Research Article

Advanced Approach to Information Security Management System Model for Industrial Control System

Table 5

The List of Common Security Controls in South Korea Energy Industry for NIST SP 800-53.

NumberMain domain nameSubdomain nameCode of security controlSecurity control

1 Access controlAccount managementAC-2The organization manages information system accounts, including identifying account types.
2Separation of dutiesAC-5The organization implements separation of duties through assigned information system access authorizations.
3Least privilegeAC-6The organization employs the concept of least privilege, allowing only authorized accesses for users which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions.

4Media protectionMedia accessMP-2The organization restricts access to Assignment: organization-defined types of digital and non-digital media to Assignment: organization-defined list of authorized individuals using Assignment: organization-defined security measures .
5Media markingMP-3.aThe organization marks, in accordance with organizational policies and procedures, removable information system media and information system output indicating the distribution limitations, handling caveats, and applicable security markings (if any) of the information.
6MP-3.bThe organization exempts Assignment: organization-defined list of removable media types from marking as long as the exempted items remain within Assignment: organization-defined controlled areas .
7Media storageMP-4.aThe organization physically controls and securely stores Assignment: organization-defined types of digital and non-digital media within Assignment: organization-defined controlled areas using Assignment: organization-defined security measures .
8MP-4.bThe organization protects information system media until the media are destroyed or sanitized using approved equipment, techniques, and procedures.
9Media transportMP-5.aThe organization protects and controls Assignment: organization-defined types of digital and non-digital media during transport outside of controlled areas using Assignment: organization-defined security measures .
10MP-5.cThe organization restricts the activities associated with transport of such media to authorized personnel.

11Physical and environmental protectionPhysical access authorizationsPE-2The organization develops and keeps a current list of personnel with authorized access to the facility where the information system resides (except for those areas within the facility officially designated as publicly accessible).
12Monitoring physical accessPE-6.aThe organization monitors physical access to the information system to identify and respond to physical security incidents.
13PE-6.bThe organization reviews physical access logs [Assignment: organization-defined frequency].
14Visitor controlPE-7The organization controls physical access to the information system by authenticating visitors before authorizing access to the facility where the information system resides, other than areas designated as publicly accessible.
15Emergency shutoffPE-10The organization provides the capability of shutting off power to the information system, or individual system components, in emergency situations.
16Emergency lightingPE-12The organization employs and maintains automatic emergency lighting for the information system that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility.
17Fire protectionPE-13The organization employs and maintains fire suppression and detection devices/systems for the information system that are supported by an independent energy source.
18Temperature and humidity controlsPE-14The organization maintains temperature and humidity levels within the facility where the information system resides at [Assignment: organization-defined acceptable levels].
19Water damage protectionPE-15The organization protects the information system from damage resulting from water leakage by providing master shutoff valves that are accessible, working properly, and known to key personnel.
20Location of information system ComponentsPE-18The organization positions information system components within the facility to minimize potential damage from physical and environmental hazards and to minimize the opportunity for unauthorized access.

21 System and communications protectionDenial of service protectionSC-5The information system protects against or limits the effects of the following types of denial of service attacks: [Assignment: organization-defined list of types of denial of service attacks or reference to source for current list].
22Boundary protectionSC-7.aThe information system monitors and controls communications at the external boundary of the system and at key internal boundaries within the system.
23SC-7.bThe information system connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture.