• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
Athens Group Logo

Athens Group Services

Rig Inspection

  • Home
  • Services
    • Reactivation, Commissioning, and Upgrade
    • Marine Services
    • Rig Inspection & Acceptance
    • Well Control Equipment
    • Cybersecurity
      • TMECA®
    • Risk Management
  • About Us
    • About Us
    • Our Mission & Core Business Principles
    • Athens Group Services Advantage
    • Surveyor Competency Assurance
    • Integrated Knowledge Management
    • Covid-19 Policy
    • Workplace
    • CyberSecurity Policy
  • News & Resources
    • Projects
    • Newsletters
    • Oil Field Digitalization
  • Contact
Rig Inspections

CyberSecurity Architecture – 3 of 3: What can you do?

October 16, 2018
LnRiLWZpZWxke21hcmdpbi1ib3R0b206MC43NmVtfS50Yi1maWVsZC0tbGVmdHt0ZXh0LWFsaWduOmxlZnR9LnRiLWZpZWxkLS1jZW50ZXJ7dGV4dC1hbGlnbjpjZW50ZXJ9LnRiLWZpZWxkLS1yaWdodHt0ZXh0LWFsaWduOnJpZ2h0fS50Yi1maWVsZF9fc2t5cGVfcHJldmlld3twYWRkaW5nOjEwcHggMjBweDtib3JkZXItcmFkaXVzOjNweDtjb2xvcjojZmZmO2JhY2tncm91bmQ6IzAwYWZlZTtkaXNwbGF5OmlubGluZS1ibG9ja311bC5nbGlkZV9fc2xpZGVze21hcmdpbjowfQ==
IEBtZWRpYSBvbmx5IHNjcmVlbiBhbmQgKG1heC13aWR0aDogNzgxcHgpIHsgICB9IEBtZWRpYSBvbmx5IHNjcmVlbiBhbmQgKG1heC13aWR0aDogNTk5cHgpIHsgICB9IA==
CyberSecurity Architecture

In our previous blog, we defined CyberSecurity Architecture and addressed blocking and tackling from our September 24, 2018 Athens Group Services Newsletter. That newsletter discussed our afternoon panel at the September 2018 Advanced Rig Technology Conference & Exhibition in Austin, Texas. Our panel presentation was titled: “It’s NOT Rocket Science. It’s Blocking and Tackling.” Although a football reference, it was meant to hit home with the simple fact that cybersecurity’s foundation in any organization depends on how well the basics are executed. Blocking refers to instituting the mitigation processes discussed in the newsletter. Tackling means getting out in front of the threats by implementing a CyberSecurity Architecture. So, what can you do?

Blocking versus Tackling

BlockingTackling
Virtual Private Network (VPN)User Training
FirewallManagement of Change
Demilitarized Zone (DMZ)Patching
 Strong Passwords
 Personal Device Policy
 Tested backup and restore
 Website and Email white listing

Here’s what you need to do for Blocking:

  1. First, define you current as-is network identifying all hardware, software and vendor applications.
  2. Map all users on to all the applications to which they have access.
  3. Define what you want for your CyberSecurity Architecture. Include these three process:
    1. Evaluate using a CyberSecurity Architecture Risk Assessment, the value of vital operational assets, the likelihood of occurrence, and effects the risk to your operations.
    2. Define your optimum CyberSecurity Architecture and Design, ensuring the mitigation of operational risk exposure.
    3. Implement CyberSecurity services and processes. Ensure services are designed to your security policy and standards, cybersecurity architecture decisions, and risk management.
    4. Operate and monitor day-to-day processes, such as threat and vulnerability management and threat management. Here, measures are taken to supervise and handle the operational state in addition to the depth and breadth of the systems security.
  4. Ensure that the current network hardware and software supports your designed Firewall, VPN and DMZ. If they do not then buy new hardware and software.

In parallel with your Blocking efforts, Tackling will address the following vulnerabilities:

TacklingVulnerability Addressed
User TrainingPhishing

 

Employee installed applications

Management of ChangeEmployee installed applications

 

Inadequate firewalls

PatchingUnpatched hardware and software

 

Inadequate firewalls

Strong PasswordsWeak passwords
Personal Device PolicyPersonal devices infected outside of work

 

Employee installed applications

Tested backup and restorePoor to no Backup and Restore
Website and Email white listingSurfing compromised websites

The above Blocking and Tackling will keep the attackers out of your red zone!

What can you do about it?

Read the blog entries on our website – www.athensgroupservices.com, join our LinkedIn Group, and subscribe to our newsletter.

Category: Oil Field DigitalizationTag: Oil Field Digitalization Series
Previous Post:CyberSecurity Architecture – 2 of 3: Why do you care?
Next Post:Internet of Things(IoT) and Industrial Control Systems(ICS)
  • Home
  • Services
    • Reactivation, Commissioning, and Upgrade
    • Marine Services
    • Rig Inspection & Acceptance
    • Well Control Equipment
    • Cybersecurity
      • TMECA®
    • Risk Management
  • About Us
    • About Us
    • Our Mission & Core Business Principles
    • Athens Group Services Advantage
    • Surveyor Competency Assurance
    • Integrated Knowledge Management
    • Covid-19 Policy
    • Workplace
    • CyberSecurity Policy
  • News & Resources
    • Projects
    • Newsletters
    • Oil Field Digitalization
  • Contact

Contact


(858) 926-5504

Contact Us

Follow Us


Follow along on social media

  • Twitter
  • LinkedIn

Copyright © 2025 · Athens Group Services · All Rights Reserved

Return to top