaken an analysis of Vendors for this
Topic.
56
See list of vendors at
https://en.wikipedia.org/wiki/Network_behavior_anomaly_detection#Commercial_produc
ts
57
Gartner Magic Quadrant for Network Performance Monitoring and Diagnostics -
https://www.gartner.com/doc/reprints?id=1-6876F3Z&ct=190214&st=sb
58
Frost & Sullivan - Network Access Control (NAC) Market, Global, Forecast to 2022 -
https://www.EnergyCollection.us/Energy-Information-Technology/NAC-Market-2022.pdf
59
Network Access Control Tutorial - https://www.networkcomputing.com/careers/tutorial-
network-access-control-nac/880346581/page/0/8
60
Wikipedia - https://en.wikipedia.org/wiki/Network_Access_Control
61
Gartner PeerInsights - https://www.gartner.com/reviews/market/network-access-
control/vendors
62
Topic initially presented at the POP BP Conference 2019-02-04 by Art Conklin, Director,
Center for Information Security Research and Education, University of Houston -
63
Firewall Deployment on ICS Networks RP - https://ics-cert.us-cert.gov/Abstract-Firewall-
Deployment-ICS-Networks-RP
64
Topic initially presented at the POP BP Conference 2019-02-04 by Monta Elkins – SANS
Instructor, ICS Researcher, author of "Defense against the Dark Arts” - Video/Audio -
https://vimeo.com/329632669/c25a1d9a61 Presentation -
https://protectourpower.org/best-practices/monta-elkins-presentation.pdf
65
Patching Like a Boss (from ReliabilityFirst) -
https://www.EnergyCollection.us/Companies/Reliability-First/Newsletter-2018-11-01.pdf
70
Topic initially presented at the POP BP Conference 2019-02-04 by Jason Christopher,
SANs Instructor, formerly Senior technical Leader Cyber Security, EPRI; Technical Lead
Cyber Security, DOE’ Technical Lead, FERC. -
71
Forrester New Wave™: Cybersecurity Risk Rating Solutions, Q4 2018 -
https://www.EnergyCollection.us/Companies/Forrester/Risk-Rating-Solutions-2018.pdf
72
Forrester Wave – Vulnerability Risk Assessment Q4 2019 –
https://www.EnergyCollection.us/Companies/Forrester/Wave-Vulnerability-Risk-
Management-Q4-2019.pdf
73
Wikipedia - https://en.wikipedia.org/wiki/Cyber_risk_quantification
74
What Is Cyber Risk Quantification? - https://www.risklens.com/blog/what-is-cyber-risk-
quantification
75
A review of cyber security risk assessment methods for SCADA systems -
https://www.sciencedirect.com/science/article/pii/S0167404815001388
76
NATF CIP-013-1 Implementation Guidance -
https://www.EnergyCollection.us/Companies/NATF/CIP-13-1-Implementation-
Guidance.pdf
77
Midwest Reliability Organization - MRO - 2018-09-01 Newsletter - The Benefits of Risk-
Based Regulation - https://www.EnergyCollection.us/Companies/MRO/Newsletter-2018-
09-01.pdf
78
Forrester Wave - https://www.EnergyCollection.us/Best-Practices/Vulnerability-Risk-
Management/Forrester-2018.pdf
79
Wikipedia – Application Virtualization -
https://en.wikipedia.org/wiki/Application_virtualization
80
Magic Quadrant for IT Vendor Risk Management Tools – June 2017
https://www.energycollection.us/Companies/Gartner/MQ-IT-Vendor-Risk-
Management.pdf /// Nov 2019 -
https://www.energycollection.us/Companies/Gartner/MQ-IT-Vendor-Risk-
Management2.pdf
81
Forrester Wave - https://www.EnergyCollection.us/Best-Practices/Security-Analytics-
Platforms/Forrester-2018.pdf
82
Gartner Magic Quadrant for Security Information and Event Management -
https://www.EnergyCollection.us/Energy-Security/MQ-SIEM-2017.pdf //
https://www.EnergyCollection.us/Companies/Gartner/MQ-SIEM-2018.pdf
83
G2 Crowd report for SIEM 2019 - https://twi.li/G2-SIEM-2019
84
See Grid Report for SEIM Spring 2019 - https://learn.alienvault.com/c/siem-grid-report?
85
Gartner 2017-11-01 - https://www.EnergyCollection.us/Best-Practices/Security-
Orchestration-Automation-Response-SOAR/Gartner-Reprint-2017-11-01.pdf
86
Gartner – Fighting Phishing -
87
Magic Quadrant for Security Awareness Computer-Based Training -
https://www.energycollection.us/Companies/Gartner/MQ-Security-Awareness-2019.pdf
88
NISTRI 8011 - Volume 3 - Automation Support for Security Control Assessments -
https://www.EnergyCollection.us/Companies/NIST/NISTIR-8011-Volume3.pdf
89
New PCI Software Security Standards - https://blog.pcisecuritystandards.org/just-
published-new-pci-software-security-standards
90
Topic initially presented at the POP BP Conference 2019-02-04 by Andy Bochman,
Senior Cyber & Energy Security Strategist, Idaho National Labs. -
91
Managing Cyber Supply Chain Risk-Best Practices for Small Entities -
https://tinyurl.com/yb63gjqa
92
NATF CIP-013-1 Implementation Guidance -
https://www.EnergyCollection.us/Companies/NATF/CIP-13-1-Implementation-
Guidance.pdf
93
Supply Chain Risk Management (from ReliabilityFirst) -
https://www.EnergyCollection.us/Companies/Reliability-First/Newsletter-2018-11-01.pdf
94
NEMA Supply Chain Best Practices - https://www.nema.org/Standards/Pages/Supply-
Chain-Best-Practices.aspx
95
Software Supply Chain – see New PCI Software Security Standards -
https://blog.pcisecuritystandards.org/just-published-new-pci-software-security-standards
96
See also - Software Development / Inspection
99
Gartner Magic Quadrant for WAN Edge Infrastructure -
https://www.EnergyCollection.us/Energy-Security/WAN-Edge-Infrastructure.pdf
100
Wikipedia - Web application firewall
-https://en.wikipedia.org/wiki/Web_application_firewall
101
Forrester Wave – Zero Trust 2018 -
https://www.EnergyCollection.us/Companies/Forrester/Wave-Zero-Trust.pdf
Top
102
Forrester Wave – Zero Trust 2019 -
https://www.energycollection.us/Companies/Forrester/Wave-Zero-Trust2.pdf
103
Gartner – Market Guide – Zero Trust Network Access -
https://EnergyCollection.us/Companies/Gartner/MG-Zero-Trust-Network-Access.pdf
Top
1. Ir.deto - https://irdeto.com/video-entertainment/cyber-services/
2. KeySight Technologies - https://www.keysight.com/us/en/industries.html
3. Peregrine - http://www.gbpts.com/#about
Top
1. Continue to develop the Taxonomy with the North American Electric Utilities as
the prime focus.
2. Publish as updated and without charge to anyone.
3. Be open to changed submitted by Vendors.
4. Include an Advisory Board that has final say in any disputed updates/changes to
the Taxonomy. The Advisory Board will be an even number of individuals with
50% being named by Protect Our Power and 50% by the Taxonomy owner.
5. Continue to develop a Mind Map putting the different Topics in logical order for
easier consumption.
Otherwise, the new owner may utilize the Taxonomy for its own purposes including
branding, marketing, etc.
Presently the Taxonomy is managed by Protect Our Power using an Advisory Board
found at this link: https://protectourpower.org/bestpractices/taxonomy-advisory-board
Top