Europe

Europe ICS Standards

European Union Agency for Network and Information Security (ENISA)
Communication network dependencies for ICS/SCADA systems

Published: December 2016

 Unidirectional technology is mentioned multiple times in the context of technology that provides security for insecure protocols, and as a recommended practice in SCADA security to reinforce security system. Read more.

 Single European Sky SESAR Joint Undertaking
Addressing Airport Cyber Security

Published: November 2016

Appropriately, the guide recognizes the current legacy systems and services, unauthenticated data sources and industrial control systems found in most global airports as insecure foundation of airport operations centers. To protect against the ensuing vulnerabilities which come from the aforementioned problems, unidirectional technology is listed as key technical control. Read more.

Agence nationale de la sécurité des systèmes d’information (ANSSI)
Cas pratique d’un tunnel routier   (Use case for a throughway tunnel)

Published: September 2016

 The ANSSI approach to cyber-security for control systems focuses very much on preventing intrusion. Read more.

Department for Transport (DfT)
Rail Cyber Security Guidance to Industry

Published: February 2016

 Rail systems are becoming more vulnerable to cyber attack due to the integration of open-platform systems, equipment using COTS components and increased prevalence of control and automation systems that can be accessed remotely via public and private networks. Read more.

Chatham House – Royal Institute of International Affairs (RIIA)
Cyber Security at Civil Nuclear Facilities – Understanding the Risks

Published: December 2015

 This report focuses on cyber attacks that seek to take over nuclear industrial control systems acting either inside or outside of the facilities where these systems are located. Read more.

Swedish Civil Contingencies Agency (MSB)
Guide to Increased Security in Industrial Information and Control Systems

Published: July 2014

 Data traffic zone boundaries should be handled with additional restriction and should also be monitored and logged. For certain types of IT environments, it may be useful to use unidirectional technology. Read more.