TY - GEN
T1 - Cyber Informed Engineering Implementation Guide: Version 1.0
T2 - U.S. Department of Energy (DOE), Office of Cybersecurity, Energy Security, and Emergency Response (CESER)
AU - Anderson, Robert
AU - Atkins, Victor
AU - Ayala, Marco
AU - Baker, KatherineAnne
AU - Barnes, Lance
AU - Castillo, Krystel
AU - Chanoski, Samuel
AU - Cox, Joel
AU - Edsall, Robert
AU - Foy, Rob
AU - Gale, Tim
AU - Gellner, Jeff
AU - Graham, Rich
AU - Groves, Daniel
AU - Holtz, Mary
AU - Johnson, Stephanie
AU - Jones, Jeremy
AU - Kishter, Lindsay
AU - Le Blanc, Katya
AU - Loo, Sin
AU - Macwan, Richard
AU - Mahanes, Joseph
AU - Martin, Maurice
AU - McFly, Shane
AU - McJunkin, Timothy
AU - Meng, Jakob
AU - Morris, Matt
AU - Ohrt, Andrew
AU - Pattison, Waylon
AU - Robinson, Jessica
AU - Rucinski, Daniel
AU - Sachs, Marc
AU - Shannon, Greg
AU - Smith, Jeremy
AU - Venkataramanan, Venkatesh
AU - Waligoske, Emily
AU - Welch, Justin
AU - Williams, Gareth
AU - Wilsterman, Zane
AU - Wright, Virginia
PY - 2023
Y1 - 2023
N2 - This Implementation Guide describes the principles of Cyber-Informed Engineering (CIE) and outlines questions that engineering teams should consider during each phase of a system's lifecycle to effectively employ these principles. It describes what it means to engineer systems in a cyber-informed way, rather than offering a comprehensive, step-by-step process or procedure for CIE implementation. This guide complements - but does not replace - the application of cybersecurity standards or practices currently in place within an organization. Engineers and technicians that design critical energy infrastructure installations can use this Implementation Guide to integrate the 12 principles of CIE into each phase of the engineering lifecycle, from concept to retirement. The guide is aimed at system or design engineers, rather than software engineers or operational cybersecurity practitioners. The engineers who design, build, operate, and maintain the physical infrastructure are best positioned to leverage a system's engineering design to diminish the severity of cyber attacks or digital technology failures. CIE expands cybersecurity decisions into the engineering space, not by asking engineers to become cyber experts, but by calling on engineers to apply engineering tools and make engineering decisions that improve cybersecurity outcomes. CIE examines the engineering consequences that a sophisticated cyber attacker could achieve and drives engineering changes that may provide deterministic mitigations to limit or eliminate those consequences.
AB - This Implementation Guide describes the principles of Cyber-Informed Engineering (CIE) and outlines questions that engineering teams should consider during each phase of a system's lifecycle to effectively employ these principles. It describes what it means to engineer systems in a cyber-informed way, rather than offering a comprehensive, step-by-step process or procedure for CIE implementation. This guide complements - but does not replace - the application of cybersecurity standards or practices currently in place within an organization. Engineers and technicians that design critical energy infrastructure installations can use this Implementation Guide to integrate the 12 principles of CIE into each phase of the engineering lifecycle, from concept to retirement. The guide is aimed at system or design engineers, rather than software engineers or operational cybersecurity practitioners. The engineers who design, build, operate, and maintain the physical infrastructure are best positioned to leverage a system's engineering design to diminish the severity of cyber attacks or digital technology failures. CIE expands cybersecurity decisions into the engineering space, not by asking engineers to become cyber experts, but by calling on engineers to apply engineering tools and make engineering decisions that improve cybersecurity outcomes. CIE examines the engineering consequences that a sophisticated cyber attacker could achieve and drives engineering changes that may provide deterministic mitigations to limit or eliminate those consequences.
KW - cyber informed engineering
KW - cyber resilience
KW - cybersecurity
KW - cybersecurity culture
KW - security by design
KW - systems engineering
U2 - 10.2172/2004921
DO - 10.2172/2004921
M3 - Technical Report
ER -