WIP: potential Top 10 Items
Note
This page will be removed in the final version
List provided by Simon
We're currently collecting potential candiates within the repo.
- Unknown assets
- Missing/insufficient Vulnerability management
- Insufficient/missing network separation
- Lax access controls (account /user based) - least privilege
- Intentional misconfiguration for ease of use (e.g. leaving rtu’s in upload mode)
- Missing configuration backups for OT-Devices
- Legacy devices
- Unmanaged external access (from above purdue model level 3 / IEC62443 zones/conduits )
- Alert fatigue with “dirty” environment
- Undefined processes for alert reporting/handling
List provided by christopher
- Lack of authentication
- use of insecure 3rd party items - HW / SW assets with critical vulnerabilities
- available JTAG/SWD interface left enabled on production devices
- lack of encryption / minimal encryption
- lack of hardening peripheral devices in the system, exposing devices to possible vulnerabilities
- broadly: trying to wiggle out of security features via deflection to obscurity
- weak built-in security features like basic Bluetooth
- lack of encryption for mobile apps, log files and PHI/PII
- not protecting the BIOS/boot order
BSI: ICS Top 10 threats and countermeasures 2022
- Infiltration of malware via remote media and mobile systems
- infection with malware via internet and intranet
- human error and sabotage
- compromise of extranet and cloud components
- social engineering and phishing
- (D)DoS attacks
- internet-connected control components
- intrusion via remote maintenance access
- technical failure and force majeure
- sof- and hardware vulnerabilities in the supply chain
Similar Lists
sync and/or create mapping
ENISA Threat Landscapes
- Power / energy sector: https://www.enisa.europa.eu/publications/power-sector-dependency?v2=1
- Transport sector: https://www.enisa.europa.eu/publications/enisa-transport-threat-landscape?v2=1
- Health sector: https://www.enisa.europa.eu/publications/cyber-security-and-resilience-for-smart-hospitals?v2=1
- General (Figure 8 shows which OT-domain got how much attention from threat actors this year): https://www.enisa.europa.eu/publications/enisa-threat-landscape-2024