The web Browser you are currently using is unsupported, and some features of this site may not work as intended. Please update to a modern browser such as Chrome, Firefox or Edge to experience all features Michigan.gov has to offer.
Cybersecurity assessments
A cybersecurity assessment is a process that helps organizations identify, evaluate, and mitigate cyber risks to their operations, assets, and personnel. It involves analyzing vulnerabilities, threats, and security measures to enhance overall cybersecurity resilience. Cybersecurity assessments are not mandated by the Safe Drinking Water Act, but they are highly recommended.
Components of a cybersecurity assessment
Identify
- Cybersecurity leadership within the organization
- Operational technology (OT) and information technology (IT) equipment inventory
- Vulnerabilities related to cybersecurity
- Partnerships to enhance cybersecurity resiliency
- Vendors and suppliers that are operating under best practices for cybersecurity
Protect
- Water supply by practicing password hygiene, credential management (unique credentials for each user and revoking credentials for departing employees)
- Water supply by separating user and privileged accounts, network segmentation between operational technology and information technology networks, monitor unsuccessful login attempts on operational technology and IT networks, and incorporating multi-factor authentication
- Water supply by regularly storing backups, creating incident response plans, managing login records, prohibiting connections of unauthorized devices, limiting operational technology connections to public internet, etc.
Detect
- Establish capability of detecting cyber actor tactics, threats, and procedures and documenting the threats
Respond
- Have standard operating procedures in place of how to report and who to contact in the event of a cybersecurity incident
Recover
- Organizations are capable of safely and effectively recovering from a cybersecurity incident