Section 12 Cybersecurity
Section 12 Cybersecurity
Cybersecurity
Version 2.0
Security Directives
for Industrial Facilities
2017
RESTRICTED
All Rights reserved to HCIS. Copying or distribution prohibited without written permission from HCIS
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security
Secretariat General
SEC-12 Cybersecurity
Version 2.0
Page 2 of 16
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security
Secretariat General
SEC-12 Cybersecurity
Version History
This Security Directive supersedes all previous Security Directives issued by the High
Commission for Industrial Security (HCIS), Ministry of Interior.
Version 2.0
Page 3 of 16
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security
Secretariat General
SEC-12 Cybersecurity
Version 2.0
Page 4 of 16
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security
Secretariat General
SEC-12 Cybersecurity
Table of Contents
1 PURPOSE.................................................................................................................................................7
2 SCOPE .....................................................................................................................................................7
3 ACRONYMS & DEFINITIONS.....................................................................................................................7
4 REFERENCES ............................................................................................................................................7
5 GENERAL REQUIREMENTS .......................................................................................................................8
5.1. CYBERSECURITY MANAGEM ENT .................................................................................................................. 8
5.2. RISK ASSESSMENT & MANAGEMENT ............................................................................................................ 8
5.3. CYBER SECURITY TRAINING & AWARENESS .................................................................................................... 9
5.4. NETWORK SECURITY BOUNDARIES, EXTERNAL CONNECTIONS & REMOTE ACCESS ................................................. 9
5.5. ACCESS & SYSTEM SECURITY MANAGEMENT ............................................................................................... 10
5.6. CYBERSECURITY INCIDENT RESPONSE ..........................................................................................................
................................ 12
5.7. BACKUP & RECOVERY..............................................................................................................................
................................................................
................................ 13
5.8. CONFIGURATION CHANGE MANAGEMENT ................................................................
...................................................................................................
................................ 13
5.9. DATA PROTECTION PROGRAM ..................................................................................................................
................................ 13
5.10. MEDIA DISPOSAL & SANITIZATION ................................................................
.............................................................................................................
................................ 13
5.11. PHYSICAL PROTECTION OF IA&CS ASSETS ................................
................................................................................................... 13
6 APPLICATION OF REQUIREMENTS .........................................................................................................14
................................................................
................................
7 PROOF OF COMPLIANCE........................................................................................................................14
................................................................
................................
Version 2.0
Page 5 of 16
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security
Secretariat General
SEC-12 Cybersecurity
Version 2.0
Page 6 of 16
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security
Secretariat General
SEC-12 Cybersecurity
1 Purpose
This document specifies the minimum cybersecurity requirements for security systems
and Industrial Automation & Control Systems (IA&CS), including their communication and
networking infrastructure, deployed at industrial facilities and interconnected remote
facilities.
2 Scope
This directive provides the minimum requirements for companies and establishments to
maintain the cyber security of deployed security systems and IA&CS.
4 References
This directive utilizes the latest edition of the references listed below.
Version 2.0
Page 7 of 16
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security
Secretariat General
SEC-12 Cybersecurity
5 General Requirements
The following requirements contain the mandatory procedural and technical methods the
FO shall implement in order to protect the cybersecurity of security systems and IA&CS
Assets.
FO shall set clear and measurable policy and procedures to protect security systems
and IA&CS Assets through the implementation of Cybersecurity Management (CSM).
The CSM shall be designed to protect security systems & IA&CS assets from all
threats, whether internal
nternal or external, deliberate or accidental.
The CSM shall be reviewed, and updated where needed, every 12 calendar months
or immediately following recovery from a cybersecurity incident
incident. Changes to the
CSM shall be reviewed by facility executive manage
management who shall certify its
compliance with facility cybersecurity requirements.
The CSM shall formally assign accountability and responsibility for cybersecurity to
a designated organization.
CSM shall cover all items in this document. Changes to the CSM shall be summarized
and sent to HCIS.
5.2.1. The FO shall conduct and document a cyber-risk assessment that includes
identification of critical IA&CS assets.
5.2.2. The FO shall address all identified risks with the appropriate treatment.
Penetration testing shall be utilized as part of the risk identification process.
Version 2.0
Page 8 of 16
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security
Secretariat General
SEC-12 Cybersecurity
5.2.5. The results of the cyber-risk assessment shall be summarized and sent to
HCIS whenever the assessment is changed and shall be validated by an
external audit conducted every 12 months.
The FO shall provide cyber security training & awareness for personnel with access
The FO shall ensure that personnel acknowledgment of security policies are formally
documented for initial access authorization and renewed in each 24 month period
or after major security policy changes.
Network design and layout constraints for security systems are defined in SEC
SEC-08.
The Network Security Boundary shall segregate IA IA&CS assets from external
network connections (i.e., Business/Enterprise, third parties, the Internet,
etc.) by implementing and identifying one or access control point that
restricts the flow of network traffic between the Network Security Boundary
and external network connections.
At a minimum, these access control points shall limit inbound and outbound
network traffic to only required logical protocols, ports and services with
other traffic denied by default.
Version 2.0
Page 9 of 16
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security
Secretariat General
SEC-12 Cybersecurity
Version 2.0
Page 10 of 16
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security
Secretariat General
SEC-12 Cybersecurity
5.5.3. Passwords
Where password authentication for access to security systems and IA&CS is
in use, the FO shall enforce, either through technical or procedural methods,
the following password parameters:
Version 2.0
Page 11 of 16
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security
Secretariat General
SEC-12 Cybersecurity
Subject to IA&CS Asset capabilities and vendor support, the FO shall install
the most recent security patches for IA&CS Asset and security system
operating systems, firmware and software applications.
Email services shall block any attachment that has macros or scripts.
The FO shall ensure that any discrepancies are resolved and/or reported.
The FO shall document and implement one or more Cybersecurity Incident response
plan(s) in accordance with industry standards, such as, but not limited to, NIST SP
800-34, and FO contingency plans.
Version 2.0
Page 12 of 16
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security
Secretariat General
SEC-12 Cybersecurity
This plan shall be tested every 12 months. The results of the annual test shall be
summarized and sent to HCIS.
Back-up copies of data and software shall be taken and tested regularly in
accordance with the company backup policy. Backups shall be encrypted and stored
in a secured physically separate location.
All software and hardware changes to security systems and IA&CS assets shall be
documented and managed through a change management process. Significant
changes shall be tested to ensure they do not compromise IA&CS
I security controls.
The FO shall ensure that its Data Protection Program clearly assigns ownership and
the responsibility, along with classification and protection of all applicable
information regarding IA&CS and security systems
systems.
FO shall refer to related guidelines such as NIST SP 800-88 regarding media disposal
and sanitization.
While this directive generally addresses the online access to IA&CS assets, the FO is
also responsible for securing the physical asset as well. IA&CS assets shall be
installed in secured areas or cabinets that limit access to the devices.
Version 2.0
Page 13 of 16
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security
Secretariat General
SEC-12 Cybersecurity
6 Application of Requirements
This section lists how the requirements of this security directive apply to facilities
based on their FSC.
7 Proof of Compliance
FO shall provide HCIS with a Proof of Compliance (PoC), as part of the Stage 3
workflow, to explain and demonstrate how the FO is complying with specific
requirements in this directive. This will augment the Stage 3 submission which covers
all items. The Stage 3 submission, content and format are specified in SEC
SEC-14 section
6.3.
This PoC shall be submitted when available but prior to project commissioning.
This PoC shall provide details for each of the requirements listed below.
In all cases the responses shall be specific in nature and include adequate technical
details to demonstrate compliance to HCIS:
SEC-12
Requirement FO Response
Reference
1. 5.0 General Requirements FO shall provide relevant documents to validate
compliance with section 5.
Documents shall summarize each aspect of compliance
with section 5.
Version 2.0
Page 14 of 16
Kingdom of Saudi Arabia
Ministry of Interior
High Commission for Industrial Security
Secretariat General
SEC-12 Cybersecurity
Version 2.0
Page 15 of 16
Ministry of Interior
High Commission for Industrial Security
Riyadh
Kingdom of Saudi Arabia