Operational Information Confidentiality

From attackics
Revision as of 15:28, 25 September 2020 by Jsteele (talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
Operational Information Confidentiality
Mitigation
ID M0809
IEC 62443-3-3:2013 SR 4.1
IEC 62443-4-2:2019 CR 4.1

Description

Deploy mechanisms to protect the confidentiality of information related to operational processes, facility locations, device configurations, programs, or databases that may have information that can be used to infer organizational trade-secrets, recipes, and other intellectual property (IP).


Techniques Addressed by Mitigation

NameUse
Theft of Operational InformationExample mitigations could include minimizing its distribution/storage or obfuscating the information (e.g., facility coverterms, codenames). In many cases this information may be necessary to support critical engineering, maintenance, or operational functions, therefore, it may not be feasible to implement.