User Guide

User Manual:

Open the PDF directly: View PDF PDF.
Page Count: 208

DownloadUser Guide
Open PDF In BrowserView PDF
USER MANUAL

The Cyber Security Evaluation Tool (CSET®), Version 9.0.
User Manual
October 2018
This product was developed by the United States Department of Homeland Security (DHS).

CSET User Manual

2

Table of Contents
Introduction to CSET ............................................................................................................................................. 5
Introduction ...................................................................................................................................................... 6
Overview ............................................................................................................................................................. 8
Disclaimer ........................................................................................................................................................ 13
System Basics ........................................................................................................................................................ 14
System Requirements................................................................................................................................. 14
Installation Procedure ................................................................................................................................ 15
Stand-alone Install ............................................................................................................................... 15
Using the Stand-alone................................................................................................................ 23
Enterprise Install ................................................................................................................................... 25
Evaluation Preparation ............................................................................................................................... 29
Register a User Account ............................................................................................................................ 31
Import/Export a CSET Assessment ........................................................................................................ 34
Importing a .csetw File ....................................................................................................................... 34
Importing a .cset File .......................................................................................................................... 35
Exporting a CSET Assessment ......................................................................................................... 36
Custom Questionnaires ............................................................................................................................. 37
Using the Import New Module ....................................................................................................... 37
Title Bar .................................................................................................................................................................... 41
Tools Menu ..................................................................................................................................................... 43
Assessment Documents .................................................................................................................... 45
Parameter Editor ................................................................................................................................... 46
Protected Features ............................................................................................................................... 49
Export to Excel ....................................................................................................................................... 51
Resource Library ........................................................................................................................................... 52
Search Screen ........................................................................................................................................ 53
Browse Screen ....................................................................................................................................... 56
User Profile ..................................................................................................................................................... 60
User Profile.............................................................................................................................................. 62
Change Password ................................................................................................................................. 63
Help Menu ...................................................................................................................................................... 64
Accessibility Document ...................................................................................................................... 66
Keyboard Shortcuts ............................................................................................................................. 67
Terms of Use .......................................................................................................................................... 68
About CSET ............................................................................................................................................. 69
Advisory ................................................................................................................................................... 71
Operation Menus ................................................................................................................................................. 72
Preparation Menu ........................................................................................................................................ 72

CSET User Manual

3

Questions Menu ........................................................................................................................................... 74
Results Menu ................................................................................................................................................. 76
Main CSET Window Sections .......................................................................................................................... 78
Prepare Section ............................................................................................................................................. 78
CSET Landing Page .............................................................................................................................. 78
Assessment Details .............................................................................................................................. 79
Contacts Management....................................................................................................................... 81
Sector and Demographic Information Screen .......................................................................... 85
Security Assurance Level (SAL) Selection ................................................................................... 87
Standard SAL Selection .............................................................................................................. 87
General SAL Selection ................................................................................................................. 90
General SAL – Injury............................................................................................................. 93
General SAL - Hospital........................................................................................................ 94
General SAL - Death ............................................................................................................ 95
General SAL - Capital Assets ............................................................................................ 96
General SAL - Economic Impact ..................................................................................... 97
General SAL - Environmental Cleanup ......................................................................... 98
General SAL Considerations ............................................................................................. 99
FIPS 199 SAL Selection ............................................................................................................. 104
Cybersecurity Standard Selection ................................................................................................ 110
CSET Standards and Groupings ............................................................................................ 113
C2M2 Maturity Indicator Levels............................................................................................ 123
CFATS Tiers ................................................................................................................................... 124
Cybersecurity Framework Description ....................................................................................... 125
Framework Implementation Tiers ........................................................................................ 131
Mode Selection ................................................................................................................................... 133
Assessment Modes .................................................................................................................... 134
Assessment Section................................................................................................................................... 137
Assessment Screen ............................................................................................................................ 137
Assessment Modes .................................................................................................................... 140
Assessment Screen Questions Mode ......................................................................... 141
Assessment Screen Requirements Mode.................................................................. 142
Assessment Categories ............................................................................................................ 143
Question Details, Resources, and Comments ................................................................. 145
Details Section Question Mode .................................................................................... 148
Details Section Requirements Mode................................................................... 150
Supplemental Section ....................................................................................................... 151
Comments Section ............................................................................................................. 152
Documents Section ............................................................................................................ 154
Questions List ............................................................................................................... 156

CSET User Manual

4

References Section ............................................................................................................. 157
Discoveries Section ............................................................................................................ 158
Question Discoveries ................................................................................................. 159
Question Filter...................................................................................................................... 162
Results Section ............................................................................................................................................ 164
Analysis Screen.................................................................................................................................... 164
Dashboard in Questions/Requirements Mode............................................................... 167
Ranked Questions ...................................................................................................................... 169
Overall Ranked Categories ..................................................................................................... 172
Standards Analysis ..................................................................................................................... 174
Standards Summary........................................................................................................... 174
Standards Ranked Categories ....................................................................................... 174
Standards Results By Category Single Standard .................................................... 177
Standards Results by Category Multiple Standards...................................... 178
Category Rankings ..................................................................................................................... 179
Reports Section ................................................................................................................................... 182
Executive Summary, Overview, and Comments Screen .............................................. 182
Report Builder .............................................................................................................................. 183
Executive Summary Report..................................................................................................... 185
Site Summary Report ................................................................................................................ 187
Site Detail Report ....................................................................................................................... 190
Site Cyber Security Plan ........................................................................................................... 191
Discoveries Tear Out Sheets .................................................................................................. 193
Initiation Scenarios ............................................................................................................................................ 194
Glossary ................................................................................................................................................................. 199
Frequently Asked Questions (FAQs) .......................................................................................................... 205
CSET Revision History ...................................................................................................................................... 207

CSET User Manual

5

Introduction to CSET
This section will help the user better understand the Cyber Security Evaluation Tool (CSET®), its
background, and purposes.

CSET User Manual

6

Introduction
The Cyber Security Evaluation Tool (CSET®) provides the following:
1. A framework for analyzing cybersecurity vulnerabilities associated with an
organization’s overall industrial control system (ICS) and information technology (IT)
architecture;
2. A consistent and technically sound methodology to identify, analyze, and
communicate to security professionals the various vulnerabilities and consequences that
may be exploited by cyber means;
3. The means for the user to document a process for identifying cybersecurity
vulnerabilities; and
4. Suggested methods to evaluate options for improvement based on existing Standards
and recommended practices.

Background
The Department of Homeland Security (DHS) developed CSET for asset owners with the
primary objective of reducing the risk to the nation’s critical infrastructure. Control systems are
defined as electronic devices that control physical processes and as such, are a crucial element
in the protection of our nation’s infrastructure.
CSET is a web-based tool that guides users through a step-by-step process to collect
facility-specific information addressing topics such as hardware, software, administrative
policies, and user obligations. It then compares that information to relevant security Standards
and regulations, assesses overall compliance, and provides appropriate recommendations for
improving cybersecurity posture. The tool pulls its recommendations from a collection of the
best available cybersecurity Standards, guidelines, and practices. Where appropriate,
recommendations are linked to a set of actions that can be applied to enhance cybersecurity
controls.

Objectives and Benefits
The primary objective of CSET is to reduce the risk of cyber attacks by identifying potential
cybersecurity vulnerabilities within a system or an organization. CSET implements a simple,
transparent process that can be used effectively by all sectors to perform an evaluation of any
network. It offers the following benefits:
• Provides a repeatable and systematic approach for assessing the cybersecurity
posture of a system, network, site, or facility.
• Provides a comprehensive evaluation and comparison to existing industry Standards
and regulations.
• Combines the ICS and IT security knowledge and experience of many organizations.

CSET User Manual

7

• Assists in the identification of potential vulnerabilities in the network design and
security policies.
• Provides guidelines for cybersecurity solutions and mitigations.
• Provides access to a centralized repository of cybersecurity requirements.
• Provides an opportunity for dialogue on security practices within the user's facility.

Limitations of this Tool
The tool has a component focus rather than a system focus. Therefore, network architecture
analyses, including network hardware and software configuration analyses, will be limited to the
extent that they are defined by programmatic and procedural requirements.
CSET is not a risk analysis tool; it will not create a detailed risk assessment.
Most importantly, CSET is only one component of a comprehensive control system security
program. A security program based on a CSET assessment alone must never be considered
complete or adequate.

User Qualifications
CSET assessments cannot be completed effectively by any single individual. A cross-functional
team consisting of representatives from multiple company areas is essential. The
representatives must be subject matter experts with significant expertise in their respective
areas. No one individual has the span of responsibility or knowledge to be able to fully and
accurately answer all the questions provided by the CSET tool.

CSET User Manual

8

Overview
The Cyber Security Evaluation Tool (CSET®) is a software tool for performing cybersecurity
assessments of an organization's enterprise and industrial control cyber systems. It was
designed to help asset owners identify vulnerabilities and improve the organization’s overall
cybersecurity posture by guiding them through a series of questions that represent network
security requirements and best practices. The presented requirement questionnaires are based
on selected industry Standards, common requirements, and the network diagram (or network
topology and architecture).

CSET Framework
The underlying framework for CSET includes:
• Analysis and user interface tools to assist in the evaluation of an ICS,
• A knowledge base of ICS cybersecurity requirements, regulations, and practices, and
• A collection of solutions to help mitigate vulnerabilities.

Basic Evaluation Process
Form the Assessment Team
Prior to beginning the assessment, form a subject matter expert team. Teams typically include
representation from senior management, business, operations, IT, ICS, and security. The
assembled team is responsible for determining the evaluation levels and answering specific,
detailed questions on the control system and security configuration.
Familiarity with the tool will improve and speed up the assessment process. Anyone in the
organization who has had training or experience with the tool should be included on the team.
Alternately, the primary user should spend some time using the tool with test-only or dummy
data prior to commencement of the team activity.
Documents that may be referenced should be gathered prior to the assessment. Useful
reference materials include information relating to operations, maintenance, physical security,
cybersecurity, and hazardous materials.

Register for a CSET Account
Register for CSET by first installing CSET. The CSET installation will be on your local desktop.
If it is installed locally click the icon to start, if your CSET installation is an Enterprise or
company installation see your company CSET administrator for the URL.
After installation navigate to the CSET home page. Below the login is a link that says "Register
New User Account". See more on registering a new account at Register a User Account. A new
assessment can be started from the user's landing page by clicking the "Start New Assessment"

CSET User Manual

9

button.

Figure: New Assessment button

Add Site Information
Begin the assessment by filling out assessment details. This includes the assessment name
and date, information on the subject system, points of contact, and a description of the
assessment. Such information will be helpful when referring to the assessment months or years
later.
For more information, see the Assessment Details help section.
The Figure below graphically depicts the next steps of the self-assessment process. A brief
summary of the steps is provided below.

Figure: CSET Process

Preparation
Site Information
The first part of the assessment preparation process is to provide specific information about the
assessment including who was responsible, when it occurred, what sites or facilities were
involved, and both descriptive and summary information.

Sector Demographics
CSET collects sector and demographic information to help the user identify the appropriate

CSET User Manual

10

Standards and questions that will be presented on the assessment.

Diagram Components
Not supported in CSET 9.0. This feature will be available in a future release.

SAL Selection
The system requires that the user identify a security assurance level (SAL), and multiple options
are provided to determine what the SAL should be. The user may bypass the guidance screens
and directly select the SAL. The user may employ the General SAL guidance (consequence
based) or the Federal Information Processing Standard (FIPS) 199 SAL guidance (based on
FIPS 199 and National Institute of Standards and Technology (NIST), Special Publication (SP)
800-60).
The SAL value selected will limit the required questions to only those related to the selected
level. The SAL value is also used in the ranking of missed questions.
For more information about Security Assurance Levels or SALs, see the Security Assurance
Level (SAL) Selection help section.

Standard Selection
Included on the Cybersecurity Standard Selection screen is a list of Standards and guides
applicable to the mode options. The list of choices will vary depending on which mode is
selected. Advanced users will have the option to select one or more Standards against which
they would like to be evaluated.
For more information about Standards, see the Standards Screen help section.

Assessment
Questions
Once a Standard has been selected, CSET will generate a set of assessment questions that
can be accessed from the Assessment screen. All questions will be answered as either Yes,
No, Not Applicable (NA), or through an Alternate method (ALT). If the "Requirements" mode is
selected, the questions will be presented as explicit requirements from the selected industry
Standard.
The process of answering questions is tedious but straightforward. As a team, start with
Question 1 and continue through each subject area or category until all questions have been
discussed and answered.

Mode Selection
There are two different methods to performing an assessment. The first uses a set of simplified
Yes or No questions that have been extracted from industry Standards. These questions do not
combine multiple concepts; rather, they address a single idea with each question.
The second mode presents the specific requirement text directly from the selected industry
Standards. This requirement mode is designed for regulated industries where the exact wording

CSET User Manual

11

is important.
For more information, see Mode Selection.

Results
Dashboard
The Results dashboard shows the basic score or results of the assessment at a glance. The
overview shows 2 scores: (1) the overall score, and (2) a standards based score. It also shows
charts for Assessment Compliance, Top Ranked Categories, Standards Summary, and
Component Summary.

Analysis
Assessment results can be reviewed in two locations. The first is from the Analysis Screen
containing charts and tabular data that present both summary and detailed information about
how well users are doing and where they need to improve, including rankings for questions by
category and the questions themselves.
The second way to view assessment results is through a set of printed reports. From the
executive to the site summary and the site detail reports, each report provides increasing levels
of detail. Finally, the security plan report provides a template for documenting the required
cybersecurity controls and the degree to which they are met. The printable reports contain
charts, lists, and detail information found on the analysis screen.
For more information about Analysis, see the Results help section.

Reports
The reports provide the details and scores of the assessment and allow for printing and
publishing the assessment information, including summary charts and lists. Reports can help
the user clearly understand where weaknesses are and where improvements should be made.

Additional Actions
Utilize Assessment Documents
CSET gives users the opportunity to collect and store all documents relevant to an assessment.
This collection may be accomplished in two ways. First, all questions can have one or more
documents associated with them indicated in the documents section of the details and
resources link under each question. The second way is accessed from the Assessment
Documents link accessed from the Help menu. The Document Library screen lists all
documents currently associated with the assessment.
For more information, see the Assessment Documents help section.

Utilize Resource Library
The Resource Library is a source for additional cybersecurity documentation. It is accessed
from the Title Bar on the main CSET window. The Resource Library contains reference

CSET User Manual

12

materials to answer many technical or policy questions and aid in the creation and maintenance
of a comprehensive cybersecurity program.
For more information, see the Resource Library help section.

Protect Information
Data Recovery
Unlike other versions of CSET, CSET 9.0 continuously saves data that is entered. If CSET is
closed or the browser restarts all the entered data should remain.

CSET User Manual

13

Disclaimer
The following disclaimer will be seen when installing CSET:
"The analysis, data, and reports in CSET® are provided “as is” for informational purposes only.
The Department of Homeland Security (DHS) does not provide any warranties of any kind
regarding any information contained within. In no event shall the United States Government or
its contractors or subcontractors be liable for any damages, including but not limited to, direct,
indirect, special, or consequential damages and including damages based on any negligence of
the United States Government or its contractors or subcontractors, arising out of, resulting from,
or in any way connected with this report, whether based on warranty, contract, tort, or
otherwise, whether injury was sustained from, or arose out of the results of, or reliance upon the
report."
"DHS does not endorse any commercial product or service, including the subject of the
assessment or evaluation in this report. Any reference to specific commercial products,
processes, or services by trademark, manufacturer, or otherwise, does not constitute or imply its
endorsement, recommendation, or favoring by DHS."
"The display of the DHS official seal or other DHS visual identities on this report shall not be
interpreted to provide the recipient organization authorization to use the official seal, insignia or
other visual identities of DHS. The DHS seal, insignia, or other visual identities shall not be used
in any manner to imply endorsement of any commercial product or activity by DHS or the United
States Government. Use of the DHS seal without proper authorization violates federal law (e.g.,
18 U.S.C. §§ 506, 701, 1017) and is against DHS policies governing usage of the seal."
"The report is prepared and intended for internal use by the organization that made the request.
The contents of this report may be subject to government or private intellectual property rights.
To request distribution of this report outside the organization for which it was prepared, contact
the CSET Program Office. The contents of this report may be reproduced or incorporated into
other reports, but may not be modified without the prior express written permission of the CSET
Program Office."

CSET User Manual

14

System Basics
System Requirements Local Installation
It is recommended that users meet the minimum system hardware and software requirements
prior to installing CSET. This includes:
1. Pentium dual core 2.2 GHz processor (Intel x86 compatible)
2. 6 GB free disk space
3. 4 GB of RAM
4. Microsoft Windows 7 or higher.
5. Microsoft .NET Framework 4.6 Runtime. (included in CSET installation)
6. SQL Server 2012 Express LocalDB (included in CSET installation)
7. IIS Express 8.0 (included in CSET installation)

System Requirements Enterprise Installation
It is recommended that users meet the minimum system hardware and software requirements
prior to installing CSET. This includes:
• Pentium dual core 2.2 GHz processor (Intel x86 compatible)
• 8 GB free disk space
• 4 GB of RAM
• Microsoft Windows Server 2012 Edition or higher recommended
• Microsoft .NET Framework 4.6 Runtime
• SQL Server 2012 or higher recommended
• Internet Information Server (IIS)

Other Items of Note:
• For all platforms, it is recommended the user upgrade to the latest Windows Service
Pack and install critical updates available from the Windows Update web site to ensure
the best compatibility and security.
• If the install must be made through physical media, a USB port will be required.
• If desired, HTML reports will need to be converted to PDF using an external utility.
• If the Microsoft .NET Framework 4.6.0 Runtime is not available on the user's computer,
CSET will automatically install it, which can add several minutes to the installation time.
(For local installation)

CSET User Manual

15

Installation Procedure
Stand-alone Install
Double-click on the CSETStandAlone program.
The User Account Control dialogue will come up. Select “Yes”.

Figure: User Account Control box
A CSET 9.0 dialogue will open asking if you want to install CSET 9.0 Desktop. Select “Yes”.

Figure: Install dialogue
The program will begin extracting.
After extracting a CSET 9.0 Setup dialogue will open. Select “Install”.

CSET User Manual

16

Figure: CSET Setup
CSET will begin to install. If the user doesn’t have IIS 10.0 Express, CSET will install it. The IIS 10.0 Express
Setup dialogue will open. Click the check box to confirm that you “…accept the terms in the License
Agreement”, and then select “Install”.

CSET User Manual

Figure: IIS Setup
IIS will install. Select “Finish” when it completes.
The CSET 9.0 Setup Wizard will open to walk the user through the install process. Select “Next”.

17

CSET User Manual

18

Figure: Setup Wizard
A disclaimer will open. Read through and then click the box “I read the disclaimer”, and select “next”.

CSET User Manual

19

Figure: Disclaimer
CSET will choose a default folder to install CSET 9.0 to, but you can change this in the Destination Folder
dialogue. Select “Next”.

Figure: Destination Folder
The CSET Installer will show that it is ready to install, select “Install”.

CSET User Manual

20

Figure: Ready to Install
CSET 9.0 will be installed. Make sure that the “Launch CSET 9.0 when setup exists” box is checked, and
select “Finish”.
The user should see a setup successful dialogue, and then have an option of how they want to open the
app. For this example, Edge was used.

CSET User Manual

21

Figure: Setup Successful
The user has access to CSET 9.0 as Local User. The Local Installation ribbon is visible at the top of the
screen. They can see their landing page with no assessments at this time.

CSET User Manual

Figure: Local Install Landing Page

22

CSET User Manual

23

Using the Stand-alone
There are a few things users should know in regards to the stand-alone install of CSET 9.0.

Using the CSET System Tray Application
The CSET system tray app will be available in the user's task bar. To use it click the CSET
icon

.

The user will have the option to Open CSET Web, Start CSET Web, Stop CSET Web,
Configure/Status, or Exit.
Selecting "Open CSET Web" will open a web instance of CSET 9.0.
Selecting "Start CSET Web" will run the application. If the application is already running the
Start CSET Web option will not be available, and the user should see in the Configure/Status
that the Status is "Running".
Selecting "Stop CSET Web" will end the application.
Selecting "Configure/Status" will open the CSET Web- Local Configuration and Status box (Fig.
#). The user can utilize this to change their port, check the status of the application, or check the
output log.

CSET User Manual

Figure: Local Configuration and Status box
Selecting the "Exit" option will close the CSET system tray application menu.

24

CSET User Manual

25

Enterprise Install
Overview
This guide will detail the procedure for installing the latest version of the Cyber Security
Evaluation Tool (CSET 9.0) in a web-based configuration on a Microsoft Windows Server 2016
instance running Microsoft SQL Server 2016.

Prerequisites
In order to configure the CSET Database, an instance of Microsoft SQL Server Management
Studio (SSMS) which is able to connect to the server instance will be required.
You will also need to obtain the latest CSET distribution. It can be downloaded from GitHub at
https://github.com/dhs-ncats/cset/archive/master.zip. This file should be downloaded to the
server or virtual machine, and should be extracted in a location where it will be accessible to the
user.
NOTE: For the purposes of this document, a Windows Server 2016 instance, running inside a
VMWare Workstation Pro 14 virtual machine will be used. The same VM will be running the
database and the web server.
In order to host the database and web server on separate machines, the procedure given in this
document will need to be modified accordingly, and extra care will be required in configuration
steps (e.g.: the Web.config file will need to be edited to refer to the SQL Server machine,
instead of localhost)
.
For other configurations, please refer to the applicable documentation from the relevant
operating system and software vendors.

Installation Steps
IIS Setup
CSET is deployed as an IIS website. We will now install and configure the IIS Web Server for
CSET deployment.
• ·Left click on "Add roles and features (button)" in "Server Manager"
• ·Select “Role-based or feature-based installation” and continue
• ·Select the “Web Server (IIS)” checkbox on the Server Roles list
• ·Expand the “Web Server (IIS)” list item, the “Web Server” list item, and the “Application
Development” list item
• ·Select the ASP.NET 4.6 checkbox and continue
• ·Expand ".NET Framework 4.6 Features” list item on the Features list
• ·Select the “ASP.NET 4.6” checkbox and continue
• ·Select the “HTTP Redirection” checkbox in the Role Services list and continue
• ·Complete the installation

SQL Server Installation

CSET User Manual

26

CSET requires a SQL Server database. In this document, we will install a new SQL Server
instance on the Windows Server, and configure it for CSET. If a SQL Server instance already
exists, skip this section, and continue to Additional Dependencies. Ensure you have
administrative access and privileges on the database.
• ·Insert the SQL Server disk, or mount the disk image and run Setup.exe
• ·Click the “Installation” link on the navigation pane on the left
• ·Click the "New SQL Server stand-alone installation or add features to an existing installation”
link
• ·Enter your product key and continue, accepting the license terms
• ·At the Feature Selection screen, select the “Database Engine Services” checkbox on the
Features list and continue
• ·At the Database Engine Configuration screen, select the “Mixed Mode (SQL Server
authentication and Windows authentication)” radio button
• ·Enter (and confirm) a password for the server administrator (sa) account
oTake note of this password. It will be required in a later step
• ·Click the “Add Current User” button and continue when the user information appears in the
text box
oIt may take a few moments for the user information to appear in the text box
• ·Complete the installation

Additional Dependencies
There is some additional software required by CSET. We will now install this software.
The software required is the Microsoft URL Rewrite Module 2.0 for IIS. It can be obtained
through the Microsoft website at
https://www.microsoft.com/en-us/download/details.aspx?id=7435.
Simply download the file to the server and run it. This will install the module needed for IIS to
function properly with CSET.

Firewall Configuration
In order to configure and use the new SQL Server instance, it needs to be able to receive
incoming connections. By default, this is prevented by the Windows firewall. We will now
reconfigure the firewall to allow incoming database connections.
• ·From the Windows “Start” menu, search for “firewall”, and select “Windows Firewall with
Advanced Security”
• ·On the navigation pane on the left, click “Inbound Rules”
• ·On the Actions pane on the right, click “New Rule…”
• ·Select the “Port” radio button and continue
• ·Select the “Specific local ports” radio button
• ·In the text field, input 1433 and continue
• ·Select the “Allow the connection” radio button and continue
• ·On the Profile screen, select which networks you wish to allow incoming connections from,
and continue
• ·Enter a name and a description for this rule, and continue

CSET User Manual

27

oThe description is optional, but the name should reference SQL Server

Database Setup
The database used by CSET must be configured properly for CSET. This step involves
configuring the SQL Server instance installed in a previous step.
• ·On the server or virtual machine, navigate to the CSET Distribution which was downloaded
previously
• ·In the “Database Images” folder, there are two files: CSETWeb.mdf and CSETWeb_log.ldf.
• ·Copy these files to a suitable shared location such as the root of the C: drive
oYou will need to ensure that users have adequate permissions to read and modify both
files
• ·On a host or client machine, open SSMS
• ·Connect to the SQL Server instance using an administrative account, such as the ‘sa’ account
created while installing the SQL Server instance in the previous step
oThe server or virtual machine needs to be configured to be reachable on the network
by the host or client machine, but this is outside of the scope of this document
• ·In the navigation pane on the left, right click on Databases
• ·Click Attach
• ·In the Attach Databases dialog, click the Add button
• ·In the Locate Database Files dialog, navigate to the folder you copied the database images to
• ·Select CSETWeb.mdf and click OK
• ·In the Attach Databases dialog, click OK
• ·In the navigation pane on the left, under Databases, CSETWeb should appear

CSET Installation
With the system properly configured, CSET itself can now be installed.
• ·On the server or virtual machine, navigate to the CSET Distribution which was downloaded
previously
• ·Navigate to the ‘dist’ folder
oThe contents of this file will need to be copied to the folder for the IIS website it is being
deployed to
• ·In the navigation pane on the left side of the Server Manager window, click IIS
• ·In the SERVERS list, right click on the server instance you will be deploying to
oIf you have followed the installation instructions given, it will be the only item in the list,
and will be highlighted
• ·Click “Internet Information Services (IIS) Manager” on the right-click menu
• ·In the “Internet Information Services (IIS) Manager” window, on the left navigation pane,
locate the server name, and expand that list item
• ·Expand the Sites list item
• ·Click on the “Default Web Site” list item
• ·In the Actions pane on the right side, click Explore
• ·A new Windows Explorer window will appear
• ·Remove the files in that folder, but do not delete the ‘aspnet_client’ folder
• ·Copy all of the contents of the ‘dist’ folder (inside the CSET distribution) into this folder

CSET User Manual

28

CSET Configuration
Now that CSET is installed, it must be configured before it can be used.
• ·In the website folder found in the “CSET Installation” steps, locate the file Web.config
• ·Open this file in a text editor such as Notepad
oYou will need to ensure you have proper permissions to modify this file before editing
• ·Locate the section of code between the  and the 
tags
• ·On each of these lines, locate the words data source
• ·Edit these to reference the IP address or domain name of the machine that the SQL Server
instance is installed on (e.g.: data source=domain.name.here or data source=123.456.789.012)
oIf IIS and SQL Server are running on the same machine, then use localhost as the
domain name
• ·Edit the lines to indicate login credentials after persist security info=True;
oIf SQL Server authentication will be used, then a user id and password will need to be
provided for the login that will be used
E.g.: user id=cset_user;password=AbC!2#;
oIf Windows domain authentication will be used, then the user id and password will need
to be replaced with Trusted_Connection=True;

CSET User Manual

29

Evaluation Preparation
Two preliminary tasks are required before using the tool to perform an assessment: (1) forming
the subject matter team and (2) collecting the network/architecture documentation and related
information.

Subject Matter Team Selection
The first step is to select a cross-functional assessment team consisting of subject matter
experts selected from various operational areas in the organization. Organizations may add
additional team members as needed to address specific topics. Anyone in the organization who
has had training or experience with the CSET tool should be included on the team.
The primary user should spend some time using the CSET tool with test-only or dummy data
prior to commencement of the team activity. Familiarity with the CSET tool will improve speed
and ease of use.
Representatives from the following areas are suggested for an effective assessment. The
representatives should have significant expertise in their areas of responsibility.
If performing an ICS assessment:
• Industrial Control Systems (knowledge of industrial control system architecture and
operations)
• System Configuration (knowledge of systems management).
• System Operations (knowledge of system operation).
For either an ICS or IT assessment:
• IT Network/Topology (knowledge of IT infrastructure).
• IT Security/Control System Security (knowledge of policies, procedures, and technical
implementation).
• Risk Management (knowledge of the organization’s risk management processes and
procedures).
• Business (knowledge of budgetary issues and insurance postures).
• Management (a senior executive sponsor/decision maker).

Gather Supporting Documentation and Information
Previous CSET users have found that the following types of documents and information are
useful to have during completion of the assessment. Collecting this reference information before
beginning the assessment is advisable:
• Organizational chart that outlines responsibilities;
• Annual operating and capital budgets;
• Insurance policy description;
• Previously performed risk and vulnerability assessments;
• Capacity, operation, management, and maintenance manuals;
• Risk management documentation;
• Hazardous waste operations and emergency response Standards;

CSET User Manual

30

• Emergency Operations Plan/Emergency Response Plan;
• Asset inventory and criticality rating from Computerized Maintenance Management
System (CMMS);
• Inventory list of process control/SCADA software and hardware, including interfaces;
• Network topology diagram and supporting documentation;
• Documentation/knowledge from previous incidents or near misses;
• General asset inventory, criticality asset determination, business impact analyses,
contingency plans, etc.; and
• Information security policies, plans, and procedures.
When the assessment team is prepared and supporting documents are gathered, the
organization is prepared to start CSET and begin the actual evaluation.

Start CSET
Go to http://localhost:46000/index.html or for other installation options the instructions provided
in the help section titled Installation Procedure should be followed.
The actual URL maybe provided by your companies CSET administrator.
The CSET Home Screen will be displayed as seen in the Figure below.

Figure: CSET Home Screen

CSET User Manual

31

Register a User Account
To get started in CSET you must have a registered account. This is an easy process that won't
take much time at all.
First, select the "Register New User Account" link. The Register Account dialogue will open.

Figure: Using the Home page to register an account

CSET User Manual

32

Figure: Registration dialogue
The user should enter in their first and last name and email. Then select the "Register" button.
The user will be sent an email with a temporary password and instructions to login. Users can
navigate to CSET through the email or select the "Registered User Login" link on the dialogue
above.
Warning: Users CAN NOT register an email that has already been registered.

Register Account link
This link will open a dialogue for the user to create a new account.

CSET User Manual

33

Forgot Password link
This link opens a dialogue for user's to get a new temporary password and reset their
old forgotten password.

Login Email and Password fields

To login enter the user's email and password here.

Login button
Click the login button after entering user information to login.

CSET User Manual

34

Import/Export a CSET Assessment
Importing a .csetw File
With a web-instance of CSET 9.0 a user can import a .csetw file. To begin click the Import
button to begin the process.

Figure: Import Button
The user's File Explorer will open, and at this point they can select a .csetw file. A new
assessment that is a duplicate of the uploaded assessment will show in the user's landing page.
NOTE: The web-instance of CSET 9.0 only supports .csetw file upload. For legacy file (.cset)
upload the user must use the stand-alone install.

CSET User Manual

35

Importing a .cset File
With the Stand-alone version of CSET 9.0 running locally the user can import a legacy CSET
file.

Much like importing a .csetw file click the

button on the local Landing page.

The user's file explorer will open. Select the .cset file to import. The upload dialogue will open.
Once the dialogue has closed, refresh the Landing page to see the imported assessment.

CSET User Manual

36

Exporting a CSET Assessment
To export an assessment simply select the Export button next to the assessment to be exported
on the Landing page.

Figure: Export button
After clicking the Export button the assessment will be downloaded as a .csetw file and will be in
the user's Downloads folder (unless otherwise specified in browser settings).

CSET User Manual

37

Custom Questionnaires
The Custom Questionnaire Manager allows the user to define custom subsets of questions or
requirements for an assessment. Questions may be selected from any Cybersecurity Standard
currently used and defined in the CSET tool. The following sections describe how to create and
work with Custom Questionnaires.

Using the Import New Module
NOTE: The Import New Module is designed for Developer use. The user needs experience with
either JSON or XML. To access the Import New Module visit
www.csetac.inl.gov/importmodule
There are a few different options to import a new Questions or Requirements set in CSET 9.0.
The user can use an edit an existing standard, create their own JSON or XML module in CSET,
or use a schema in an outside code editor and paste in CSET.
The parts of the Import New Module can be seen in the Figure below.

Figure: Import New Module screen

Standards List

CSET User Manual

38

The Standards List allows the user to export any of the standard code in either XML or
JSON. It also allows the user to click "Load to editor" to load any standard code to the
Module Editor where it can be edited. When a new standard is imported it will show in
the Standard List, as well as, the Cybersecurity Standards page.

Module Editor

The Module Editor is where the user can edit or create a new standard for import. Edit
within the tool or drag and drop a file to the editor.
Tip: Use CTRL+Spacebar to see list options while coding. Use ALT+Shift+F to format
code when loaded from the Standards List.

CSET User Manual

39

Note: New Standards can contain both Questions and Requirements. If only using
Requirements they will be duplicated for the Questions set.
Short Names must be unique when editing a previously used standard.

JSON/XML Toggle
Use the JSON/XML Toggle to pick what language to use for the new standard being
imported. It is recommended to use JSON, because CSET has more comprehensive
validation and list options within the editor.

Schema Button
Use the Schema button to download a code schema to edit in an outside editor. Drag
and drop the file when complete to see validation messages and submit.

Expand Editor Button
Click the Expand button to expand the Module Editor to the full-screen.

Validation Message Box

The Validation Message box shows errors in the code, as well as, processing errors
when a user hits "Submit".

Supporting Documents Module

Users can add supporting documents and references with the newly created standard.
Drop reference files into the reference file drop area, enter a title, and a short name. Use
the red trash icon or remove all to delete supporting documents.

CSET User Manual

40

Tip: If using the Destinations field in the editor to direct a user to a certain place in the
supporting document, then the destinations must be set up in the support document
itself. See Choose Your Destination for more information.

Submit Button
Select "Submit" when the module code is complete and ready to be created.

CSET User Manual

41

Title Bar
The Title Bar allows the user to access high-level functions of the CSET application and is
shown in the Figure below.

Figure: Title Bar

CSET Home
The CSET HOME button opens the user's landing page.
For more information about the landing page, see the Landing Page help section.

Tools
The Tools button opens the Tools menu.
For more information about the Tools menu, see the Tools Menu help section.

Resource Library
The Resource Library button opens the Resource Library.

CSET User Manual

For more information about the Tools menu, see the Resource Library help section.

User Profile
(This will display your user name)
The User Profile button opens the User Profile menu.
For more information about the User Profile menu, see the User Profile help section.

Help
The Help button opens the Help menu.
For more information about the Help menu, see the Help Menu section.

42

CSET User Manual

43

Tools Menu
The Tools Menu provides the user with options outside of the assessment process. The user
can access the Enable Protected Features, Assessment Documents, Parameter Editor, and
Export Assessment to Excel features. The Tools Menu is described in the Figure below.

Figure: Tools Menu
NOTE: The Assessment Documents, Parameter Editor, and Export to Excel features are not
available unless within an assessment. If on the landing page the Tools menu will look like the
Figure below.

Figure: Tools menu outside of an assessment

Tools Menu button
Clicking the Tools menu button opens up the Tools menu.

CSET User Manual

44

Enable Protected Features
Clicking the Enable Protected Features menu item displays the Protected Features
window that allows the user to view specific questionnaires or standards developed by
specific industries that are not available to the general public.
See Protected Features for more information.

Assessment Documents
Clicking the Assessment Documents menu item opens the Assessment Documents
window that allows users to review documents that have been assigned to specific
questions of the assessment. If there are no documents associated with the assessment
the list will return blank.
See Assessment Documents for more information.

Parameter Editor
Clicking the Parameter Editor menu item displays the Parameter Editor window where
users can maintain parameters related to their selected Standard in requirements mode,
if they are supported.
See Parameter Editor more information.

Export to Excel
Clicking the Export to Excel menu item downloads an excel spreadsheet with the
answers to the assessment Questions or Requirements.
See Export to Excel for more information.

CSET User Manual

45

Assessment Documents
This section contains information on the purpose and use of CSET Assessment Documents.
The Assessment Documents window stores documents and files added to the assessment by
the user. These files are associated with specific questions to help explain or to provide
evidence for the answer given.
The assessment documents window provides a way to see all the files that have been stored in
the assessment by the user. During the assessment, a document can be added using the Add
Document button in the documents section of the Question Details panel that will associate the
document with that question. The Assessment Documents is accessed from the Tools menu.
The Documents help section provides more detailed information on how to associate
documents with a question.
Clicking the Assessment Documents menu item in the Tools Menu displays the Assessment
Documents window seen in the Figure below.
View or download assessment documents via the dialogue.

Figure: Assessment Documents Window

CSET User Manual

46

Parameter Editor
Many Cybersecurity Standards in CSET contain parameter information in the requirement text.
Parameters are indicated by [] symbols in the requirement text. For example, the SP800-53 R4
App J Standard contains the following parameter: [Assignment: organization-defined frequency,
at least annually].
The Default Parameter Editor allows the user to replace the default parameter text with other
text the user defines. So in the previous example, the user might replace the [Assignment:
organization-defined frequency, at least annually] parameter with the word Annually. The
Default Parameter Editor will then replace all occurrences of the parameter with the user's text.
Users can also change the parameters within the Requirement text itself with inline parameter
editing. Simply click in to the parameter edit and save.
The Default Parameter Editor window is described in the Figure below.

Figure: Default Parameter Editor Window

CSET User Manual

47

Figure: Inline Parameter Editing

Parameter List

The Parameter List displays a list of Parameter Names and associated Default
Parameter Values.
The Parameter Name column shows the name of the parameter and cannot be
changed.
The Default Parameter Value column displays the current parameter values associated
with the parameter names for the selected Standards as seen in the Requirement text
on the Assessment screen. The parameter values are initially the same as the
Parameter Name but can be changed by the user. To change a parameter value,

CSET User Manual

48

double-click the cell containing the desired Default Parameter Value and enter new
parameter text. Perform the same with any other parameters. Once finished, click the
"Ok" button.
All parameter values in the requirement text will then be updated with the entered text
for the given parameter names throughout the assessment.

Ok Button
The Ok closes the Default Parameter Editor and updates any relevant blue parameter
links in the Question Content Area with changes to the parameter values.

CSET User Manual

49

Protected Features
The Protected Features window allows the user to add a feature unlock code to release specific
standards or questionnaires that are not available to the general public. The Protected Features
window is described in the Figure below.

Figure: Protected Features Window

Feature Unlock Code text boxes

The Feature Unlock Code input text boxes allow the user to enter the feature unlock
code. Once a proper code has been entered, the Module List will display all available
standards or questionnaires that can be added to the CSET Standards Selection screen.

Enable Features button
Select the Enable Feature button after entering the Unlock Code.

Module list

The Module List displays a list of available standards or questionnaire modules that are
unlocked and available in the Cybersecurity Standards Selection page.

CSET User Manual

Close button
The Close button closes the Protected Features dialogue and commits changes.

50

CSET User Manual

51

Export to Excel
Selecting the "Export to Excel" link will download an excel copy of your assessment results.
NOTE: The excel report shows either Questions or Requirements. Whichever mode has more
answers will show in the report.

Figure: Export to Excel Output

CSET User Manual

52

Resource Library
The Resource Library is an excellent way to help the user better understand and resolve the
concerns identified by the assessment and to improve the security of the user's systems. It
contains a variety of Standards, reports, templates, white papers, plans, and other
cybersecurity-related documents. The Figure below shows the Resource Library window.

Figure: Resource Library Window

CSET User Manual

53

Search Screen
Two ways are available to find documents within the Resource Library. This section discusses
the Search feature. The other way is by using the document tree structure discussed in the help
section titled Browse Screen.
The Search screen option of the Resource Library provides a way to find a list of documents
based on the text string typed into the search box. Clicking the Search tab opens a search box.
Enter the desired text string and click on the magnifying glass icon or press the keyboard Enter
key to begin the search.
The Figure below shows an example where the user has typed in the string "contingency." In
this case, CSET searches through all the documents for occurrences of the word "contingency"
and then ranks and presents them in an ordered list in the Search Results.

Figure: Resource Library Search Screen

Search tab
Clicking the Search tab will display the search functions of the Resource Library. The
Resource Library always opens to the Search tab.

Search Bar
The Search bar allows the user to enter keywords related to the desired documents. The
user enters one or more keywords and clicks the Search button or presses the "Enter"

CSET User Manual

54

key on the keyboard to perform the search. Results of the search are displayed in the
Search Results list.

Search Results List

The Search Results list displays the documents found by the Search. Once there are
documents displayed, the user can click a document to see the contents in a new tab.

Wildcards
There are two different types of wildcard characters that can be used in the search. The
first is the asterisk character that can be used to substitute for one or more characters.
For example, if entering the text "fire*", the search would look for anything starting with
those characters and the user would see a prioritized list starting with topics related to
firewalls. Without the asterisk the search would look for "fire" and the first entry would
be Fire Protection.
Exact characters could also be substituted with question marks. For example, entering
the text "NIST SP800-??" will return the NIST Special Publication 800 series documents
where the last two characters are substituted by the wildcard character.

CSET User Manual

55

When CSET is searching for the text string, it is evaluating both the title and the content
of the document. While the search will evaluate any character string, it is recommended
that the entry be as specific as possible to limit and refine the list. The search is not
sophisticated enough to find similar or close spellings. A misspelled word like
"Ciber-Security" will return no results.

Topic Searches
In most cases, the user will be searching for a specific subject; however, the search capability
can also be used to search for types of documents. In the example above, the returned
document is a DHS recommended practice. By entering "recommended practice" in the search
text box, the user can create a list of all the recommended practices developed by DHS as well
as other documents that may use that phrase.

CSET User Manual

56

Browse Screen
Two ways are available to find documents within the Resource Library. The first is by using the
document tree structure shown in the Figure below. The second is by using the Search screen
discussed in the help section titled Search Screen.
In the document tree structure, all the topics in the library are organized in a hierarchical format
and displayed as leaf nodes on one or more branches, with a branch representing a topic. Each
main topic can be expanded to more detailed subtopics until only the list of documents remains.
The branches may be one or several levels deep.

Figure: Resource Library Document Tree

Document Tree List

The Document Tree list displays the documents in the Resource Library organized by
category in an expandable tree structure. The tree structure contains branches
(Categories) and Leaves (Documents). Branches can be clicked to show more branches

CSET User Manual

57

or leaves. Leaves can be clicked to display selected documents in a new tab.

Figure: Expanded Document Tree
In the example shown in the Figure above, the Access Control branch under Standards was
clicked to open and expose the documents that are found under it. Any document selected will
open in a new tab for the user to read.
The options to browse by publisher and publication year are also available. They were added for
those users looking for specific versions of documents or documents from a specific source.
The documents listed under these headings are the same as in the rest of the tree but listed in a
differing order.
The final two subjects in the tree labeled Cyber Security Procurement Language and Catalog of
Recommendations are unique and will open special access to the content rather than the files
themselves.

Cyber Security Procurement Language:
By clicking the branch labeled Cyber Security Procurement Language, the screen expands the
tree to show the topics in the Procurement Language document. (The full document can be
found using the Search or Document Tree methods.) The Figure below shows the branch
open with the topic Removal of Unnecessary Services and Programs displayed (found under
the System Hardening category.

CSET User Manual

58

Figure: Cyber Security Procurement Language
In this case, instead of a document being opened, CSET displays formatted text taken directly
from the Cyber Security Procurement Language document.
Each topic includes some or all the following sections:
• Brief Overview of the Topic,
• Basis,
• Language Guidance,
• Procurement Language,
• Factory Acceptance Test (FAT) Measures,
• Site Acceptance Test (SAT) Measures,
• Maintenance Guidance,
• Dependencies, and
• References.
To fully understand how the procurement language was developed, how it is to be used, any
limitations and constraints, and general information about the document, open the document
and read the front pages. To access it, click on Search and then type in procurement language.

Catalog of Recommendations:
This first level branch will open the list of topics that are associated with the Catalog of Control
Systems Security: Recommendations for Standards Developers. The Figure below shows an
example.

CSET User Manual

59

Figure: Catalog of Recommendations
Development of the Catalog was originally sponsored by DHS with input from NIST and five
national laboratories. It consolidated the requirements from 15 control system and information
technology Standards and was intended to serve as a source of requirements and controls for
the developers of ICS Standards. Because of its popularity and comprehensive ICS
requirements, it has become a principal Standard in all versions of CSET and in the ICS
community at large in addition to Standards developers.
To access a topic, simply click on the branch title in the tree. In the example above, Security
Policy was selected and the topic Security Policy and Procedures was chosen.
On the right-hand side of the screen, CSET displays the content from the Catalog.
Each topic includes some or all the following sections:
• Brief Overview of the Topic,
• Requirement Text,
• Supplemental Guidance,
• Requirement Enhancements, and
• References.
Like the procurement language document, to fully understand the background and intent of the
Catalog, open and read the front pages.

CSET User Manual

60

User Profile
The User Profile menu allows the user to view their User Profile Information and their
assessments, Change Password, and Logout of CSET.
The "My Assessments" link will navigate the user to their landing page. To learn more about the
landing page, see Start Assessment Preparation.
The "Logout" link will log the user out and return them to the CSET home page.

Figure: User Profile menu

User Info
Click User Profile to view and edit User Profile Information.
See User Profile Information for more information.

My Assessments
Click My Assessments to be directed to the user's Landing Page.
See CSET Landing Page for more information.

Change Password

CSET User Manual

Click Change Password to change the user's password.
See Change Password for more information.

Logout
Click Logout to be logged out of CSET and returned to the Home Page.

61

CSET User Manual

62

User Profile
The User Profile menu allows the user to change their First Name, Last Name, and/or Email.

Figure: Edit User Profile dialogue
The User Profile dialogue will show your profile information. Use this dialogue to change first
and last name or email. Select the "Save" button to keep changes or "Cancel" to exit the
dialogue.

CSET User Manual

63

Change Password
Users can select the "Change Password" link to change their password.
Enter the Current Password, and New Password twice to change passwords.

Figure: Change Password dialogue

CSET User Manual

64

Help Menu
The Help Menu shown in the Figure below allows the user to access help documentation for the
CSET tool.

Figure: Help Menu

Help Menu Button
Clicking the Help menu button opens the Help menu.

User Guide Menu Item
Clicking the User Guide menu item will open this user guide as a CHM file containing
screen shots and instructional information for using the CSET tool.

User Guide (PDF) Menu Item
Clicking the User Guide (PDF) menu item will open this user guide as a PDF file
containing screen shots and instructional information for using the CSET tool.

CSET User Manual

65

Accessibility Document Menu Item
Clicking the Accessibility Document menu item will open the CSET Accessibility
Features Document, which describes how CSET addresses accessibility issues
including the use of screen readers, high contrast mode, and keyboard access.
See Accessibility Document for more information.

Keyboard Shortcuts Menu Item
Clicking the Keyboard Shortcuts menu item will open the CSET Keyboard Shortcuts
document, which contains a list of all keyboard shortcuts available to users of the CSET
tool.
See Keyboard Shortcuts for more information.

Terms of Use Menu Item
Clicking the Terms of Use menu item will open the CSET Terms of Use that describes
the terms that user's agree to when using CSET.
See Terms of Use for more information.

About CSET Menu Item
Clicking the About CSET menu item will open the About CSET window containing
version information, web site links to videos, training and contact information for the
CSET team.
See About CSET for more information.

Advisory Menu Item
Clicking the Advisory menu item will open the Advisory window that contains disclaimer
information.
See Advisory for more information.

CSET User Manual

66

CSET ACCESSIBILITY FEATURES
The Figure below shows the CSET Accessibility Features document that can be accessed from
the Help menu of the CSET tool.

Figure: CSET Accessibility Features Document

CSET User Manual

67

Keyboard Shortcuts
The Figure below shows the CSET Keyboard Shortcuts document that can be accessed from
the Help menu of the CSET tool.

Figure: CSET Keyboard Shortcuts Document

CSET User Manual

68

Terms of Use
The Figure below shows the Terms of Use that can be accessed from the Help Menu.

Figure: Terms of Use

CSET User Manual

69

About CSET
The About CSET window provides the user with more information about the CSET team. The
Figure below points out a few important details on the About CSET window.

Figure: About CSET Window

CSET Version Text
The CSET Version text indicates the current installed version of CSET. The last 4 digits
indicate the build number that may be useful when communicating problems with the
CSET support team.

CSET Web Site URL
The CSET Web Site URL is the CSET tool's web site URL where the user can learn
more about the CSET tool, request features, and report defects or problems.

CSET Email
The CSET email address allows the user to contact the CSET team with questions or
concerns regarding the CSET tool.

Video Tutorials URL

The Video Tutorials URL is a URL to current CSET training videos located on YouTube.

CSET User Manual

Ok Button
Clicking the Close button will close the About CSET window

Training Information

Use the links in Training Information to find training opportunities.

Contact Information

Use the links to contact a ___ representative for questions about...

70

CSET User Manual

71

Advisory
The Figure below shows the Advisory window that can be accessed from the Help menu of the
CSET tool.

Figure: Advisory Screen

CSET User Manual

72

Operation Menus
This section addresses the main operation menus of the CSET assessment tool. They include
the Preparation menu, the Assessment menu, and the Results menu.

Preparation Menu
The Preparation menu allows quick access to the assessment preparation screens. The Figure
below describes the buttons and menu.

Figure: Preparation Button/Menu

Prepare Tab

Clicking the Preparation button will display the Assessment Details screen.
See Assessment Details for more information.

Navigation Toggle
Use the Navigation Toggle to open and close the Navigation Menu.

CSET User Manual

73

Preparation Menu Items

The Preparation menu items indicate the screens encountered by the user during the
preparation process.
See Assessment Details, Security Assurance Levels (SAL), Cybersecurity Standards
Selection, and Cybersecurity Framework for more information.

CSET User Manual

74

Questions Menu
The Questions menu allows quick access to the assessment questions and categories. The
Figure below shows the Questions menu navigation.
NOTE: Requirements mode navigation will differ in that it shows standards at the top level and
then categories nested underneath them.

Figure: Assessment Button/Menu

Questions Tab
Clicking the Questions Tab will display the Questions screen displayed after the
Preparation process.
See the Assessment Section for more information about the Questions screen.

Navigation Toggle
Use the Navigation Toggle to open and close the Navigation Menu.

Assessment Navigation Menus

CSET User Manual

75

The Assessment Navigation menu shows a list of all question categories awaiting
completion for the assessment. The user can quickly navigate to a specific category by
clicking the desired menu item.

CSET User Manual

76

Results Menu
The Results menu allows quick access to the assessment results and reports screens. The
Figure below shows the Results menu.

Figure: Results Button/Menu

Results Tab
Clicking the Results button will display the Results Overview screen.
See the Results Menu for more information.

Navigation Toggle
Use the Navigation Toggle to open and close the Navigation Menu.

Results Menu Items

CSET User Manual

77

The Results menu items indicate the screens available to the user in the main Results
Section.

CSET User Manual

78

Main CSET Window Sections
This part of the user manual contains information about the different sections of the main CSET
window including the Preparation, Assessment, and Results sections.

Prepare Section
The Prepare section is where the assessment process begins. The preparation screens help the
user to quickly get ready to answer the appropriate questions for their facility by defining the
questions that will be answered during the assessment. The following pages will describe the
preparation screens in more detail.

CSET Landing Page
The CSET Landing page is the first screen seen after logging in. The Figure below shows the
CSET Landing Page.

Figure: CSET Landing Page

New Assessment Button
Clicking the New Assessment button will start the assessment preparation process that
will allow the user to address important areas before they can begin answering
questions.
The first screen of the assessment preparation process is the Assessment Details
screen.
Tip: All the Landing page columns can be sorted by clicking the arrow next to the column name.

CSET User Manual

79

Site Information Screen
Clicking the Assessment Details menu item in the Preparation Menu opens the Assessment
Details screen. This screen allows for collecting specific information about the assessment
including who was responsible, when it occurred, what sites or facilities were involved, and both
descriptive and summary information. To use the Assessment Details screen, simply enter
textual data into the fields provided. The Figure below addresses the different parts of the
Assessment Details screen.

Figure: Assessment Details Screen

Assessment Name Text Box

The Assessment Name text box is where the user enters the name of the assessment.
The assessment name will also be displayed in the title area of the main CSET window
and on the reports and will be used as the assessment file name if it isn't specifically
changed by the user.
NOTE: An Assessment Name is required for CSET assessments. If the user hasn't
provided one, CSET will name it "New Assessment".

Assessment Date-picker

CSET User Manual

80

The Assessment Date-picker enables a user to add an initial date for the assessment. It
requires a valid date format. Clicking the calendar icon will allow the user to select a
date from a calendar control rather than entering the date manually.

Facility Name Text Box

The Facility Name text box provides text input for identifying the name of the facility or
facilities for which the assessment is created.

Location Text Boxes

The Location text boxes provide text input for identifying the name of the City or Site for
which the assessment is created as well as the State, Province, or Region for which the
assessment is created.

Main Assessor Contact
Information Text Boxes
The Assessor Contact Information text boxes display the contact information for the user
that owns the assessment.

Manage Contacts buttons
Clicking the Manage Contacts buttons allow the user to add contacts or invite contacts
by email to an assessment.
For more information about managing contacts, see the Contact Management help
section.

CSET User Manual

81

Contacts Management
Contacts Management is handled within the Assessment Details screen. Find the Assessment
Contacts section underneath Assessment Name, Date, etc. to begin.

Figure: Contacts Management screen

Main Assessor Name
The Main Assessor name field shows the user that created the assessment. They will
always be listed at the top of the Contacts list.

Assessment Contacts List
The Assessment Contacts list shows everyone that has been associated with the
assessment.

Edit Contact Button
Clicking the Edit Contact button makes the contact text field editable, so that changes
can be made. Click the green arrow icon to commit changes.

Figure. Contacts field in edit mode

CSET User Manual

82

Role Dropdown
The Role dropdown allows the user to choose between "User" and "Administrator" rights
for the contacts associated with their assessment.
Administrators can add and remove contacts to an assessment, and delete
assessments. There must be an Administrator assigned to an assessment at all times.

Email Invite Button
Clicking the Email Invite button will open up an email dialogue, so that users can
customize their message.

Figure. Invitation Email dialogue

CSET User Manual

83

For the individual email invitation CSET will fill in the "To" field with the contact
information with the user in the field next to the icon. The user can customize the email
and hit "Send". After the email has sent the email icon changes to a

.

Delete Contact Button
Clicking the Delete Contact button brings up a confirmation dialogue.

Figure. Contact Deletion dialogue
Selecting "Yes" will remove the contact from the assessment. Selecting "No" will keep
the user associated with the assessment.

Add Contact Button
Selecting the Add Contact button will open a text field to add the new contact's first, last
name, and email, as well as, input their role. Select the
to commit the addition of
the new contact. If the contact has previously been on an assessment with you before
then the fields will auto-populate.

Figure. Contact Auto-populate
Click the user to complete the remaining fields.
When a user is added to an assessment they are sent an email inviting them to that
CSET assessment. If they haven't yet registered for a CSET account they will be sent
an additional email to walk them through the registration process.

CSET User Manual

84

Group Email Invite Button
Clicking the Email Contacts button will open an email dialogue (the same as the
individual email invitation). However, this email will include anyone in the contacts list
that hasn't been sent an email yet. Customize the email (including the contacts receiving
it) then click "Send".
All users that were sent the email will have a

next to their name.

CSET User Manual

85

Sector and Demographic Information Screen
The Sector and Demographics Information screen collects sector and demographic information
about the assessment. Completing these fields allows the CSET tool to help the user identify
the appropriate Standards and questions that will be asked on the assessment. The Figure
below describes the Sector and Demographic Information screen.

Figure: Sector and Demographic Information Screen

Sector Drop Down List
The Sector drop down list contains a list of industry sectors. Users should select the
sector most relevant to their industry.

Industry Drop Down List
The Industry drop down list provides a list of industries relevant to the selected Sector.
Once the user selects a Sector, the Industry drop down list will be populated with
information relevant to the selected sector. Users should select the industry most
relevant to their business.

Asset Gross Value Drop Down List

CSET User Manual

86

The Asset Gross Value drop down allows the user to provide a rough dollar value
estimate of the assets. CSET uses this information when determining the correct
Standard to recommend to the user.

Organization Size Drop Down List

The Organization Size drop down list allows the user to provide a rough estimate of the
size of the organization. Available values are Small, Medium, and Large. CSET uses
this information when determining the correct Standard to recommend to the user.

Next Button
Clicking the Continue button will navigate the user to the Security Assurance Level
(SAL) Selection screen.

CSET User Manual

87

Security Assurance Level (SAL) Selection
The Security Assurance Level or SAL is a measure that determines the level of rigor applied to
the assessment and also determines the number of questions required for the assessment. This
section provides information on the Security Assurance Level or SAL process, the different
types of SALs available in CSET, and the options for selecting the correct SAL for the current
assessment.

Standard SAL Selection
The Standard SAL Selection window allows the user to quickly and easily select the Security
Assurance Level for the assessment. This option is best for advanced users that know the
appropriate SAL or CIA levels for their assessment and don't require assistance to determine
the appropriate SAL. The Figure below shows the Standard SAL Selection screen.

Figure: Standard SAL Selection Screen

Simple SAL button
The Simple SAL button is blue when selected. This indicates that the user is on the
Simple SAL screen.

Overall SAL Selection Buttons

CSET User Manual

88

The Overall SAL Selection buttons allow the user to quickly and easily select the Overall
SAL for the assessment. Simply select the appropriate level and then click the "Next"
button to navigate to the next screen. The selected SAL will be saved and associated
with the assessment.
The default SAL is Low. The available levels include:
•
•
•
•

Low
Moderate
High
Very High

Low, Moderate, and High correspond with the levels identified by NIST in the NIST
SP800-53 Standards, the NIST SP800-60 Volumes 1 and 2 documents, and the
Chemical Facility Anti-Terrorism Standards (CFATS) risk-based tiering structure. Very
High is defined in CSET as comprising all controls including all optional enhancements.
It is used to accommodate the multiple Standards available in CSET.
The levels of potential impact are defined as:

Low: The loss of confidentiality, integrity, or availability could be expected to have a
limited adverse effect on organizational operations, organizational assets, or individuals.

Moderate: The loss of confidentiality, integrity, or availability could be expected to have
a serious adverse effect on organizational operations, organizational assets, or
individuals.

High: The loss of confidentiality, integrity, or availability could be expected to have a
severe or catastrophic adverse effect on organizational operations, organizational
assets, or individuals.

Very High: A level of Very High is not defined in the NIST SP800-53 based Standards.
It is included in CSET to accommodate the multiple Standards available in the tool and
is defined as including all controls and all optional control enhancements.

Confidentiality SAL Selection Buttons

The Confidentiality SAL Selection buttons allow the user to select the appropriate
Confidentiality level if it is known. The overall SAL will be determined based on the
highest level selected between the selected Confidentiality, Integrity, and Availability

CSET User Manual

89

levels.

Integrity SAL Selection Buttons

The Integrity SAL Selection buttons allow the user to select the appropriate Integrity
level if it is known. The overall SAL will be determined based on the highest level
selected between the selected Confidentiality, Integrity, and Availability levels.

Availability SAL Selection Buttons

The Availability SAL Selection buttons allow the user to select the appropriate
Availability level if it is known. The overall SAL will be determined based on the highest
level selected between the selected Confidentiality, Integrity, and Availability levels.

SAL Widget

The SAL Widget is a display only image that indicates to the user how their SAL
selections are affecting the Overall SAL and CIA scores.
Tip: CSET only uses one of the SAL types. The highest SAL rating out of all of them is what the
user's assessment will be based on.

CSET User Manual

90

General SAL Selection
The General SAL Selection screen helps the user to determine the overall SAL for the
assessment by selecting the potential impacts on people and economic factors in the event that
systems are compromised. The General SAL Selection screen is described in the Figure
below.
The General SAL approach is consequence based. To use the screen, simply move the sliders
to align with the total number of people or total dollar amount impacted for each question and
category. Answers should be provided for both onsite and offsite impact.
For example, to determine the numeric value for potential injury, estimate the number of people,
(onsite at the facility or those affected offsite) who could be injured without the need for
hospitalization, should the scenario occur.
Estimate a worst-case number by assuming a full work shift with the addition of any visitors,
contractors, vendors, etc., who may also be onsite. For the offsite estimate, assume peak
occupancy of affected areas. For example, if a business district will be impacted by an event,
then plan the estimate during the primary business hours. Consider all aspects of the scenario
such as chain reactions. An explosion could be followed by a fire that could then close
roadways, or even release toxic materials.
When considering the money-based questions, consider all costs including legal fees, fines,
penalties, replacement costs, compensation, etc.

Figure: General SAL Screen

General SAL Button

CSET User Manual

91

The General SAL button is blue when selected. This indicates that the user is on the
General SAL screen.

Overall SAL Selection Buttons

The Overall SAL Selection buttons allow the user to quickly and easily select the Overall
SAL for the assessment. Simply select the appropriate level and then click the "Next"
button to navigate to the next screen. The selected SAL will be saved and associated
with the assessment.
The default SAL is Low. The available levels include:
•
•
•
•

Low
Moderate
High
Very High

Low, Moderate, and High correspond with the levels identified by NIST in the NIST
SP800-53 Standards, the NIST SP800-60 Volumes 1 and 2 documents, and the
Chemical Facility Anti-Terrorism Standards (CFATS) risk-based tiering structure. Very
High is defined in CSET as comprising all controls including all optional enhancements.
It is used to accommodate the multiple Standards available in CSET.
The levels of potential impact are defined as:

Low: The loss of confidentiality, integrity, or availability could be expected to have a
limited adverse effect on organizational operations, organizational assets, or individuals.

Moderate: The loss of confidentiality, integrity, or availability could be expected to have
a serious adverse effect on organizational operations, organizational assets, or
individuals.

High: The loss of confidentiality, integrity, or availability could be expected to have a
severe or catastrophic adverse effect on organizational operations, organizational
assets, or individuals.

Very High: A level of Very High is not defined in the NIST SP800-53 based Standards.
It is included in CSET to accommodate the multiple Standards available in the tool and
is defined as including all controls and all optional control enhancements.

Onsite SAL Slider

CSET User Manual

92

On-Site sliders indicate potential impacts to people or facilities that are on-site.
The user should estimate a worst-case number by assuming a full work shift with the
addition of any visitors, contractors, vendors, etc., who may also be on site. All aspects
of the scenario, such as chain reactions, should be considered. For example, an
explosion could be followed by a fire that could then release toxic materials.

Offsite SAL Slider

Off-Site sliders indicate potential impacts to people or facilities that are off site or in
surrounding communities.
The user should estimate a worst-case number by assuming a maximum number of
people present in the surrounding communities. All aspects of the scenario should be
considered such as chain reactions. For example, an explosion could be followed by a
fire which could then release toxic materials.

SAL Slider Selector
The SAL slider selector is used to indicate the correct value assigned to the question.
The overall SAL is determined based on the values of all SAL slider selectors on the
screen.

Overall SAL Widget

The SAL Widget is a display only image that indicates to the user how their SAL
selections are affecting the Overall SAL.
Tip: CSET only uses one of the SAL types. The highest SAL rating out of all of them is what the
user's assessment will be based on.

CSET User Manual

93

General SAL – Injury
The slider bars provide a general range of values for both human and economic impact. The
range of values is somewhat broad but allows for a uniform way of measuring the various
categories. Review the question and move the slider to the best estimate of the answer.

Onsite
Estimate the number of onsite people who could be injured (without the need for hospitalization)
should the scenario occur.
Estimate a worst-case number by assuming a full work shift with the addition of any visitors,
contractors, vendors, etc., who may also be on site. Consider all aspects of the scenario such
as chain reactions. For example, an explosion could be followed by a fire, which could then
release toxic materials.

Offsite
Estimate the number of offsite people who could be injured (without the need for hospitalization)
should the scenario occur.
Estimate a worst-case number by assuming a maximum number of people present in the
surrounding communities. Consider all aspects of the scenario such as chain reactions. For
example, an explosion could be followed by a fire, which could then release toxic materials.

CSET User Manual

94

General SAL – Hospital
The slider bars provide a general range of values for both human and economic impact. The
range of values is somewhat broad but allows for a uniform way of measuring the various
categories. Review the question and move the slider to the best estimate of the answer.

Onsite
Estimate the number of onsite people who could be injured and require hospitalization should
the scenario occur.
Estimate a worst-case number by assuming a full work shift with the addition of any visitors,
contractors, vendors, etc., who may also be on site. Consider all aspects of the scenario such
as chain reactions. For example, an explosion could be followed by a fire, which could then
release toxic materials.

Offsite
Estimate the number of offsite people who could be injured and require hospitalization should
the scenario occur.
Estimate a worst-case number by assuming a maximum number of people present in the
surrounding communities. Consider all aspects of the scenario such as chain reactions. For
example, an explosion could be followed by a fire, which could then release toxic materials.

CSET User Manual

95

General SAL – Death
The slider bars provide a general range of values for both human and economic impact. The
range of values is somewhat broad but allows for a uniform way of measuring the various
categories. Review the question and move the slider to the best estimate of the answer.

Onsite
Estimate the number of onsite people who could be killed should the scenario occur.
Estimate a worst-case number by assuming a full work shift with the addition of any visitors,
contractors, vendors, etc., who may also be on site. Consider all aspects of the scenario such
as chain reactions. For example, an explosion could be followed by a fire, which could then
release toxic materials.

Offsite
Estimate the number of offsite people who could be killed should the scenario occur.
Estimate a worst-case number by assuming a maximum number of people present in the
surrounding communities. Consider all aspects of the scenario such as chain reactions. For
example, an explosion could be followed by a fire, which could then release toxic materials.

CSET User Manual

96

General SAL – Capital Assets
The slider bars provide a general range of values for both human and economic impact. The
range of values is somewhat broad but allows for a uniform way of measuring the various
categories. Review the question and move the slider to the best estimate of the answer.

Onsite
Capital Assets are tangible property owned or used by the organization including buildings,
structures, trailers, vehicles, machinery, utilities, office equipment, fixtures, furniture, and land.
Calculate the costs by multiplying the replacement cost of the asset by the estimated damage in
percent.

Offsite
Capital Assets are tangible property used by the surrounding communities such as buildings,
structures, vehicles, transit systems, roads, bridges, machinery, utilities, livestock, agricultural
products, home and business equipment, fixtures, furniture, and land.
Calculate the costs by multiplying the replacement cost of the property by the estimated
damage in percent.

CSET User Manual

97

General SAL – Economic Impact
The slider bars provide a general range of values for both human and economic impact. The
range of values is somewhat broad but allows for a uniform way of measuring the various
categories. Review the question and move the slider to the best estimate of the answer.

Onsite
Economic impact includes costs because of loss of production, damage or loss of product or
feed stock, damage or loss of control system logic (damage to the physical system components
should be counted under capital assets), damage or loss of data, costs of lawsuits, etc.
To estimate the cost of production loss, divide the annual budget by 365 (to calculate the daily
budget) then multiply by the estimated down time in days. Include an estimate of displacement
costs. That is, the estimated cost of working from an alternate, temporary location such as using
a rented trailer for administrative functions. The cost of lawsuits with the associated loss of
reputation is difficult to estimate. Look to history for the occurrence of similar scenarios for an
indication of economic impact.

Offsite
Economic impact includes costs because of the communities' loss of supplies and services
(food, power, water, medical services, etc.), loss of access to jobs, cost of emergency response
actions, damage or destruction of agricultural land, etc.
Include an estimate of displacement costs for hospitals, schools, churches, and homes. The
cost of lawsuits with the associated loss of reputation is difficult to estimate. Look to history for
the occurrence of similar scenarios for an indication of economic impact.

CSET User Manual

98

General SAL – Environmental Cleanup
The slider bars provide a general range of values for both human and economic impact. The
range of values is somewhat broad but allows for a uniform way of measuring the various
categories. Review the question and move the slider to the best estimate of the answer.

Onsite
Estimate costs for direct and contract labor for cleanup and remediation, equipment, rentals,
materials, waste disposal, permitting fees, investigation support, and fines.
Costs should be estimated for onsite impacts.

Offsite
Estimate costs for direct and contract labor for cleanup and remediation of surrounding
communities, equipment, rentals, materials, waste disposal, permitting fees, investigation
support, and fines.
Costs should be estimated for the impacts to (offsite) communities.

CSET User Manual

99

General SAL Considerations
The information here provides additional guidance for users in determining their General
Security Assurance Level (SAL).

Characterize Assets
This step identifies assets that, if compromised, have the potential to cause undesirable
consequences. In addition, assets owned by the organization or in proximity of the
compromised facility that could be open to danger should be identified.
The options and resources in the following list may be used, as appropriate, for determining
assets:
• Assets identified in risk and vulnerability assessments;
• Capacity, operation, management, and maintenance manuals;
• Risk management program manual;
• Hazardous waste operations and emergency response Standards;
• Emergency operations plan, particularly event-escalation criteria;
• Y2K documentation, including asset inventory, criticality determination, contingency plans, etc.;
• Asset inventory and criticality rating in the Computerized Maintenance Management System
(CMMS);
• Inventory list of process control/SCADA hardware, including interfaces;
• Safety incident reports indicating accidents or near misses;
• Area maps showing schools, businesses, residential areas, rivers, or other transport paths;
• Population distributions; and
• Wind and water flow maps.

Define Worst-Case Scenarios
This step helps the assessment team acknowledge and consider the worst-case scenarios.
In defining worst-case scenarios, it is important to realize that many different ways are available
to initiate a compromise of a control system. These include: (1) intentional, directed attacks with
the intent of taking control of the system; (2) undirected attacks, such as viruses or worms, that
can cause the system to malfunction; and (3) accidents that are caused by or result in
inappropriate actions taken by an operator.
The worst-case scenarios should focus on the results, not the method, except as it relates to the
compromise. In most cases, an undirected attack will cause problems, such as denial of service,
which can shut down the control system and possibly prevent corrective action being taken.
Directed attacks can result in an unauthorized person taking control of the system, and then
opening or closing valves to create dangerous mixtures or release of materials to the
environment.
The secondary consequences of a system compromise should also be considered in developing
scenarios. For example, the loss of a power grid supplying power to a large population area

CSET User Manual

100

may cause a domino effect of further power loss to financial centers, businesses, transportation
systems, and heating, cooling for homes, hospitals, schools, etc.
An example of a worst-case scenario might be the intentional and undetected opening of one or
more valves causing the release of a toxic material to the atmosphere. The material could then
be carried over to a nearby community resulting in injuries, fines, and environmental cleanup
costs.

Estimate Consequences
Ask these questions. If the identified scenarios were to occur, what would the consequences be
to the organization including its customers and the surrounding community? How would the
organization be impacted by the following?
• Personal health and safety (injury, loss of life);
• Loss of capital assets;
• Adverse environmental impacts; and
• Adverse economic impacts.
The guidelines in this section are provided to assist in estimating a value for the consequences
of an undesired event. The guidelines are not prescriptive and do not replace current
consequence estimating procedures that the organization may have in place. Each guideline
presented in this section correlates to categories contained in questions to determine the SAL
for both onsite and distributed assets.
Remember, for a worst-case scenario, select worst-case conditions.

Injury and Loss-of-Life Estimate
Estimates for injury and loss of life can be challenging to determine. To estimate the number of
people at risk for each scenario, consider the agents that would cause injury or death, their
impact area, and the method of transport. Also, there may be several different agents for a
single scenario, such as the force of an explosion, a subsequent fire, and the release of toxic
materials.
The tool divides affected persons into two groups: personnel that are onsite and people that are
outside the facility boundaries (i.e., people in the surrounding communities). Start by counting
the number of people most likely to be onsite or in the area of the distributed asset, and then
estimate the number of people outside the facility boundaries that could be affected. Different
times of the day or different environmental conditions could exacerbate the situation.
The tool also breaks injuries into two categories: injuries that do not require hospital stay and
injuries that do require hospital stay. For example, minor exposures to contaminates that can be
treated with an eyewash or shower are not as serious as those requiring hospitalization
because of a more serious exposure.

Capital Asset Loss Estimate

CSET User Manual

101

Capital assets are tangible property used by the organization or community such as buildings,
machinery, fixtures, furniture, and equipment.
To estimate the organizational capital asset loss, perform the following steps:
• Determine the total estimated value of each potentially impacted site or distributed asset for
each example scenario. The following is a typical list of asset types to consider:
• Buildings, including all structures that serve as buildings such as permanently
established trailers.
• Machinery and equipment, including all motor vehicles (licensed and nonlicensed),
trailers, construction and maintenance equipment, fixtures, computers, and office
furniture.
• Estimated structure losses (structure replacement value multiplied by the estimated damage in
percent). For example, if a plant’s structure replacement value equals $100,000, and the
expected damage is 40 percent of the structure, then the loss to this structure is $40,000.
• Estimated content losses (content replacement value multiplied by the estimated damage in
percent). For example, if the plant’s content replacement value equals $225,000, and the
expected damage is 10 percent of the contents, then the losses to these contents are $22,500.
• Structure and content loss are calculated as
For each asset,
Structure loss ($) = (structure replacement value($)) × (% damage)
Contents loss ($) = (contents replacement value ($)) × (% damage)
To estimate the community capital asset loss,
• Estimate the value of capital assets that are within the impact area of the scenario and the
estimated extent of damage to these capital assets. The same process described for
determining organizational assets can be used for determining community assets.

Environmental Impacts
Impacts to the environment can be wide ranging and have far-reaching consequences. These
consequences may include cleanup, as a minimum, remediation, and investigations with fines
from regulatory agencies. Calculate the environmental consequence by estimating costs for the
following:
• Direct labor (for cleanup, remediation, etc.);
• Contractor (for cleanup, remediation, etc.);
• Equipment;
• Rented equipment;
• Materials;
• Fees for permits;
• Community mitigation efforts (e.g., portable toilets);
• Investigation support;
• Fines; and
• Material disposal.

CSET User Manual

102

Economic Impact
The economic impact because of a worst-case scenario may include costs associated with loss
of production, impact to reputation, damage or loss of finished product or feed stock, damage to
or loss of the control system because of cyber damage requiring reprogramming of machines or
rewriting of code, damage to the physical control hardware would be included under capital
equipment, corrective action to prevent similar intrusions in the future, possible law suits, etc.
Losses associated with production are much easier to estimate than some other impacts.
Production losses can be estimated using the following recommendations:
• Determine functional downtime or the time (in days) that the function would be disrupted
because of the event.
• Estimate the average number of days various functions might be unavailable following a
worst-case scenario occurrence.
• Estimate the daily cost of the functional downtime. Divide the average annual budget by 365 to
determine the average daily operating budget or sales. Multiply the average daily operating
budget by the functional downtime to determine the cost of the loss of function for the period
that the service was unable to operate because of the event. For example, if a plant has an
annual budget of $6,000,000 and an average daily budget of $16,438 ($6,000,000/365), the
losses could be estimated by using the annual budget as a proxy for the value of the service to
the community. For example, if the plant were down for 7 days, then the cost for the loss of use
for 7 days would be $115,066 ($16,438×7).
• Determine the displacement time, or the time in days, that a function may need to operate from
a temporary location, if applicable. For example, if the administration building is inaccessible for
7 days (functional downtime) and operations are resumed from a trailer for the next 90 days,
then the displacement time would be 90 days. Not all functions would require displacement
before resuming operation.
• Multiply the displacement cost by the displacement time to determine the cost of the
displacement from the regular place of business, as:
For each asset, structure use and function loss =
(average daily operating budget ($)) × (functional downtime (# of days)) +
(displacement cost per day ($)) × (displacement time (# of days))
Loss of finished product and feed stock can be estimated by using historical accounts of the
amount of product kept onsite at any time. This may be either a maximum (worst case) or an
average amount. The cost of the feed stock would be the replacement cost. If not having the
feed stock on hand impacts the ability to restart the system, this would also affect loss of
production. The loss of finished product would be the cost of producing the lost amount of the
finished product. This could be determined by using production history as well.
The cost of cyber damage to the control system must be estimated based on what is most likely
to be affected according to the scenario. The scenario may require the control system software
to be rebuilt or the control code to be reworked, or it may require that an antivirus program be
run on the system. The cost of this effort needs to be estimated. It may also require
investigation of what caused the problem and the costs of reworking the system in order to
implement a fix.
The economic impact because of loss of reputation or lawsuits is much harder to estimate.

CSET User Manual

103

History of similar incidents either within the organization or within similar organizations might
provide an indication of the potential economic impact.

EVALUATE TOTAL IMPACT
After evaluating each of the consequences and their costs, determine if areas are either
counted twice or might mitigate or enhance the impact of the individual consequences. These
may need to be adjusted. With these final figures, answer the questions for determining the
SAL.

CSET User Manual

104

FIPS 199 SAL Selection
After clicking the FIPS 199 SAL Determination link on the top pill navigation of the SAL screen,
the display will change to that shown in the Figure below. This Instructions page provides links
to a guide and the source documents.
The process is based on the Federal Information Processing Standards (FIPS) Publication 199,
Standards for Security Categorization of Federal Information and Information Systems and the
National Institute of Standards and Technology (NIST) Special Publication (SP) 800-60, Guide
for Mapping Types of Information and Information Systems to Security Categories. These
Standards apply to information within the US federal government and federal information
systems.

Figure: FIPS 199 SAL Screen

Select Information Types: After selecting your SAL levels, the next step is to check all
applicable information types.

CSET User Manual

105

Figure: Selected Information Types Tab
When an information type is selected in the list on the left of the screen, CSET displays that
type with the values in the block on the right and at the same time dynamically updates the
combined values in the block on the top, including the overall SAL.
No specific definition is given for each information type in CSET. To understand how the types
are broken out the guidance documents discussed above must be opened.

Answer Questions: The next step in determining the SAL using the FIPS 199 method is to
answer a short set of questions that may adjust the level in one or more of the categories.
Figure # shows the screen when the Answer Questions tab has been clicked.

CSET User Manual

106

Figure: Answer Questions
After the Answer Questions section is opened, CSET will display a set of eight questions that
were taken from the NIST documents. The answers to these questions may cause the SAL
values to be changed. As the user marks either Yes or No to the question, CSET will
dynamically update the Adjusted for System Questions fields at the top of the screen. The SAL
will affect how many questions must be answered in both the Questions and Standard
Requirements modes.

Determine Special Factors: The final step is to determine the Special Factors. They come
from NIST SP800-60, Volume II and are exceptions to the provisional impact assignments of
Low, Medium, and High for the selected information type. To add the Special Factors text to the
SAL Values, click the security objective value assignment for that information type. Not all
information types are associated with Special Factors. Those that are associated with Special
Factors have a blue text color (Seen in Figure Checkboxes). Clicking the link will enter that
Special Factors text into the field shown Figure. Determine Special Factors.
For example, selecting Air Transportation results in the Confidentiality value of Low, which is
seen in blue. Clicking the word Low enters the Special Factor text into the block at the bottom of
the screen. This text is fully editable.

CSET User Manual

107

Figure: Determine Special Factors
If another information type is checked and the Special Factor text is entered into the block for
the same security objective, the previous text in the Special Factors text areas will be
overwritten. A warning message, similar to that shown in the Figure below, will be shown to
confirm that the text is to be overwritten. Only one Special Factor may be used for each security
objective.

Figure: Special Factors Overwrite Warning

Overall SAL Widget

The SAL Widget is a display only image that indicates to the user how their SAL
selections are affecting the Overall SAL.

CSET User Manual

108

NIST/FIPS SAL button
The NIST-60/FIPS-199 SAL button is blue when selected. This indicates that the user is
on the NIST/FIPS SAL screen.

Overall SAL Selection buttons

The Overall SAL Selection buttons allow the user to quickly and easily select the Overall
SAL for the assessment. Simply select the appropriate level and then click the "Next"
button to navigate to the next screen. The selected SAL will be saved and associated
with the assessment.
The default SAL is Low. The available levels include:
•
•
•
•

Low
Moderate
High
Very High

Low, Moderate, and High correspond with the levels identified by NIST in the NIST
SP800-53 Standards, the NIST SP800-60 Volumes 1 and 2 documents, and the
Chemical Facility Anti-Terrorism Standards (CFATS) risk-based tiering structure. Very
High is defined in CSET as comprising all controls including all optional enhancements.
It is used to accommodate the multiple Standards available in CSET.
The levels of potential impact are defined as:

Low: The loss of confidentiality, integrity, or availability could be expected to have a
limited adverse effect on organizational operations, organizational assets, or individuals.

Moderate: The loss of confidentiality, integrity, or availability could be expected to have
a serious adverse effect on organizational operations, organizational assets, or
individuals.

High: The loss of confidentiality, integrity, or availability could be expected to have a
severe or catastrophic adverse effect on organizational operations, organizational
assets, or individuals.

Very High: A level of Very High is not defined in the NIST SP800-53 based Standards.
It is included in CSET to accommodate the multiple Standards available in the tool and
is defined as including all controls and all optional control enhancements.

CSET User Manual

109

Confidentiality SAL Selection button

The Confidentiality SAL Selection buttons allow the user to select the appropriate
Confidentiality level if it is known. The overall SAL will be determined based on the
highest level selected between the selected Confidentiality, Integrity, and Availability
levels.

Integrity SAL Selection button

The Integrity SAL Selection buttons allow the user to select the appropriate Integrity
level if it is known. The overall SAL will be determined based on the highest level
selected between the selected Confidentiality, Integrity, and Availability levels.

Availability SAL Selection button

The Availability SAL Selection buttons allow the user to select the appropriate
Availability level if it is known. The overall SAL will be determined based on the highest
level selected between the selected Confidentiality, Integrity, and Availability levels.
Tip: CSET only uses one of the SAL types. The highest SAL rating out of all of them is what the
user's assessment will be based on.

CSET User Manual

110

Cybersecurity Standard Selection
This section provides information on understanding the Standards and requirements available in
CSET. The Figure below describes the Cybersecurity Standard Selection screen.
CSET Standards are defined on the CSET Standards and Groupings page.

Figure: Cybersecurity Standard Selection Screen

Basic Mode Option
Selecting the Basic Mode Option will cause the CSET tool to build the assessment questions based on the
sector, demographic and other information selected during the preparation process. A knowledge of
cybersecurity Standards is not required for the Basic Mode option.

Standards List

CSET User Manual

111

The Standards List displays a list of all available Standards on which the assessment
questions may be based. Some standards will be recommended based on demographic
information indicated by the user (shown in bold). Some Standards are only available in
"Requirements Mode" and may be disabled based on the assessment mode previously
selected. Standards are organized into Groups and can be sorted accordingly. Each
Standard also has details or descriptions to help the user better identify the Standard.
Any Custom Questionnaires associated with the installation of CSET will also be
available on the Standard List.
This is where the unlocked Standards from Enable Protected Features will be shown.

Standard Details Toggle Button
The Standard Details toggle button will toggle between showing and hiding descriptions
of the selected Standard to help the user better understand what the Standards contain.

Standard Group Text
The Standard Group text shows the group to which a specific Standard belongs. The
Standard List is sorted by the Group to help the user more easily find specific Standards
within a group.

Number of Questions Text

CSET User Manual

112

The Number of Questions Text will update as Standards are selected and provides an
indication to the user how large the assessment will be.

Number of Requirements Text

The Number of Requirements Text will update as Standards are selected and provides
an indication to the user how large the assessment will be.

CSET User Manual

113

CSET Standards and Groupings
This page describes the Cybersecurity Standards used by the CSET tool. Standards are
grouped into multiple areas as explained below.

Chemical, Oil, and Natural Gas
Critical Security Controls Version 6: The Center for Internet Security (CIS)
presents the CIS Controls for Effective Cyber Defense Version 6.0, a recommended set of
actions that provide specific and actionable ways to stop today's most pervasive and dangerous
cyber attacks. The CIS Controls are especially relevant because they are updated by cyber
experts based on actual attack data pulled from a variety of public and private threat sources.
Version 6 incorporates recommended changes from the cybersecurity community to reflect the
latest technologies and threats. The new Controls include a new Control for "Email and Web
Browser Protections," a deleted Control on "Secure Network Engineering," and a re-ordering to
make "Controlled Use of Administration Privileges" higher in priority. This version also includes
a new metrics companion guide.

CFATS Risk-Based Performance Standards Guide 8–Cyber: This
Standards guidance is part of the overall efforts defined in 6 Code of Federal Regulations (CFR)
Part 27 to protect chemical facilities from the effects of a terrorist attack. CFATS, or the
Chemical Facilities Anti-Terrorism Standards, is made up of 18 Risk-Based Performance
Standards Guidance (RBPS) sections that provide guidance on protecting various aspects of a
chemical facility. RBPS 8 is focused on cybersecurity with emphasis on protecting both
information management and control system-based networks. It is the only RBPS that is
pertinent to the CSET.
The audience for this instruction is personnel involved in the chemical industry who are required
to comply with the 6 CFR Part 27 as well as others seeking to follow these simple actions to
better protect their systems.
DHS has developed a risk-based tiering structure that will allow it to focus resources on the
high-risk chemical facilities. To that end, DHS will assign facilities to one of four risk-based tiers
ranging from very high (Tier 1) to low (Tier 4) risk. These tiers are unrelated to the Framework
tiers.

INGAA Control Systems Cyber Security Guidelines for the Gas
Pipeline Industry: The Interstate Natural Gas Association of America (INGAA) is a trade
organization for the natural gas pipeline industry in North America. As such, its Standard applies
to the gas pipeline industry. The guidelines can be thought of as a subset of the Transportation
Security Administration (TSA) Pipeline Security Guidelines and focus on securing large
supervisory control and data acquisition (SCADA) systems and smaller, local control systems.
The intended audience is administrators, network security personnel, SCADA software
manufacturers, operators, vendors, and other stake holders involved in the natural gas pipeline
industry. Because INGAA is a non-government body, a disclaimer will be seen upon selection of
this Standard.

CSET User Manual

114

TSA Pipeline Security Guidelines, April 2011: This Transportation Security
Administration (TSA) document provides a set of short guidelines for protecting and securing
the transportation of various liquids through transmission pipelines. It includes cybersecurity
guidelines in addition to other security measures including physical protection, personnel
security, equipment maintenance and testing, etc. These guidelines are applicable to natural
gas and hazardous liquid transmission pipelines, natural gas distribution pipelines, and to
liquefied natural gas facility operators. In addition, these guidelines apply to pipeline systems
that transport material categorized as toxic inhalation hazards (TIHs).

DODI and CNSSI:
CNSSI No. 1253 Baseline, V2 March 27, 2014: This update was released in
March of 2014 and supersedes the older CNSSI No. 1253 Baseline listed earlier. The intent and
purpose of the Standard is the same as described above. Use this version for new
assessments.

DoD Instruction 8500.2: This DoD Instruction, Information Assurance (IA)
Implementation, implements policy, assigns responsibilities, and prescribes procedures for
applying integrated, layered protection to DoD information systems and networks. It is
applicable to information resources organized for the collection, storage, processing,
maintenance, use, sharing, dissemination, disposition, display, or transmission of U.S.
military-related information. It is predicated on five competencies, the ability to: (1) assess
security needs and capabilities, (2) develop a purposeful security design or configuration, (3)
implement required controls or safeguards, (4) test and verify, and (5) manage changes to an
established baseline in a secure manner. The audience for this instruction is personnel who use
IT to share DoD information across the Global Information Grid.

DoD Instruction 8510.01: Risk Management Framework (RMF) for DoD IT applies to all
DoD IT that receives, processes, stores, displays, or transmits DoD information. The instruction
implements NIST SP 800-37 and re-designates the DIACAP Technical Advisory Group (TAG)
as the RMF TAG. The instruction also provides procedural guidance for the reciprocal
acceptance of authorization decisions and artifacts within DoD, and between DoD and other
federal agencies, for the authorization and connection of information systems. It uses controls
from CNSSI 1253 V2 plus NIST SP800-53 Appendix J.

Electrical:
NERC CIP-002 through CIP-009, Rev. 3: The North American Electric Reliability
Council (NERC) Critical Infrastructure Protection (CIP) Standards apply to the electric power
industry. Standards CIP-002 through CIP-009 provide a cybersecurity framework (unrelated to
the cybersecurity framework based Assessment Mode option) for the identification and
protection of critical cyber assets to support reliable operation of the bulk electric system.
Standard CIP-002-3 requires the identification and documentation of the critical cyber assets.
Standard CIP-003-3 requires that responsible entities have minimum security management

CSET User Manual

115

controls in place to protect critical cyber assets. Standard CIP-004-3 requires that personnel
having authorized cyber or authorized unescorted physical access to critical cyber assets,
including contractors and service vendors, have an appropriate level of personnel risk
assessment, training, and security awareness. Standard CIP-005-3 requires the identification
and protection of the electronic security perimeters. Standard CIP-006-3 is intended to ensure
the implementation of a physical security program. Standard CIP-007-3 requires responsible
entities to define methods, processes, and procedures for securing those systems determined
to be critical cyber assets. Standard CIP-008-3 ensures the identification, classification,
response, and reporting of cybersecurity incidents; and Standard CIP-009-3 ensures that
recovery plans are put in place.
The NERC CIP Standards are designed specifically for the needs of the electric power sector.

NERC CIP-002 through CIP-009, Rev. 4: Revision 4 of the CIP Standards has the
same aims and audience as Revision 3. This version includes all the requirements that have
been added or modified for Revision 4.

NERC CIP-002 through CIP-011, Rev. 5: Revision 5 of the CIP Standards has the
same aims and audience as Versions 3 and 4. It does, however, include two additional sections.
CIP-010 deals with configuration change management and vulnerability assessments. CIP-011
is concerned with information protection. This version includes all the requirements that have
been added or modified for Revision 5.

CSET User Manual

116

NERC CIP-002 through CIP-011, Rev. 6: NERC CIP v6 is largely about scope, and
so its impact will be dependent on how the scope expansion affects your organization. The
expansion of requirements to low impact assets has zero impact if you don’t have any. The
same goes for the transient assets and removable media. While there aren’t many organizations
in that situation, scope reduction is absolutely a valid strategy for any compliance program,
NERC CIP compliance included. While it may seem obvious to state, don’t wait to determine
how you’re going to address the updated NERC CIP standards. If there’s the potential for
budgetary impact (and there is), the sooner you start planning, the better.

NISTIR 7628 Guidelines for Smart Grid Cyber Security, Vol 1: Dealing with
Standards for the national electrical transmission systems and applicable to the electric sector,
this National Institute of Standards and Technology (NIST) Interagency Report (IR) presents a
framework that organizations can use to develop cybersecurity strategies to secure existing
systems while upgrading to newer, smart grid technology. NISTIR includes identification of
security requirements, risk assessment processes, and high-level architecture. It presents a
sample logical interface reference model used to identify and define 22 logical interface
categories within and across seven commonly accepted Smart Grid domains. The intended
audience is individuals and organizations responsible for addressing cybersecurity for Smart
Grid systems and the constituent subsystems of hardware and software components.

NISTIR 7628 Guidelines for Smart Grid Cyber Security, Vol 1 Rev. 1:
Revision 1 of the NISTIR 7628 Guideline has the same aims and audience as the earlier
version, but with updated information on Smart Grid technologies and implementations.

General:
Catalog of Recommendations, Rev. 7: The Catalog of Recommendations or CoR
questionnaires are based on the Catalog of Control Systems Security, Recommendations for
Standards Developers. Development was initially sponsored by DHS with input from NIST and
five national laboratories. Its original intent was to serve as a source of requirements and
controls for the developers of ICS Standards. The CoR consolidated the requirements from 15
control system and information technology Standards. Version 7 is the latest version and
incorporates changes and updates made in 2010.
The controls in the CoR are organized into families based on NIST SP800-53 with contributions
from AGA, ISO, IEC, IEEE, ISA, NERC, and other Standards documents. Requirements for
each security control include: (1) detailed recommended security practices and mechanisms, (2)
supplemental guidance with information that may be beneficial for understanding and
implementing the recommendations, and (3) requirement enhancements including
supplementary security constraints for the recommendations.
The CoR is not limited for use by a specific industry sector. It is intended to be broad enough to
provide any industry using control systems the flexibility needed to develop sound cybersecurity
Standards specific to their individual security needs. Its use is strongly recommended if using
the Standards-based approach.

Control Correlation Identifier Specification V2 release 0.1: One of the more
recent information security innovations is the Control Correlation Identifier, or CCI. Each CCI

CSET User Manual

117

provides a standard identifier and description for “singular, actionable statements” that comprise
a security control or security best practice. The purpose of CCIs is to allow a high level
statement made in a policy document (i.e., a security control) to be “decomposed” and explicitly
associated with the low-level security settings that must be assessed to determine compliance
with the objectives of that specific statement. Under the leadership of the Defense Information
Systems Agency (DISA), a working group has been cataloging CCIs for the past several years.
The collection has now been developed to the point that every assessment objective in the
NIST SP 800-53A has been mapped to an individual CCI. The current list of CCIs can be
downloaded in XML format (viewable in a web browser such as Internet Explorer). The URL for
downloading is: http://iase.disa.mil/stigs/cci/Pages/index.aspx. DISA encourages feedback from
the information security community; a comment form is provided for that purpose. DISA is also
in the process of revising numerous Security Technical Implementation Guides (STIGs) to
include references to CCIs that correspond to each of the recommended configuration settings.

Cybersecurity Capability Maturity Model (C2M2): The C2M2 is designed to be
used by any organization to enhance its own cybersecurity capabilities. It focuses on the
implementation and management of cybersecurity practices associated with the operation and
use of information technology and operational technology assets and the environments in which
they operate. The goal is to measure the maturity of an organization’s cybersecurity capabilities
and support ongoing development within an organization. To do so, it uses a system of Maturity
Indicator Levels (MILs) applied to each of ten key domains such as Risk Management and
Configuration Management.
MIL 0 is the lowest of the maturity models and is defined as Incomplete. Many organizations can
achieve MIL 0 using an ad hoc approach. MIL 1 is Initiated, MIL 2 is Performed, and MIL 3, the
highest maturity level, is Managed.
Also available are sector-specific C2M2s for Electricity, and Oil and Natural Gas that include the
core C2M2 as well as additional reference material and implementation guidance specifically
tailored for the referenced sector.

NIST Special Publication 800-171:This publication provides federal agencies with
recommended requirements for protecting the confidentiality of Controlled Unclassified
Information (CUI): (i) when the CUI is resident in nonfederal information systems and
organizations; (ii) when the information systems where the CUI resides are not used or operated
by contractors of federal agencies or other organizations on behalf of those agencies; and (iii)
where there are no specific safeguarding requirements for protecting the confidentiality of CUI
prescribed by the authorizing law, regulation, or government-wide policy for the CUI category or
subcategory listed in the CUI Registry. The requirements apply to all components of nonfederal
information systems and organizations that process, store, or transmit CUI, or provide security
protection for such components.

NIST Special Publication 800-171 Rev. 1: The protection of Controlled
Unclassified Information (CUI) resident in nonfederal systems and organizations is of paramount
importance to federal agencies and can directly impact the ability of the federal government to
successfully conduct its assigned missions and business operations. This publication provides
federal agencies with a set of recommended security requirements for protecting the
confidentiality of CUI when such information is resident in nonfederal systems and
organizations; when the nonfederal organization is not collecting or maintaining information on
behalf of a federal agency or using or operating a system on behalf of an agency; and where

CSET User Manual

118

there are no specific safeguarding requirements for protecting the confidentiality of CUI
prescribed by the authorizing law, regulation, or governmentwide policy for the CUI category or
subcategory listed in the CUI Registry. The security requirements apply to all components of
nonfederal systems and organizations that process, store, or transmit CUI, or that provide
security protection for such components. The requirements are intended for use by federal
agencies in contractual vehicles or other agreements established between those agencies and
nonfederal organizations.

Payment Card Industry (PCI) Data Security Standard:The Payment Card
Industry Data Security Standard (PCI DSS) was developed to encourage and enhance
cardholder data security and facilitate the broad adoption of consistent data security measures
globally. PCI DSS provides a baseline of technical and operational requirements designed to
protect account data. PCI DSS applies to all entities involved in payment card
processing—including merchants, processors, acquirers, issuers, and service providers. PCI
DSS also applies to all other entities that store, process or transmit cardholder data (CHD)
and/or sensitive authentication data (SAD).

Health Care
Health Insurance Portability and Accountability Act Security Rule:

The
Health Insurance Portability and Accountability Act of 1996 (HIPAA; Pub.L. 104–191, 110 Stat.
1936, enacted August 21, 1996) was enacted by the United States Congress and signed by
President Bill Clinton in 1996. It has been known as the Kennedy–Kassebaum Act or
Kassebaum–Kennedy Act after two of its leading sponsors.[1][2] Title I of HIPAA protects health
insurance coverage for workers and their families when they change or lose their jobs. Title II of
HIPAA, known as the Administrative Simplification (AS) provisions, requires the establishment
of national standards for electronic health care transactions and national identifiers for
providers, health insurance plans, and employers. Technical Safeguards – controlling access to
computer systems and enabling covered entities to protect communications containing PHI
transmitted electronically over open networks from being intercepted by anyone other than the
intended recipient. Information systems housing PHI must be protected from intrusion. When
information flows over open networks, some form of encryption must be used. If closed systems
or networks are used, existing access controls are considered sufficient and encryption is
optional. Each covered entity is responsible for ensuring that the data within its systems have
not been changed or erased in an unauthorized manner. Data corroboration, including the use
of check sum, double-keying, message authentication, and digital signature may be used to
ensure data integrity. Covered entities must also authenticate entities with which they
communicate. Authentication consists of corroborating that an entity is who it claims to be.
Examples of corroboration include: password systems, two or three-way handshakes, telephone
callback, and token systems. Covered entities must make documentation of their HIPAA
practices available to the government to determine compliance. In addition to policies and
procedures and access records, information technology documentation should also include a
written record of all configuration settings on the components of the network because these
components are complex, configurable, and always changing. Documented risk analysis and
risk management programs are required. Covered entities must carefully consider the risks of
their operations as they implement systems to comply with the act. (The requirement of risk
analysis and risk management implies that the act’s security requirements are a minimum
standard and places responsibility on covered entities to take all reasonable precautions
necessary to prevent PHI from being used for non health purposes.)

CSET User Manual

119

Information Technology:
The National Institute of Standards and Technology (NIST), Special Publication (SP) 800-53,
Recommended Security Controls for Federal Information Systems and Organizations, is the
primary U.S. government Standard for securing information systems. Because many non
federal entities have adopted its use, it is probably the most widely used Standard for IT system
security.

NIST Special Publication 800-53, Rev. 3: The NIST SP800-53 provides guidelines
for selecting and specifying security controls for information systems supporting the executive
agencies of the U.S. federal government. The guidelines apply to all components of an
information system that process, store, or transmit federal information. Information system
components can include mainframes, servers, workstations, operating systems, and
applications. Network components can include firewalls, switches, routers, wireless access
points, and network appliances. Servers can include database servers, authentication servers,
electronic mail and web servers, proxy servers, and domain name servers. Information system
components may be purchased commercially off-the-shelf or custom developed.
Although developed for the federal government, other organizations are encouraged to use the
guidelines. In CSET, this version of the Standard does not include the adjustments addressed in
Appendix I. See NIST SP800-53, Rev. 3 with Appendix I for those modified controls.

NIST Special Publication 800-53, Rev. 4: Revision 4 has the same audience and
intended use as Revision 3; however, it includes updates, additions, and changes to make it
more current and relevant. In CSET, Appendix I is separate.

NIST Special Publication 800-53, Rev. 4 App J: Appendix J of 800-53, Rev. 4, is
titled the Privacy Control Catalog. It relates specifically to protection of individuals' privacy and
their personally identifiable information (PII). The appendix provides a structured set of controls
for protecting privacy and serves as a roadmap for organizations to use in identifying and
implementing privacy controls concerning the entire life cycle of PII.

Supply Chain:
Framework for Improving Critical Infrastructure Cybersecurity 1.1: The
Framework focuses on using business drivers to guide cybersecurity activities and considering
cybersecurity risks as part of the organization’s risk management processes. The Framework
consists of three parts: the Framework Core, the Implementation Tiers, and the Framework
Profiles. The Framework Core is a set of cybersecurity activities, outcomes, and informative
references that are common across sectors and critical infrastructure. Elements of the Core
provide detailed guidance for developing individual organizational Profiles. Through use of
Profiles, the Framework will help an organization to align and prioritize its cybersecurity
activities with its business/mission requirements, risk tolerances, and resources. The Tiers
provide a mechanism for organizations to view and understand the characteristics of their
approach to managing cybersecurity risk, which will help in prioritizing and achieving
cybersecurity objectives.

CSET User Manual

120

Nuclear:
NEI 08-09 Cyber Security Plan for Nuclear Power Reactors: The Nuclear
Energy Institute (NEI) developed this Standard to assist nuclear energy facilities in meeting
cybersecurity regulations required by 10 CFR 73.54 and the NRC. NEI 08-09 describes a
defensive strategy that consists of a defensive architecture and set of security controls that is
based on NIST SP 800-82 and NIST SP 800-53. Because INGAA is a nongovernment body, a
disclaimer will be seen upon selection of this Standard.

NRC Regulatory Guide 5.71: The Nuclear Regulatory Commission, Regulatory Guide
5.71 (NRC RG 5.71), Cyber Security Programs for Nuclear Facilities, provides a framework to
aid in the identification of those digital assets, referred to as critical digital assets or CDAs,
which must be protected from cyber attacks. The framework offers licensees and applicants the
ability to address the specific needs of an existing or new system. Thus the framework provides
a flexible programmatic approach in which the licensee or applicant can establish, maintain, and
successfully integrate security controls into a site-specific cybersecurity program. The intended
audience is owners and operators of nuclear power plants.

Process Control and SCADA:
NIST Special Publication 800-53, Rev. 3 with App I: Appendix I of the NIST
SP800-53 adds guidance on industrial control system (ICS) security to the control system
guidance already contained in the publication. In this context, an ICS is an information system
used to control industrial processes such as manufacturing, product handling, production, and
distribution. ICSs include supervisory control and data acquisition (SCADA) systems, distributed
control systems (DCSs), and programmable logic controllers (PLCs). The appendix modifies
selected questions and requirements in SP800-53 based on the differences between ICS and
typical information systems.
The information in Appendix I is not as comprehensive as that found in NIST SP800-82, but
may provide useful information on tailoring, security controls, and control enhancements. NIST
guidance was developed for the federal government, but other organizations are encouraged to
use it.

NIST Special Publication 800-82: The NIST Guide to Industrial Control Systems
(ICS) Security publication provides guidance for establishing a secure ICS including SCADA
systems, DCSs, and other systems performing control functions. It identifies typical threats and
vulnerabilities to these systems, provides recommended security countermeasures to mitigate
the associated risks, and includes a list of many different methods and techniques for securing
ICSs.
The scope includes ICSs that are typically used in the electric, water, oil and gas, chemical,
pharmaceutical, pulp and paper, food and beverage, and discrete manufacturing (automotive,
aerospace, and durable goods) industries. This version of SP800-82 is based on the formal
publication of the document in June 2011.

CSET User Manual

121

NIST Special Publication 800-82, Rev. 1: Revision 1 of the NIST SP 800-82
Standard has the same aims and audience as the earlier version. This revision includes the
integration of the ICS material transferred from Special Publication 800-53, Revision 3.

NIST Special Publication 800-82, Rev. 2: Revision 2 of the NIST SP 800-82
Standard has the same aims and audience as the earlier version. This revision includes updates
to ICS threats and vulnerabilities, ICS security, ICS risk management, and security capabilities
and tools for ICS. It also introduces overlays and provides an ICS overlay for NIST SP 800-53,
Revision 4 security controls for tailored security control baselines for Low, Moderate, and High
impact ICS.

Supply Chain
NIST SP800-161 Supply Chain Risk Management: Federal agencies are
concerned about the risks associated with information and communications technology (ICT)
products and services that may contain potentially malicious functionality, are counterfeit, or are
vulnerable due to poor manufacturing and development practices within the ICT supply chain.
These risks are associated with the federal agencies’ decreased visibility into, understanding of,
and control over how the technology that they acquire is developed, integrated and deployed, as
well as the processes, procedures, and practices used to ensure the integrity, security,
resilience, and quality of the products and services. This publication provides guidance to
federal agencies on identifying, assessing, and mitigating ICT supply chain risks at all levels of
their organizations. The publication integrates ICT supply chain risk management (SCRM) into
federal agency risk management activities by applying a multitiered, SCRM-specific approach,
including guidance on assessing supply chain risk and applying mitigation activities.

Transportation
Defining a Security Zone Architecture for Rail Transit and Protecting
Critical Zones: This Recommended Practice is Part-II in a series of documents to be
released. Part-I released in July 2010 addresses the importance of control and communications
security to a transit agency, provides a survey of the various systems that constitute typical
transit control and communication systems, identifies the steps that an agency would follow to
set up a successful program, and establishes the stages in conducting a risk assessment and
managing risk. Part-II presents Defense-In-Depth as a recommended approach for securing rail
communications and control systems, defines security zone classifications, and defines a
minimum set of security controls for the most critical zones, the, SAFETY CRITICAL SECURITY
ZONE (SCSZ) and the FIRE, LIFE-SAFETY SECURITY ZONE (FLSZ). Later parts will cover
recommended practices for less critical zones, the rail vehicles, and provide other guidance for
a transit agency.
The purpose of this Recommended Practice is to share transit agency best practices; set a
minimum requirement for control security within the transit industry; provide a guide of common
security requirements to control and operations systems vendors; adopt voluntary industry
practices in control security in advance and in coordination with government regulation; and
raise awareness of control security concerns and issues in the industry.

CSET User Manual

122

Questions Only:
Key Questions: The Key Questions are a subset of the Catalog of Recommendations and
are limited in scope to what subject matter experts consider to be the top set of requirements.
They are geared toward providing meaningful results in a limited amount of time. They should
be used only when an assessment based on one or more full Standards cannot be completed
within an allotted time. They are intended for any industry using control systems.

Universal Questions: The Universal Questions are based on the Catalog of
Recommendations and include a full range of ICS security questions. The questions are written
as simple, Yes or No questions and are grouped in a set of common security categories. The
Universal Questions are the core set of questions found in CSET and should be included with
any questions based assessment.

CSET User Manual

123

C2M2 Maturity Indicator Levels
The Cybersecurity Capability Maturity Model (C2M2) Standard uses a system of Maturity
Indicator Levels (MILs). They are defined as:
MIL0: Incomplete
MIL1: Initiated
MIL2: Performed
MIL3: Managed.
They correspond to CSET SALs as follows:
• MIL1: Low
• MIL2: Moderate
• MIL3: High
MIL0 is not used.
Figure 59 shows the MIL to SAL link next to the C2M2 Standard name on the Cybersecurity
Standard Selection screen. Clicking this link opens the C2M2 MIL to SAL Conversion window
shown in Figure 60 which shows the MIL to SAL mappings.
When selecting the C2M2 Standard, the user should verify that the selected SAL for the
assessment corresponds to the desired MIL.

Figure 59 C2M2 MIL to SAL link

Figure 60. C2M2 MIL to SAL Conversion Window

CSET User Manual

124

CFATS Tiers
The Chemical Facilities Anti-Terrorism Standards (CFATS) Risk-Based Performance Standards
Guide 8-Cyber uses Tiers rather than Standard Security Assurance Levels (SALs). To map the
CFATS tiers to the SAL options, use the tier designations below.
• Tier I, Very High,
• Tier II, High,
• Tier III, Moderate, and
• Tier IV, Low.
This mapping is reflected on the SAL screen. The CFATS tiers are unrelated to those
associated with the Cybersecurity Framework.
Figure 61 shows the Tier to SAL link next to the CFATS Standard name on the Cybersecurity
Standard Selection screen. Clicking this link opens the CFATS Tier to SAL Conversion window
shown in Figure 62 which shows the Tier to SAL mappings.
When selecting the CFATS Standard, the user should verify that the selected Security
Assurance Level (SAL) for the assessment corresponds to the desired Tier.

Figure 61. CFATS Tier to SAL Link

Figure 62. CFATS Tier to SAL Conversion Window

CSET User Manual

125

Cybersecurity Framework Description
This section provides additional information about the Cybersecurity Framework assessment
mode. This function was added to CSET in response to Executive Order 13636, Improving
Critical Infrastructure Cybersecurity issued on February 12, 2013, which calls for the
development of a voluntary risk-based Cybersecurity Framework. The Framework consists of
three parts: (1) the Framework Core, (2) the Framework Implementation Tiers, and (3) the
Framework Profile.

Framework Core
The Framework Core is a set of cybersecurity activities and references that are common across
critical infrastructure sectors organized around particular outcomes. The Core presents
Standards and best practices in a manner that allows for communication of cybersecurity risk
across the organization from the senior executive level to the implementation/operations level.
The Framework Core consists of five functions - Identify, Protect, Detect, Respond, Recover
that can provide a high-level, strategic view of an organization’s management of cybersecurity
risk.
The functions are described as follows:

Identify. Develop the organizational understanding to manage cybersecurity risk to systems,
assets, data, and capabilities.

Protect. Develop and implement the appropriate safeguards to ensure delivery of critical
infrastructure services.

Detect. Develop and implement the appropriate activities to identify the occurrence of a
cybersecurity event.

Respond. Develop and implement the appropriate activities to take action regarding a
detected cybersecurity event.

Recover. Develop and implement the appropriate activities to maintain plans for resilience
and to restore any capabilities or services that were impaired due to a cybersecurity event.
The Framework Core then identifies underlying key Categories and Subcategories for each of
these functions and matches them with example Informative References such as existing
Standards, guidelines, and practices for each Subcategory. This structure ties the high level
strategic view, outcomes, and Standards-based actions together for a cross-organization view
of cybersecurity activities.
The Framework stems from the principle of common criteria. Common criteria processes are
particularly useful as a driving force for the mutual recognition and adoption of secure IT
products. By using a common criteria framework, users can develop a common understanding
of their security requirements (their protection profile) and communicate these to vendors,
business partners, and sector associations.

CSET User Manual

126

The Functions and Categories are identified as shown in the Figure below.

Figure: Function and Category Identifiers
The Framework Core represents a common set of activities for managing cybersecurity risk. In
other words, it presents what owners and operators of cyber assets should do to secure their
systems. While it is not exhaustive, it is extensible, allowing organizations, sectors, and other
entities to use Subcategories and Informative References that are cost-effective and efficient
and that enable the organizations to manage their cybersecurity risk.
As an example, the recommended activities for Asset Management are shown in the Figure
below The actions listed under Subcategory will, when implemented, increase cybersecurity and
decrease risk. The provided references are the Standards and guidelines from whence the
recommended actions were derived.

CSET User Manual

127

Figure: Framework Core Example

Framework Tiers
Framework Implementation Tiers (Tiers) provide context on how an organization views
cybersecurity risk and the processes in place to manage that risk. The Tier selection process
considers an organization’s current risk management practices, threat environment, legal and
regulatory requirements, business/mission objectives, and organizational constraints. The Tiers
characterize an organization’s practices over a range, from Partial (Tier 1) to Adaptive (Tier 4),
progressing from informal, reactive implementations to approaches that are agile and
risk-informed.

CSET User Manual

128

The Figure below lists the risk categories and tier levels. A tier is applied to each of the risk
categories. The tiers are described below and presented in relation to each category.

Risk Categories

Tiers

Risk Management Process

Tier 1: Partial

Integrated Risk Management Program

Tier 2: Risk Informed

External Participation

Tier 3: Repeatable
Tier 4: Adaptive

Figure: Risk Categories and Tiers

Tier 1: Partial
• Risk Management Process – Organizational cybersecurity risk management practices are
not formalized, and risk is managed in an ad hoc and sometimes reactive manner. Prioritization
of cybersecurity activities may not be directly informed by organizational risk objectives, the
threat environment, or business/mission requirements.
• Integrated Risk Management Program – Awareness of cybersecurity risk is limited at the
organizational level, and an organization-wide approach to managing cybersecurity risk has not
been established. The organization implements cybersecurity risk management on an irregular,
case-by-case basis because of varied experience or information gained from outside sources.
The organization may not have processes that enable cybersecurity information to be shared
within the organization.
• External Participation – An organization may not have the processes in place to participate
in coordination or collaboration with other entities.

Tier 2: Risk Informed
• Risk Management Process – Risk management practices are approved by management
but may not be established as an organization wide policy. Prioritization of cybersecurity
activities is directly informed by organizational risk objectives, the threat environment, or
business/mission requirements.
• Integrated Risk Management Program – There is an awareness of cybersecurity risk at
the organizational level, but an organization-wide approach to managing cybersecurity risk has
not been established. Risk-informed, management-approved processes and procedures are
defined and implemented, and staff has adequate resources to perform their cybersecurity
duties. Cybersecurity information is shared within the organization on an informal basis.

CSET User Manual

129

• External Participation – The organization knows its role in the larger ecosystem, but has
not formalized its capabilities to interact and share information externally.

Tier 3: Repeatable
• Risk Management Process – The organization’s risk management practices are formally
approved and expressed as policy. Organizational cybersecurity practices are regularly updated
based on the application of risk management processes to changes in business/mission
requirements and a changing threat and technology landscape.
• Integrated Risk Management Program – There is an organization-wide approach to
manage cybersecurity risk. Risk-informed policies, processes, and procedures are defined,
implemented as intended, and reviewed. Consistent methods are in place to respond effectively
to changes in risk. Personnel possess the knowledge and skills to perform their appointed roles
and responsibilities.
• External Participation – The organization understands its dependencies and partners and
receives information from these partners that enables collaboration and risk-based management
decisions within the organization in response to events.

Tier 4: Adaptive
• Risk Management Process – The organization adapts its cybersecurity practices based on
lessons learned and predictive indicators derived from previous and current cybersecurity
activities. Through a process of continuous improvement incorporating advanced cybersecurity
technologies and practices, the organization actively adapts to a changing cybersecurity
landscape and responds to evolving and sophisticated threats in a timely manner.
• Integrated Risk Management Program – An organization-wide approach to managing
cybersecurity risk uses risk-informed policies, processes, and procedures to address potential
cybersecurity events. Cybersecurity risk management is part of the organizational culture and
evolves from an awareness of previous activities, information shared by other sources, and
continuous awareness of activities on their systems and networks.
• External Participation – The organization manages risk and actively shares information
with partners to ensure that accurate, current information is being distributed and consumed to
improve cybersecurity before a cybersecurity event occurs.
Successful implementation of the Framework is based on achievement of the outcomes
described in the organization’s Target Profiles and not on Tier determination.

Framework Profiles
The Framework Profile (Profile) is the alignment of the Functions, Categories, and
Subcategories with the business requirements, risk tolerance, and resources of the
organization. A profile enables organizations to establish a roadmap for reducing cybersecurity

CSET User Manual

130

risk that is well aligned with organizational and sector goals, considers legal/regulatory
requirements and industry best practices, and reflects risk management priorities. Given the
complexity of many organizations, they may choose to have multiple profiles, aligned with
particular components and recognizing their individual needs.
Framework Profiles can be used to describe the current state or the desired target state of
specific cybersecurity activities. They support business/mission requirements and aid in the
communication of risk within and between organizations. They can reveal gaps to be addressed
to meet cybersecurity risk management objectives. Profiles can be used to conduct
self-assessments and communicate requirements and results within an organization or between
organizations.

CSET User Manual

131

Framework Implementation Tiers
If Cybersecurity Framework is selected as the assessment mode, the screen will allow for
assignment of the framework tiers. Framework tiers are not related to the CFATS tiers. The
Figure below shows the screen when Cybersecurity Framework-based and the Implementation
Tiers tab are selected.

Figure: Framework Implementation Tiers Screen

Implementation Tier List

CSET User Manual

132

The Implementation Tier list indicates the framework tier level for the selected risk
category. Users should select the tier that most accurately describes their organization.

CSET User Manual

133

Mode Selection
Mode Selection is available at the top of the Questions/Requirements page and allows the user
to determine the general approach they want to take with completing the assessment. The
Figure below describes the Mode Selection screen.

Figure: Mode Selection Screen

Questions
Approach Option
The Questions-based approach will ask simple questions during the assessment. The
questions are determined from requirements based on the selected cybersecurity
standard. All questions are scored in the final results. Most advanced users will select
the Questions-based approach.

Requirements
Approach Option
The Requirements-based approach uses the exact wording of requirements from the
selected Standard as questions and each requirement must be fully met in order to meet
the requirement. This approach is best used by industries that are regulated by a
specific standard.

CSET User Manual

134

Assessment Mode
This section provides additional information on the three available advanced assessment modes
on the Assessment Mode Selection screen of the CSET tool.

Questions-based Approach:
A comprehensive set of questions has been prepared with straightforward language that
encompasses all the topics and requirements found in the major industrial control system (ICS)
and information technology (IT) Standards. Each question is written in such a way that it can be
answered as either Yes or No. (Questions can also be answered by using alternates or not
applicable; however, they do not use multi-part answers.) The full set of questions is filtered and
limited by the Standards selected and by the SAL. The Questions mode is recommended for
most assessments and is set by default.

Requirements-Based Approach:
The Requirements mode was developed primarily for regulated industries such as nuclear or
electrical power. This mode is designed so that the user will see the exact wording of each
requirement in the Standard. The question must be read and answered in its entirety.

Questions-based Approach
If the Questions-based Approach is selected then most of the Standards will be available. Select
the Standard or Standards that apply to the system and industry or sector being evaluated.
If only one Standard is selected, the Key Questions offer a small selection of the top set of
requirements designed for assessments of limited scope or time while the Universal Questions
offer the most comprehensive, general evaluation.
If multiple Standards are selected, the questions will be the superset of all selected Standards. It
is recommended that the Universal Questions be included. The Standards may have some
questions that are so unique that they are not included in the universal set. This means that
selecting both the Universal Questions and a Standard will result in a set of questions that is
potentially greater than the Universal Questions themselves. These situations are described in
detail below.
In the Figure below, three cases are presented. (In 1 and 2, there is no consideration for the
SAL.)

CSET User Manual

135

Figure: Question Sets for Questions Mode

Case 1. In this scenario, only the Universal Questions option has been selected. As shown in
the diagram, all the Universal Questions are displayed.

Case 2. This scenario shows two options. If only Standard A was selected, then only those
questions included in the inner circle would be presented. The Universal Questions outside the
inner circle would not be included in the assessment. The second option shows where both
Standard A and the Universal Questions were selected. Because the Standard is completely
included in the Universal Question set, the resulting assessment questions would look exactly
like Case 1, the Universal Question set.

Case 3. Unlike the example in Case 2, the selected Standard B has extra questions not found
in the Universal Question set. If only Standard B was selected then everything shown in the
ellipse would be displayed in the assessment. If both the Standard and Universal Questions
sets were selected, then the total assessment would be greater than what is included in Case 1
and would include the combination of both the round (Universal) and ellipse (Standard B)
shapes.

Requirements-based Approach
If the Requirements-based Approach is chosen, then the Universal Questions option is disabled.
If multiple Standards are selected, then for each choice a completely different set of
requirements will be displayed. In the Figure below, two cases are presented.

Figure: Requirements Mode

Case 1. In this scenario, a single Standard has been selected, and only the requirements for
Standard A will be presented in the Questions screen.

Case 2. This second scenario shows the selection of multiple Standards. No matter how
many Standards are selected, the tool will display the full set of requirements for each set
regardless of any overlap. Because the wording in the Standard is unique, each requirement will
be given verbatim. In the application, the requirements in the Standards will simply show up on
the question tree in a sequential manner.

CSET User Manual

136

Standards Available in Both Modes
Many Standards are available in both the Questions mode and the Requirements mode. In
Questions mode, statements from the Standard may be split apart to form several questions so
that the user may get partial credit for complying with a portion of the requirement. It also makes
each question shorter, more direct, and easier to understand. In Requirements mode, the
requirement statement is presented as written in the Standard. It may be longer and encompass
several compliance activities. Partial compliance is considered a Fail in this mode.

CSET User Manual

137

Assessment Section
The assessment section is where the user answers questions related to the selected Standards
or Profile and Security Assurance Level. The following sections will describe the Assessment
process in detail.

Assessment Screen
The primary interaction that takes place in CSET happens on the Assessment screen. The
Assessment screen displays sets of questions or requirements for the user to read and answer
based on the selected assessment mode, the actual Standards chosen, the security assurance
level (SAL), and the components used on the diagram tool. The results of the combined
answers to the presented questions will help to provide a good perspective and understanding
of the organization's cybersecurity posture.
Completing the questions portion of the assessment is where most of the time will be spent. The
process of answering questions is not difficult but it can be tedious. It is recommended that the
user plan ahead and recognize that it will take several hours or even days to accurately answer
all the questions. The more time spent understanding the intent of each question and then
discussing it as a team, the more valuable will be the assessment. Take the time to fully
understand the intent of each question then provide the answer that best meets the current
situation. If upgrades are in progress at the time of the assessment, comments can be
associated with the relevant questions to document the activity.
The Assessment screen will display different content based on the selected assessment mode.
For more information about the different content displayed based on the assessment mode, see
the Assessment Modes help section.
The Figure below shows the main sections of the Assessment screen.

Figure: Assessment Screen

CSET User Manual

138

Assessment Header
The assessment header contains controls for managing the questions displayed in the
Question/Requirement Text section.

Main Question Category Text
The green Main Question Category Text displays the high-level categories in which
groups of questions or requirements belong.

Question/Requirement Text
The Question/Requirement Text contains the questions and requirements of the
assessment as well as the answers and supplemental information.
The answers for all questions will be Yes, No, Not Applicable, and Alternative
Response. The process is simple. Read the question in detail and then answer yes if the
question language and intent are met, or no if the question language and intent are not
met. The colors of the answers reflect the answer given. The colors provide a quick
visual reference of how the user is doing in each category.
Yes answers are green, No answers are red, Not Applicable answers are blue, and ALT
answers are light green.
In addition to clicking the answers with the mouse, shortcut keys are available to use
with this screen. The full list of keyboard shortcuts is available in the help section titled
Keyboard Shortcuts.
The Not Applicable is used when the question does not apply to the system or facility. It
should be used with discretion and has the effect of removing the question from
consideration. Any questions marked as Not Applicable will not show up in the online
analysis or reports as a gap or missed answer; nor will they count as a positive answer.
The ALT label stands for Alternate and is used when an alternate or different method is
being used to address the concern in the question. For example, a question may be
asked about whether the servers are located behind locked doors with certain access
restrictions. The facility may not have locked doors, but instead, employ a security guard
at the door to the server room. This different (security guard) approach does not directly
answer the question, but the user may feel like this alternate approach to securing the
room is either equal to or better than locks on the doors. An alternate method is scored
in a positive way similar to a Yes answer.

CSET User Manual

139

If an alternate method is selected, then the user should fill in the description in the
Question Details panel in the text box under the label Alternate Description/Justification.
The Question Details panel is opened when the Details tab is clicked.

CSET User Manual

140

Assessment Modes
The questions on the assessment screen will change based on the assessment mode selected.
Questions are organized into categories and different information is displayed based on the
selected mode. There are three modes of operation that affect the display of questions:
1. Questions Mode,
2. Requirements Mode

Questions Mode
The Assessment Screen in Questions mode displays simple to read questions on the
Assessment screen. Next to the questions is Supplemental Information from the associated
requirement in the related Standard.
The unique characteristics of the Assessment Screen in Questions mode are shown on the
Assessment Screen Questions Mode page.

Requirements Mode
The Assessment Screen in Requirements mode displays the exact wording of the requirement
text in the associated Standard.
The unique characteristics of the Assessment Screen in Requirements mode are shown on the
Assessment Screen Requirements Mode page.

CSET User Manual

141

Assessment Screen Questions Mode
The Figure below displays the Assessment screen in Questions mode. Questions mode is the
recommended assessment mode for most users.

Figure: Assessments Screen in Questions Mode

Questions Mode toggle
The Questions Mode button is blue when selected. This indicates that the user is in the
Questions Mode screen.

Questions Mode: Question Text

Questions Mode questions have been prepared using straightforward language. The
questions encompass all the topics and requirements found in the major ICS and IT
Standards. The questions are generally fairly short compared to their associated
requirements from the underlying Standard. The question text is typically a subset of the
underlying requirement text.

CSET User Manual

142

Assessment Screen Requirements Mode
The Figure below displays the Assessment screen in Requirements mode. Requirements mode
is recommended for regulated industries where the exact wording of the Standard is important.

Figure: Assessment Screen in Requirements Mode

Requirements Mode toggle
The Requirements Mode button is blue when selected. This indicates that the user is in
the Requirements Mode screen.

Requirements Mode Requirement Identifier
Requirements mode displays the Requirement Identifier instead of a question number.

Requirement Text

Requirement Text displays requirements directly from the standard for users to answer.

CSET User Manual

143

Assessment Categories
Question sets are divided into categories depending on the assessment mode, Standards, and
SAL selected. Different categories are displayed in multiple areas on the Questions screen
based on the Assessment mode such as the bread crumb navigation control, the titles above
the questions, and In the Question Details Section.
The Figure below shows some examples of Question Categories in Questions mode.
Requirements mode doesn't display the Sub Category Text.

Figure: Question Categories

Main Category Text

All questions in CSET have been grouped into main categories. The main categories are
high level groupings for questions and are used as high level groupings for improved
navigation and in the assessment results.

Sub Category Text
Sub categories are lower level categories in which questions are grouped. The sub
categories contain fewer questions than the universal categories.

CSET User Manual

144

Standard Specific Text

The Standard Specific text is the category associated with the question in the
requirement text of the associated Standard. The Standard Requirement Category can
be found in associated reference documentation related to each question.

CSET User Manual

145

Question Details, Resources, and Comments
The Question Details, Resources, and Comments contains extra detailed information about the
currently selected question. The user can also add comments, discoveries, and reference
documents to the question or requirement as well as mark the question or requirement for
further review. The Figure below describes the Question Details, Resources and Comments
screen.

Figure: Question Details, Resources, and Comments Screen

Questions/Requirements Toggle
The Question/Requirements toggle allows a user to switch between Question and
Requirements mode.

Collapse/Expand All Buttons
Click the Collapse All button to close all question categories, and the Expand All button
to open all question categories.

Question Filter

CSET User Manual

146

Clicking the Question Filter allows the user to filter the assessment questions by answer,
whether an assessment has comments, discoveries, or has been marked for review.

Auto-load Supplemental Checkbox
Clicking the Auto-load Supplemental checkbox will automatically load supplemental
information as the user scrolls through questions.

View Details Button
The View Details button will show or hide the details for each question.
See the Details Section for more information.

Supplemental Button
Clicking the Supplemental button opens up the supplemental information for the
questions.
See the Supplemental Section for more information.

Comments Button
Clicking the Comments button opens the Comments Section of the Details and
Resources panel allowing the user to enter comments related to the current question or
requirement.
See the Comments Section for more information.

Documents Button
Clicking the Documents button opens the Documents section of the Details and
Resources panel allowing the user to associate related documents to the question or
requirement.
See the Documents Section for more information.

CSET User Manual

147

References Button
Clicking the References button opens the References section of the Details and
Resources panel allowing the user to open Standards that are associated with and
referenced in the assessment question.
See the References Section for more information.

Discoveries Button
Clicking the Discoveries button opens the Discoveries section of the Details and
Resources panel allowing the user to create a discovery record to associate to the
question or requirement.
See the Discoveries Section for more information.

Mark for Review Check Box
The Mark for Review Check Box allows the user to mark a question or requirement for
future review.

Answer Buttons
Click "Yes", "No", "NA", or "Alt" to answer questions.

Question Progress Wheel
The Question Progress Wheel indicates how many questions a user has filled out. The
checkmark means that all questions in the category have been answered.

CSET User Manual

148

Details Section Question Mode
The Question or Requirements Details section will contain different controls and text depending
on the selected assessment mode. The Figure below describes the Details section in Question
Mode.

Figure: Details Section Question Mode Panel

Title Text
The Title text is a textual identifier for the question usually related to the Standard to
which it belongs.

Category Text
The Category text is the Standard category of the question. Questions typically reside in
multiple categories. The Category text here indicates the category in the related
Standard to which that the question belongs.
For more information about question categories, see the Assessment Categories help
section.

Security Assurance Level Text
The Security Assurance Level text is the highest SAL of the question. All questions and
requirements have SAL value assigned to them. The Security Assurance Level text

CSET User Manual

149

indicates the SAL for the question. When users select a SAL and a Standard during the
preparation process, they will get all questions in their selected Standard that have the
same or lower SAL they selected. For example, if users selected a High SAL and the
Key Standard, they will get all questions in Key that are High, Medium, and Low.

Standard Specific Requirement Text
The Standard Specific Requirement text is the requirement text from the Standard
associated with the question. If the user is in the Requirements assessment mode, the
Standard Specific Requirement text will be the same as the question text. Note: There
are also many instances where Standard Specific Requirement text will be the same as
the question text.

CSET User Manual

150

Details Section Requirements Mode
The Question or Requirements Details section will contain different controls and text depending
on the selected assessment mode. The Figure below describes the Details section in
Requirements Mode.

Figure: Details Section Requirement Mode

Questions Related to
This Requirement Text

The main difference between the Question and Requirements modes is that
Requirements Mode has the extra Questions Related to this Requirement text. The
Questions Related to this Requirement text displays all questions identified by the
Requirement.

CSET User Manual

151

Supplemental Section
Questions and Requirements on the Assessment screen will almost always have supplemental
information. The Figure below describes the assessment screen focusing on Supplemental
information.

Figure: Question Supplemental Information

Question Supplemental
Information Text
The supplemental text is a readable explanation and elaboration of the subject found in
the question or requirement. The text is typically taken from the Standard itself. So
questions may exist that do not have supplemental information if they were not included
in the Standard. If a set of questions was taken from a single long requirement, the
supplemental text may be repeated for multiple questions.

CSET User Manual

152

Comments Section
CSET allows the user to add comments to any assessment question or requirement during the
assessment process. The Figure below describes the comment process.

Figure: Assessment Screen Comments Section

Comments Button
The Comments button displays a red dot over the comments icon when the question or
requirement has comments. This allows the user to easily see what questions have
comments when scrolling through the list of questions.

Comments Input Text Box

The Comments text box allows the user to add comments or other textual information
related to a question or requirement. Comments can be added for multiple reasons such
as implementation details, reasons for marking a question for review, answer
justifications, etc.
In some assessments, the Comments input text box is used on rare occasions; in
others, the comments are used to record the verification method of answers. This field
can be a powerful tool to support the quality of the assessment, especially when

CSET User Manual

documents are also attached to support the answer using empirical data.

153

CSET User Manual

154

Documents Section
CSET allows the user to associate documents to any assessment question or requirement
during the assessment process. The Figure below describes the document process.

Figure: Documents Section

Documents Button
The Question Documents button displays a red dot over the Document icon when the
question or requirement has associated documents. This allows the user to easily see
what questions have associated documents when scrolling through the list of questions.

Document List
The Question Document List displays all documents currently associated with the
selected question. It displays the document title and file name as well as the Associated
Questions button, Remove Document button, and Export Document button. The File
Name is the name of the physical file with its file extension.

Remove Document button
The Remove Document button allows the user to remove the association between a
document and a question. If the document isn't associated with another question, it will

CSET User Manual

155

remove the document from the assessment.

Download Document button
The Download Document button allows the user to download a document from the
assessment so it can be reviewed. Clicking the Download Document button will save a
copy of the document file to a specified location.

Question Add Document Button
Clicking the Add Document button will open an "Open File" dialog window allowing the
user to navigate to a document file to associate with the question or requirement. Once
selected, the document will be displayed in the Question Document List below the Add
Document button.

CSET User Manual

156

Questions List
The Question List window shows the name of the referenced document and a list of all
questions associated with that document as seen in the Figure below.

Figure: Questions List Window

CSET User Manual

157

References Section
The References Section contains links to related source and Help documentation as seen in the
Figure below.

Figure: Question Details References Section

References Button
The References button displays all references related to the question/requirement.

Source Documents List

There will always be at least one source document for the selected Standard. If there is
more than one source, then all the sources will be shown in the list of hyperlinks under
the title. If the Universal set was selected, then the source will typically be the DHS
Catalog of Control Systems Security: Recommendation for Standards Developers,
Version 7, often referred to as the Catalog of Recommendations or CoR. If another
Standard was selected, then that Standard document would be the source. In most
cases, the document will open to the section where the requirement is found.

CSET User Manual

158

Discoveries Section
The Discoveries Section of the question details allows the user to associate Discovery
information with a question or requirement. The Figure below shows the Question Details
Discovery Section.

Figure: Details Discoveries Section

Discovery Button
The Discovery button displays a red dot over the Discovery icon when the question or
requirement has associated discoveries. This allows the user to easily see what
questions have discoveries when scrolling through the list of questions.

Add Discovery Button
Clicking the Add Discovery button opens the Discoveries Window that allows the user to
enter all question discovery related information.
For more information about the Discoveries Window, see the Question Discoveries help
section.

CSET User Manual

159

Question Discoveries
The Question Discoveries window allows the user to enter information about a question or
requirement that has a no answer. Any question or requirement that has been answered "No"
could potentially have a discovery record. The discovery records provide information about the
issue, potential impacts of the issue, recommendations for rectifying the issue and potential
vulnerabilities related to the issue. Responsible individuals can also be assigned to discovery
records to be responsible for fixing the problems associated with the discovery record. The
Figure below describes the different parts of the Question Discoveries window.

Figure: Discovery Details Window

Discovery Title Input Text Box

The Discovery Title input text box corresponds to a Title or Name for the Discovery
record to help the user identify it.

Importance Drop Down List

CSET User Manual

160

The Importance drop down list allows the user to assign an importance level to the
discovery record. Valid values are Low, Medium, and High.

Resolution Date Input Text Box

The Resolution Date input text box provides input for entering a date when the issue
should be resolved.

Issue Input Text Box

The Issue input text box allows the user to define a detailed explanation of the issue or
problem related to why the question or requirement was answered "No".

Impacts Input Text Box

The Impacts input text box allows the user to define potential or real impacts that the
issue may or is currently having on systems, assets, and/or procedures.

Recommendations Input Text Box

The Recommendations input text box allows the user to provide recommendations or
steps for resolving the issues or problems defined in the discovery.

Vulnerabilities Input Text Box

CSET User Manual

161

The Vulnerabilities input text box allows the user to identify any known vulnerabilities on
systems or assets related to the discovery.

Individuals Responsible Section

The Individuals Responsible section allows the user to assign individuals to be
responsible for fixing the issues identified in the discovery record. The Contacts check
list will contain a list of all current contacts associated with the assessment. Selecting a
contact will associate an individual to be responsible for the Discovery record.

Close button
The Close button will close the Question Discoveries window.

CSET User Manual

162

Question Filter
Use the Question Filter to limit the Question types you see. The user can filter on answer type
(Yes, No, NA, Alt, Unanswered) or added discoveries, comments, and marked for review.

Figure: Question Filter
The user can select as many filters as they would like to combine, select all, or select none.
A message will appear if there are no results to show, so that the user can change their
selection.

CSET User Manual

Figure: No results visible error message

163

CSET User Manual

164

Results Section
Once Standards and SAL have been selected and the resulting questions have been answered,
it is time to analyze the results of the assessment. Two methods are available to review and
analyze the results. The first uses the online Results screens and the second approach is to
print the reports and review the hardcopy.
The Results section provides a method to measure security posture based on the selected
Standards and the questions answered during the assessment process. The Results section
uses charts and tabular data to provide a visual display of the data and at the same time allows
for comparisons across categories, questions, and subject areas.
The Results sections consists of the Analysis Dashboard and charts, and the Reports. This
section will describe each area.

Analysis Screen
The Analysis screen provides a quick visual view of how well the user is doing related to the
user's cybersecurity posture. The Analysis screen consists of the Analysis Navigation Section,
the Chart Section, and Results Navigation Section.
The Figure below describes the sections of the Analysis screen.

Figure: Analysis Screen

CSET User Manual

165

Analysis Navigation Section

The Analysis Navigation section contains links for accessing the different navigation
screens. Most links are divided into categories where the details can be hidden or
displayed to facilitate working with the many options available.

Overall Score Panel

The Overall score is calculated based on how many questions were answered "Yes" or
"ALT" versus the total number of questions.

Chart Section

CSET User Manual

166

The Chart section is where the charts and tabular data are displayed. Generally, the
user can place the mouse cursor over a chart section to see the value associated with
the section of the chart. Tabular data are also available to view or export on most
screens.

CSET User Manual

167

Dashboard in Questions/Requirements Mode
The Analysis Dashboard in Questions or Requirements mode shows four charts for quick
reference. The charts displayed in the Questions/Requirements assessment mode are
Assessment Compliance, Top Ranked Categories, Standards Summary, and Components
Summary. The Figure below provides a brief description of the Dashboard in the
Questions/Requirements assessment mode.

Top Ranked Categories:
The Top Ranked Categories chart provides a quick look at the top six categories where the user
needs to improve the most or the highest priority categories on which to focus attention first
based on the assessment answers.
For more information about the Top Ranked Categories chart and data, see the Overall Ranked
Categories help section.

Figure: Top Ranked Categories Chart

Standards Summary:
The Standards Summary chart provides a quick look at the percentages of how the user
answered the Standards-based questions.
For more information about the Standards Summary chart and data, see the Standards
Summary help section.

CSET User Manual

Figure: Standards Summary Chart

168

CSET User Manual

169

Ranked Questions
Each question in the assessment where the answer had a No response or was unanswered will
be ranked and displayed on the Ranked Questions Screen. The information provided is
intended to answer the fundamental question, "Okay, I have some problems, so what do I do
first?" Based on the ranking, the answer would be, do Number 1 first, and then do Number 2,
and so on until all resources have been exhausted or all the problems have been resolved.
The Ranked Questions screen is shown in the Figure below.

Figure: Ranked Questions Screen

Ranked Questions
Navigation Button

Clicking the Ranked Questions button will show the Ranked Questions analysis screen.

Ranked Questions List

CSET User Manual

170

The Ranked Questions list displays a list of all questions that were answered 'No' or left
unanswered. The following is a description of the columns in the Ranked Question List:

Rank:
A numeric ranking of each question that was missed with #1 having the highest priority.
The ranking is based on a combination of factors that all impact the overall score. The
factors include the following:

The specific weighting value assigned to each question in CSET.
This weighting comes from subject matter experts with years of experience in
information technology and control system cybersecurity. The questions were
analyzed and assigned a weight relative to all other questions.

The weighting value of the subject area or question category. Each
area was also given a weight by experts relative to all other areas. Like the
question itself, it was determined that some areas are more important than
others, even though they are all important to cybersecurity.

The security assurance level (SAL) of the question. Each question is

CSET User Manual

171

linked to an assurance level. For example, a question that is associated with a
Very High level would be lower in rank than one with a Low level, because it is
recommended that the user work on the basic requirements before moving to
those required for a higher level. A good example relates to access control.
Users should implement a complex password, (or maybe even a password)
before worrying about implementing system access controlled by a combination
of a complex password, physical token, and biometrics. The SAL will only affect
the weighting when the score is higher than a Low for the facility. Because the
SAL limits the questions to only those matching the SAL value, if the score is at
a Low, then the user would never see any questions that might be marked as
Moderate, High, or Very High.

Standard Name:
The value in this column identifies the Standard from which the question came. This
concept is especially important when using multiple Standards that have the same
category names. The combination of Standard Name, Category, and # will help locate
the exact question or requirement.

Category:
The title of the main question category or subject area where the question or
requirement is found.

Number or #:
This column identifies the question number in the Standard and category. The content is
a hyperlink that when clicked, will open the Question screen and navigate to that
question. The number will be the requirement title when in the requirements assessment
mode.

Question:
The text from the question or the requirement, depending on which mode was selected.

Answer:
This is the answer selected when completing the assessment.
The data can be sorted by clicking its corresponding column header but it is
recommended to keep the questions in Ranked order and address them accordingly.

CSET User Manual

172

Overall Ranked Categories
The Overall Ranked Categories screen shows a list of all main categories ranked in order of the
categories that should be prioritized based on how the questions were answered. Both
Standards answers and diagram component answers are included on the chart and data. The
chart shows the categories ranked in order of importance.
These categories are ordered by rank and indicate categories that need the most attention.
Unlike other analysis screens that highlight the positive answers, this screen and the associated
data show what categories or areas are weakest and what needs the most attention. In other
words, the longer the bar in the chart, the worse it scored in that area.
The Data tab contains the tabular data of the categories that match the bars on the associated
chart. There are five columns in the tabular data:

Category:
The categories are taken from the list of main categories associated with the selected Standard
or diagram component questions. If multiple Standards are selected then this list is made up of
the universal categories. Questions from a single Standard use the categories from that
Standard.

Rank:
The Rank column corresponds to the size of the bar on the chart and is an importance
weighting.
For more information about how categories are ranked, see the Category Rankings help
section.

Failed:
The Failed Count shows the number of negative answers determined by either a No or
Unanswered answer. The total number of questions does not include questions marked as not
applicable.

Total:
The Total indicates the total number of questions within the indicated category.

Percent:
This column is the number of failed answers divided by the total number of questions to get the
percentage.

The Overall Ranked Categories screen is shown in the Figure below.

CSET User Manual

Figure: Overall Ranked Categories Screen

173

CSET User Manual

174

Standards Analysis
The Standards Analysis section of the Analysis Navigation panel displays charts and tabular
data based on answers to questions for the selected Standards. Standards Analysis contains
analysis screens for Summary, Ranked Categories, and Results by Category that will be
described in the following sections.

Standards Summary
The Standards Summary Single Standard screen shows summary information related to the
results from the answers to the single Standard that was selected at the Standards screen
during the start of the assessment. The chart and tabular data displayed will correspond to a
single Standard only.
The data displayed corresponds to answers to questions associated with only the selected
Standard and does not include data related to components on the network diagram.
The chart shows the percentage of all Yes, No, NA, Alternate, and Unanswered questions for
the selected Standard. The tabular data show the Answer in the first column. The second
column indicates the number of the indicated answer, the third column shows the overall total
number of questions, and the final column shows the percentage of the number for the total.
The Standards Summary Single Standard screen is shown in the Figure below.

Figure: Standards Summary Single Standard Screen

CSET User Manual

175

Standards Ranked Categories
The Standards Ranked Categories screen shows a list of all main categories ranked in order of
the categories that should be prioritized based on how the questions were answered. Only
answers from the selected Standards are included on this screen. Diagram component answers
are not included. The chart shows the categories ranked in order of importance.
This screen highlights the categories that need the most attention for failed Standards based
questions. Unlike other analysis screens that highlight the positive answers, this screen and the
associated data show what categories or areas are weakest and what needs the most attention.
In other words, the longer the bar in the chart, the worse the score in that area.
The Data Tab contains the tabular data of the categories that match the bars on the associated
chart. There are five columns in the tabular data:

Category:
The categories are taken from the list of categories associated with the selected Standards. If
multiple Standards are selected then this list is made up of the universal categories. Questions
from a single Standard use the categories from that Standard.

Rank:
The Rank column corresponds to the size of the bar on the chart and is an importance
weighting.
For more information about how categories are ranked, see the Category Rankings help
section.

Failed:
The Failed count shows the number of negative answers determined by either a No or
Unanswered answer. The total number of questions does not include questions marked as not
applicable.

Total:
The Total indicates the total number of questions within the indicated category.

Percent:
This column is the number of failed answers divided by the total number of questions to get the
percentage.
The Standards Ranked Categories screen is shown in the Figure below.

CSET User Manual

Figure: Standards Ranked Categories Screen

176

CSET User Manual

177

Standards Results by Category Single Standard
The Standards Results by Category Single Standard screen shows the positive results of how
the user performed on the assessment organized by the category in which the questions are
grouped. The results are based on questions from a single Standard selected at the Standards
screen during the start of the assessment. The chart and tabular data displayed will correspond
to a single Standard only. If multiple Standards are selected, the Standards Results By
Category Multiple Standards screen is displayed. The data displayed also do not include data
related to components on the network diagram.
The chart displayed is a bar chart and shows the percentage of passed (Yes and Alternate)
answers to questions for the selected Standard grouped into categories. The Data Tab shows
the Category in the first column. The second column indicates the number of passed answers
for the indicated category, the third column shows the total number of questions in the category,
and the final column shows the percentage of the passed answers over the total.
The Standards Results by Category Single Standard screen is shown in the Figure below.

Figure: Standards Results by Category Single Standard Screen

CSET User Manual

178

Standards Results by Category Multiple
Standards
The Standards Results by Category Multiple Standards screen shows the positive results of
how the user performed on the assessment organized by the selected Standards as well as the
category in which the questions are grouped. The results are based on questions from multiple
Standards selected at the Standards screen during the start of the assessment. The chart and
tabular data displayed will correspond to multiple Standards. If a single Standard is selected, the
Standards Results By Category Single Standard screen will be displayed. The data displayed
also do not include data related to components on the network diagram.
The chart displayed is a multiple bar chart. For each category, the chart displays a bar for each
selected Standard. Each bar shows the percentage of passed (Yes and Alternate) answers to
questions for the indicated Standard. The Data Tab shows multiple tables, one for each
Standard, with the Category as the first column. The second column indicates the number of
passed answers for the indicated category, the third column shows the total number of
questions in the category, and the final column shows the percentage of the passed answers
over the total.
The main CSET window may need to be maximized in order to read the chart appropriately.
The Standards Results by Category Multiple Standards screen is shown in the Figure below.

Figure: Standards Results by Category Multiple Standards Screen

CSET User Manual

179

Category Rankings
Each Standard has an overall defined risk. This overall risk is determined from the number of
questions and the weight of each question. The weights of questions have been determined by
cyber security experts. If all questions have been completely failed then the ranked category bar
charts will show that the user is at 100% of the risk defined by the Standard as seen in Figure:
Ranked Categories with 0%. If about half the questions were answered yes, then the graph
would only show the user at 50% of the overall risk as seen in Figure: Ranked Categories with
50%. See the two graphs below.

Figure: Ranked Categories with 0% of Account Management Questions Passed

CSET User Manual

180

Figure: Ranked Categories with 50% of Account Management Questions Passed
Note that the x-axis is different between Figures Ranked Categories with 0% and Ranked
Categories with 50%. Otherwise the graphs look about the same. The x-axis changes because
the proportions of risk are the same. According to this Standard, the Monitoring and Malware
controls consume about 2/3 of the risk that Account Management does. However, if we go back
and answer a great majority of Account Management questions as Yes then we obtain the chart
in Figure: Ranked Categories with 100%.

CSET User Manual

181

Figure 138. Ranked Categories with 100% of Account Management Questions Passed
Now the risk accounted for from the Account Management section is only about 1% of the
original risk defined by this Standard. Note that Monitoring and Malware still Accounts for about
6% of the overall risk as it did above.

CSET User Manual

182

Reports Section
After the network diagram has been completed and both the Standards and component
questions have been answered, the user can generate and print reports of the results.
The intent of the reporting function is to provide a way to print and publish assessment
information, including summary charts and lists. It also provides a hardcopy of the results to be
used in meetings, for communications to management, and as a way to assign tasks to
technical staff. Combined with the online analysis, these reports can help the user clearly
understand where weaknesses are and where improvements should be made.
This section will describe how to use the Reports Screen to select the report type, filter the
content of the report, and then generate the report to different formats.

Executive Summary, Overview, and Comments
Screen
The Executive Summary, Overview, and Comments screen allows the user to add executive
level information for display on the Executive Summary report. As well as, a high-level
description of the assessment and any relevant comments to be displayed on the reports.
Some default text is provided on the Executive Summary screen; however, the user should
replace that text with actual summary information that captures the highlights of the assessment
as seen in the Figure below.

Figure: Executive Summary Screen

CSET User Manual

183

Report Builder
The Report Builder screen is shown in the Figure below. Notice that none of the options are
checked when the screen is first accessed. The Create Report button is disabled until one or
more reports and file types are selected. The Status bar will activate when the Create Report
button is clicked to provide an indication of report creation progress. Reports can take a few
seconds to many minutes to generate. The number of components contained in the network
diagram will significantly impact report creation time.

Figure: Report Builder Screen
To generate a report click on the specific report link on the Report Builder screen. The report will
open in a new tab.

Executive Summary: The Executive Summary option produces the Executive Summary
Report. As the name implies, it is designed for an executive level audience. The person
receiving the report may hold any title; however, the intent is to provide limited graphical and
high-level, summary information that can be understood quickly.
This report is limited to around five or six pages and does not include any detailed information
beyond listing the top categories and areas of concern. It includes the textual Executive
Summary information available on the Executive Summary Screen. It also includes the High
Level Assessment Description, which is found on the Comments & High Level Description
screen.

Site Summary: The Site Summary option produces the Site Summary Report. The
intended audience for this report is a technical manager or supervisor who is responsible for
directing the implementation of the recommendations. The report includes everything in the
Executive Report plus additional charts at a more detailed level. It also includes the network
diagram and a list of all the questions in the assessment that were not positively answered. An
important feature is the ranking of the missed questions. Each question is ranked sequentially

CSET User Manual

184

from one to the total number of questions.
The question ranking is determined by a formula that takes into consideration the weighting of
each question, the weighting of each category, and the security assurance level (SAL)
associated with that question. All questions in CSET have been assigned a unique weighting
relative to one another. The categories have been weighted as well. These assignments were
determined by subject matter experts and are based on their recommendations. The SAL that is
assigned to a question is also considered in the formula. For example, all other things being
equal, if Question A has a SAL of High and Question B has a SAL of Low, then Question B
would rank higher in the list than A. The recommended ranking would encourage addressing
basic requirements before addressing the more difficult ones.
The rankings are intended to address the question, “What should I work on first?” It is
recommended to start with the question ranked Number 1 and work down the list based on
available resources and the cybersecurity plan.

Detail Report: This option will generate the Site Detail Report. The intended audience for
this report is the implementers of change in the organization as it provides the details needed to
make the necessary resource allocations and commitments to improve the cybersecurity of the
facility or site.

Security Plan: The Security Plan option produces the Site Cyber Security Plan template. It
provides an overview of system security requirements and describes the controls in place or
planned to meet those requirements.
The plan includes several sections found in the Site Summary Report but the bulk of the report
is a list of all assessment questions and their answers presented in a control-focused format.
Thus, the report provides an overview of the cybersecurity requirements and the status for the
facility.

Discoveries Tear Out Sheets: The Discoveries Tear Out Sheets option produces a list
of all discoveries identified on specific questions during the assessment. Contacts can be
assigned to each discovery record and the printed report will allow for easy distribution of
assignments to address each discovery or potential issue.

CSET User Manual

185

Executive Summary Report
The Executive Summary Report is designed for an executive level audience. The intent is to
provide limited graphical and high level, summary information that can be understood quickly.
This report is limited to around five or six pages and does not include any detailed information
beyond listing the top categories and areas of concern. It does include the textual Executive
Summary and Description of Assessment text that was entered by the user at the Information
screen. Some default text is provided; however, the default text should be replaced with actual
summary information that captures the highlights of the assessment.
The Executive Summary Report has a fixed set of sections that are all generated when the
report is created. Each of the sections in the report will be discussed below.

Title Page: Each of the reports has a cover page that is unique to the report type. Each
includes the assessment name that is taken from the Information screen in the tool, the date
that was entered in the Assessment Date field, and the name of the person that was entered in
the Principal Assessor/Name field in the Information screen.

Description and Summary: This is the first page with content and shows a summary
look at the Standards, network components, and overall compliance based on answers to
questions in the assessment. It also includes the description of the assessment and the
executive summary text that was entered in the Information screen.
When CSET is installed, the Executive Summary field has generic text included as a starting
point; however, once the assessment is complete, the included text should be replaced with
executive summary text that is specific to the actual assessment results.

Standards Summary: The Evaluation Against Selected Standards displays several
items. It first identifies the Standards that were used in the evaluation. It then shows in pie chart
format the combined breakout of answers for the selected Standards. The bar chart provides
the greatest level of detail and indicates the overall scoring in each question category for the
selected Standards.
Because more than one Standard may be selected, the categories are not specific to a single
Standard. Instead, the categories are taken from a common list that applies to all.

Areas of Concern: The final section of the Report shows the top subjects or categories
and top questions of concern.
The top questions and categories are based on the ranked order of both, and the full lists can
be found in the Site Summary and the Site Detail reports. Both lists on this page have been
limited to only the top five. The intent is to give a quick picture of what is recommended to be
addressed first.
If the user selected the Requirements or Cybersecurity Framework approach to the
assessment, this section will deal with the requirements of concern, and the list will be the
actual requirement text.

CSET User Manual

186

Ranking: The list is based on a formula that includes the number of missed questions, the
weighting given to each of those questions, the weighting assigned to the question category or
area, the SAL for the question, and the criticality assignment for a component that was included
in the diagram.
All the parameters are factored together. Each question is ordered in the list from the question
the user should work on first at the top to the question or requirement that should be addressed
last listed on the bottom.

CSET User Manual

187

Site Summary Report
Selecting the Site Summary option produces the Site Summary Report. The intended audience
for this report is a technical manager or supervisor who is responsible for directing the
implementation of the recommendations. The report includes everything in the Executive Report
plus additional charts at a more detailed level. It also includes the network diagram and a list of
all the questions in the assessment that were not positively answered. An important feature is
the ranking of the missed questions. Each question is ranked sequentially from one to the total
number of questions.
The Site Summary Report provides mostly summary information in the form of a variety of
charts; however, it is more detailed than the Executive Summary Report and provides additional
charts that the Executive Summary Report does not have.
The sections of the Site Summary Report are discussed below.

Title Page: The Title Page includes the assessment name, date, and the name of the
principal assessor.

Disclaimer: The disclaimer describes the limitations for use and legalities of CSET and the
report.

Advisory: The Advisory includes recommendations for using CSET for more than an
approach to a robust cybersecurity plan, for the team makeup, and for protecting data. It should
be read and followed.

Site Information: This section displays the text that was entered on the Information screen
in the tool. It will display all the data with the appropriate labels.

Description and Summary: This is identical to the first page of the Executive Summary
Report.

Standards Summary: This page is identical to the page in the Executive Summary
Report.

Standards Compliance: A Standards Compliance bar chart is displayed for every
Standard selected in the tool. This chart gives the percent of positive answers (either marked as
a Yes or Alternative) as compared with the total number of questions in each category. Unlike
the earlier combined Standard Summary, this chart uses the categories that are specific to the
Standard. The title on the chart is the short name or abbreviation of the full Standard name.

Security Assurance Level (SAL): The Security Assurance Level page displays the
results of answers and selections related to the SAL. It includes any values that were
determined in the General SAL or the FIPS 199 SAL processes along with any Standard
specific values like those for DoD 8500.2. When Cybersecurity Framework Mode is selected as
the assessment mode, this section will be changed to display the Cybersecurity Framework Tier
Determination.

CSET User Manual

188

Document Library: The next page shows the document titles and file names of any
documents that were added to the assessment by the user. They may have been added in
association with specific questions or added through the Document Library screen.

Ranked Subject Areas: The Ranked Subject Areas section shows the categories or
subject areas that need the most attention. This chart is organized so that the worst areas are
shown at the top and then ordered to those areas doing best at the bottom. This chart can be
helpful in prioritizing what areas to work on first.
The formula for ranking these areas includes several factors such as a weighting given to each
area from subject matter experts combined with the number and level of missed questions in
each area.
The top five areas shown on this chart are used to populate the top categories of concern
section of the Executive Summary Report.

Summary of Ranked Questions: This table includes a list of the questions that were
missed presented in ranked order. It makes up the bulk of the report. This list is intended to
answer the question, “What do I work on first?”
The table also presents the SALs applicable to the question. General SALs will be listed for
most Standards and network components. They are Low (L), Moderate (M), High (H), and Very
High (VH). If a CNSSI Standard is selected, the Confidentiality (C), Integrity (I), and Availability
(A) levels will be shown. If DoD Instruction 8500.2 is the selected Standard, the Confidentiality
(Conf) and Mission Assurance Category (MAC) levels will be shown. They are: Classified (C),
Sensitive (S), and Public (P) for Confidentiality; MAC I, II, and III for Mission Assurance
Category.
For requirements mode, the table lists the name of the Standard and the available security
levels.
The top five questions on this chart are used to populate the top questions of concern section of
the Executive Summary Report.
The format of the table is:
Rank #

Question/Requirement
Identifier

Question or Requirement Text

SAL

Answer

Rank#: The calculated position in the list.
Question/Requirement Identifier: The topic, category, or requirement and question
number.

SAL: The SAL applicable to that question or requirement.

CSET User Manual

189

Question or Requirement Text: The text as seen in the Questions screen.
Answer: Why the question is listed in the table. Usually the question was answered No or left
unanswered (blank). Unanswered questions should be reviewed and answered, then the report
recreated.

Ranking: The list is based on a formula that includes the number of missed questions, the
weighting given to each of those questions, the weighting assigned to the question category or
area, the SAL for the question, and the criticality assignment for a component that was included
in the diagram.
All the parameters are factored together. Each question is ordered in the list from the question
the user should work on first at the top to the question or requirement that should be addressed
last listed on the bottom.
The SAL of each question is included in the table which gives the user additional information
when prioritizing work. A lower SAL usually means that the fix will be relatively simple. However,
while more time consuming and costly to fix, a higher SAL, represents a higher level of
protection. Resources should be allocated according to the calculated rank and the risk
tolerance of the user.

Question Comments/Marked for Review: This section includes all the questions
that had comments entered or had the Marked for Review check box clicked. It identifies the
question by subject area and by number within the subject area and then displays the question,
its answer, and the comment.

Alternate Justifications: This table is similar to the question comments table described
above except that it provides the text that was entered as a justification for using an alternate
method to accomplish the intent of the question.

CSET User Manual

190

Site Detail Report
The Site Detail Report adds several new sections to the report that are not found in the
Executive Summary or Site Summary Reports.
The following sections have been described in either the Executive Summary Report or the Site
Summary Report help sections and will not be repeated here. To review the detailed
description, please see the respective help section.
• Title Page;
• Disclaimer, Advisory, and Table of Contents;
• Assessment Information;
• Description and Summary;
• Standards Summary;
• Standards Compliance;
• Security Assurance Level (SAL);
• Document Library;
• Ranked Subject Areas;
• Summary of Ranked Questions;
• Question Comments/Marked for Review; and
• Alternate Justifications.
The new section added to the Site Detail Report is a list of the questions detail for each
Standard.

Question Details: The final section of the report shows a full list of the questions that were
asked and the answers that were given for the Standards. It identifies the question by subject
area and by number within the subject area and then displays the question and its answer.
The questions are ordered based on the Standard or the Universal Set and are not ordered by
ranking.

CSET User Manual

191

Site Cyber Security Plan
The Site Cyber Security Plan provides an overview of the security requirements of the system
and describes the controls in place or planned, for meeting those requirements. The Security
Plan Report is presented in template format with some generic text (distinguished by being in 10
point font and italicized) that must be replaced with verbiage describing the actual site or facility
and the assessment results. Sections to replace include:
• Signature Identification,
• Introduction,
• System identification,
• Roles and Responsibilities, and
• Risk Analysis.

Security Assurance Level (SAL): The SAL page displays the results of the answers
and selections related to the SAL. When Cybersecurity Framework is selected as the
Assessment Mode, this section will be changed to display the Cybersecurity Framework Tier
Determination.

Security Plan Controls and Status List: This section lists all the requirements and
controls selected during the assessment. The table includes the requirement title, the control
description, affected zones and components, if there are any, and the related questions with the
answers that were provided during the assessment. A brief description of each field is provided
at the start of the section and repeated below.

Requirement Title: Is the control title as it is generally defined in the Standard document from
which this control is derived.

CSET Question/Requirement Category: Shows the CSET Question category from the
global questions list. Questions from multiple Standards have been consolidated together in the
CSET tool and assigned a common category.

Control Level: Mapped to one of Low, Moderate, High, or Very High.
Implementation Status: Shows the percentage complete as the number of yes answers
divided by the total related questions for this control. This percentage implemented will not
necessarily be reflective of the amount of work required to implement the control but is merely
an indicator of how many of the questions related to the control have been addressed so far.

Short Standard Name: Is an indicator of which Standard this control is derived.
Control Description: The full control text as defined in the Standard from which the control is
derived.

Related Questions and Answers: A list of the questions and answers from which the
implementation status of this control was determined.
The table is grouped by control, meaning that there may be several questions under each
requirement. The table also summarizes the implementation status of each requirement as a

CSET User Manual

192

percentage of positive answers per number of related questions. It is ordered to match the
on-screen display of the control questions so the user can more easily find and review
requirements of interest.
This is the heart of the report. Using this table, the reader can quickly see all the requirements
related to the facility and how closely each is being met.

Cybersecurity Framework
When Cybersecurity Framework is selected as the Assessment Mode, the Security Plan
Controls and Status List section will change to show information relevant to the Framework. The
sections of the table will become as follows.

Framework Function: The high-level framework function indicating in which section of
the framework the current control is defined.
Control Category: Shows the framework category from the global questions list.
Implementation Status: Same as described above.
Control Description: The full control text or subcategory as defined in the framework. They
are the requirements or required actions.

CSET User Manual

193

Discoveries Tear Out Sheets
Discovery records are identified and associated with individual questions during the
assessment. As infrastructure or processes are evaluated during the assessment process, there
are times when problems or issues are identified. These problems can be recorded and
associated with the question under review. The Discoveries Tear Out Sheets contain a list of all
Discovery records identified during the assessment. The report is formatted such that each
discovery can be assigned to a person responsible for its resolution and easily assigned.
The Discoveries Tear Out Sheets report has a fixed set of sections that are all generated when
the report is created. Each of the sections in the report will be discussed below.

Title Page:

All reports have a cover page that is unique to the report type. The title page
includes the assessment name taken from the Information screen in the tool, the date entered in
the Assessment Date field, and the name of the person that was entered in the Principal
Assessor on the Information screen.

Disclaimer: For information about the Disclaimer, see the Disclaimer help section.
Advisory: For information about the Advisory, see the Advisory help section.
Table of Contents: This is a system-generated table that indicates the report sections and
the page numbers for those sections.

Site Information: This section displays the text entered on the Information screen in the
CSET tool. It displays all entered data with the appropriate labels.
For more information about Site Information, see the Site Information Screen help section.

Discovery List: Provides a list of all Discoveries identified during the assessment along
with the question associated to the Discovery.
For more information about Discovery records, see the Discoveries Section help section.

CSET User Manual

194

Initiation Scenarios
The following initiation scenarios are provided as an overview of typical security vulnerabilities
associated with shared control system and business system infrastructure or control systems
connected to other external networks (hereafter any noncontrol system is referred to as an
external network). It is intended that this information will stimulate thought and discussion for the
team performing a CSET assessment, specifically, in determining a SAL. This overview is not
intended to be a comprehensive review of all potential threats or vulnerabilities.
Three aspects must be considered when assessing the security posture of a control system:

Availability. The system must be ready and able to store and transmit data when needed.
Integrity. The data stored or transmitted by the system must be complete and correct (not
corrupted).

Confidentiality. The system must be able to store and transmit data without unauthorized
disclosure of sensitive information.
The following pages describe a typical ICS/external network environment and provide examples
of risks, exposures, and vulnerabilities that are commonly encountered in such environments.

Typical Mixed-Use Control/External Network Environment
In a typical mixed-use environment, there is separation between ICSs and external networks,
but both rely on some amount of shared infrastructure (e.g., communications links). Although
separated, some connectivity between these networks exists (e.g., public web or application
servers).
There are typically distinct but interconnected networks, including the following:

Control System. The control system consists of servers, workstations, and devices
associated with the ICSs. Multiple separate systems may be in use and individual systems may
span multiple sites.

Business Network. The business network consists of servers and workstations associated
with typical office productivity applications, such as email and word processing, as well as
specialized applications such as for human resources, payroll, and billing.

Other Networks. These consist of other city, state, federal, or outside agency networks
connected via dedicated communications, Virtual Private Networks (VPNs), or other means.
Typically, access from such networks is controlled via a firewall. Connections to other networks
may be trusted or untrusted.

Internet. For the public Internet, typically, access is allowed to the outside for business use
(e.g., email, web browsing) and limited services may be accessed externally (e.g., web access
to public information). Such access is controlled via a firewall, and the Internet is treated as an

CSET User Manual

195

untrusted network.

Shared Infrastructure. While the ICS and business environments are distinct, there are
touch points between them.
Because of the costs and complexity associated with wide area networks, it is common to allow
both ICS and normal business communications to share the same physical infrastructure.
The need to share information may drive the use of portals between networks in a dual-homed
configuration with direct connection to both networks, or shared servers may be placed on a
DMZ network between the ICS and the business.
ICS personnel with the need for business application access may be provided workstations that
are dual-homed or provided access to the business network from their ICS workstations, or vice
versa.
It is important to appreciate the complexity of ensuring security in such environments.
While individual products, systems, or networks may be secure when taken individually, they
may not be adequately secured or protected in a complex deployment.

Common Initiation Scenarios
The following scenarios describe common security issues that can initiate a worst-case
scenario. The scenarios could impact the operation of a facility causing damage, loss of
production, impacts to health, safety, and the environment, or other economic impacts. These
issues could, in turn, impact system availability, integrity, and confidentiality in a typical
mixed-use environment. These scenarios are provided as food for thought in developing an
organization’s worst-case scenario and the resulting consequences.

Scenario 1: Privilege Escalation
In this scenario, an unknown party (attacker) is able to access sensitive data or systems by
means of existing network connections. This access may be gained by a number of means,
including:

Insufficiently Protected Networks. Restrictions between networks may be nonexistent,
poorly implemented, or may rely on excessive levels of trust between networks.

Privilege Escalation. The outsider, or in some cases an insider, may access a public or
loosely secured system with limited functionality and then use that system to hop to more
sensitive functions. By hopping between systems, the attacker appears to be operating from
inside the trusted network.

Poorly Secured Resources. A determined attacker can potentially exploit a number of
system weaknesses, including but certainly not limited to the following:
• Unsecured Default Accounts. The attacker leverages widely known default accounts

CSET User Manual

196

and passwords to gain access.
• Poorly Secured Services. The attacker uses weaknesses in running services and
applications to gain access to increased access levels (i.e., gaining access to sensitive
system files).
• Weak Network Services. The attacker uses known vulnerabilities in services and
applications to execute programs to gain further levels of access.
The attacker might proceed as follows:
1) Identifying the software running on the web server. While doing simple Internet
searches, the attacker locates software capable of exploiting vulnerabilities within the
web server software or the current configuration of the server to allow execution of
programs on the web server.
2) Executing a remote shell (command prompt) on the web server to launch software
identifying internal hosts. Upon discovery of an interesting server (the Control System
Historian in this example), the attacker attempts to gain access using well-known default
accounts (i.e., Guest), eventually discovering a little-used account with a default, or
easily guessed password to gain access.
3) Using the trust associated with the control system Historian to gain access to the ICS
network. In poorly secured systems, there may be excessive trust between inside
servers and the ICS, which can allow easy access. Once in, the attacker uses additional
probes to gain access to ICSs and to install software, view and manipulate data, or
perform any other desired function.
Any such intrusion impacts the ICS network at multiple levels:

Availability. Through intentional or accidental reconfiguration, the attacker may disable
essential system services, or introduce software (i.e., spam generators) that disrupts the
network because of the traffic loads generated.

Integrity. Unauthorized manipulation of data can be done at the attacker’s whim. This may
range from simple curious tinkering to direct attempts to impact the ICS.

Confidentiality. Sensitive system functions may be identified, and data may be accessed and
disseminated to unknown third parties.

Scenario 2: Traffic Sniffing
In this scenario, shared network infrastructure (e.g., hubs, switches, routers) is used for both the
ICS and business. An unauthorized user (attacker) on a non-ICS network is able to sniff network
traffic and capture login credentials (username, password), sensitive data, and network
information.
The attacker might proceed as follows:
1) In a direct attempt to sabotage the ICS, or simply out of curiosity, the attacker installs

CSET User Manual

197

packet capture (sniffer) software to monitor traffic on the network. This software is
capable of capturing any visible traffic and may include the means to circumvent
protection offered by switches. In an extreme case, the attacker can use
man-in-the-middle attacks to circumvent encryption. Such software can be monitored in
real time or simply run in the background to capture traffic of interest. In particular, user
login IDs and passwords can be captured in this manner.
2) An authorized user eventually connects to the ICS using authentication credentials
(username and password). Because of weaknesses in the application, the password is
not encrypted or is encrypted using weak and easily circumvented techniques.
3) Having captured the login session, the attacker simply extracts the password from the
network traffic stream (if clear text) or runs a password-cracking program against it (if
encrypted). Once the user account details are known, the attacker is free to impersonate
that user and gain access to the ICS.
Any such attack impacts the ICS network at multiple levels:

Availability. The attacker may intentionally or inadvertently disable the user account. Changes
to device configurations may result in a loss of use.

Integrity. With access into the system, the attacker can make further attempts to use the same
credentials on other systems. Unauthorized manipulation of data can be done at the attacker’s
whim. This may range from simple curious tinkering to directed attempts to impact the ICS.

Confidentiality. Once user credentials are compromised, the attacker may impersonate the
user at will. Sensitive system functions may be identified, and data may be accessed and
disseminated to unknown third parties.

Scenario 3: Introduction of Malicious Software from Outside the
System
In this scenario, a workstation used by an authorized user is compromised by means of
malicious software, or malware such as Trojan horses, viruses, or worms (in any combination).
Such software is typically written to allow the attacker to generate spam emails.
The sequence of events might occur as follows:
1) A user on an operator workstation with either connections into both networks
(dual-homed) or an internal ICS workstation with access to the outside inadvertently
downloads a program via an email attachment. Although most users know not to run
programs from unknown outsiders, simple carelessness or a well-crafted social
engineering message appearing to come from Network Support might convince them to
launch the attached program. The program exploits vulnerability in the workstation
operating system to install malware (a worm). Once installed, the worm begins
replication thus filling the memory.
2) Eventually, the sheer volume of traffic generated by multiple copies of the worm
running on the network overwhelms lower-speed Wide Area Network (WAN) links,
resulting in loss of communications or a denial of service.

CSET User Manual

198

Any such attack impacts the ICS network at multiple levels, such as:

Availability. The most likely impact is network disruption due to the sheer volume of
worm-related traffic (e.g., probes, spam, and bounce email messages.)

Integrity. Remote-control software allows the attacker unrestricted access to the compromised
system. If the attacker has some means of accessing the system, unauthorized manipulation of
data can be done at the attacker’s whim. This may range from simple curious tinkering to
directed attempts to impact the ICS.

Confidentiality. If remote-control software is installed, sensitive system functions may be
identified and data accessed and disseminated to unknown third parties.

CSET User Manual

199

Glossary
Acronyms
Acronym

Definition

ALT

Alternate Method

C2M2

Cybersecurity Capability Maturity Model

CAG

Consensus Audit Guidelines

CCI

Control Correlation Identifier

CFATS

Chemical Facility Anti-Terrorism Standards

CFR

Code of Federal Regulations

CIP

Critical Infrastructure Protection

CIS

Center for Internet Security

CMMS

• Computerized Maintenance Management System

CNSSI

Committee on National Security Systems Instruction

CoR

Catalog of Recommendations

CSET

Cyber Security Evaluation Tool

CUI

Controlled Unclassified Information

DCS

Distributed Control System

DHS

U. S. Department of Homeland Security

DISA

Defense Information Systems Agency

DoD

U. S. Department of Defense

eMASS

Enterprise Mission Assurance Support Service

FIPS

Federal Information Processing Standards

HIPAA

Health Insurance Portability and Accountability Act of 1996

HMI

Human-Machine Interface

ICS

Industrial Control System

ICT

Information and Communications Technology

IDS

Intrusion Detection System

IIS

Internet Information Services

INGAA

Interstate Natural Gas Association of America

IR

Interagency Report

IT

Information Technology

MAC

Mission Assurance Category

CSET User Manual

200

MIL

Maturity Indicator Level

MSC

Multiple Services Component

NA

Not Applicable

NEI

Nuclear Energy Institute

NERC

North American Electric Reliability Corporation

NIST

National Institute of Standards and Technology

NRC

Nuclear Regulatory Commission

PCIDSS

Payment Card Industry Data Security Standard

PDF

Portable Document Format

PII

Personally Identifiable Information

PLC

Programmable Logic Controller

RBPS

Risk-Based Performance Standards

RG

Regulatory Guidelines

SAL

Security Assurance Level

SCADA

Supervisory Control and Data Acquisition

SP800

Special Publication 800

TSA

Transportation Security Administration

URL

Uniform Resource Locator

USB

Universal Serial Bus

VPN

Virtual Private Network

Key Terms
Term

Explanation

Admin Questions

Questions spawned by the tool in response to the applied Standards the
user selects.

Assessment
Documents
Assessment Report

Repository of documents added to the assessment by the user.
A summary report of results for each question including user responses,
statement of actual requirements (or deficiencies), answers in relation to
the overall SAL, and associated help documents.

CSET User Manual

201

Classified
Information

Any information or material that has been determined by the U.S.
Government pursuant to an executive order, statute, or regulation, to
require protection against unauthorized disclosure for reasons of
national security (Classified Information Procedures Act, 18 U.S. Code
App. 3, Section 1(a)).

Component
Diagram
or
Network Diagram

A network topology that best represents the industrial control system
configuration. Diagram includes typical components associated with a
control system such as connector, firewall, network router, network
switch, serial switch, network hub, modem, programmable logic
controller, remote terminal unit, HMI, engineering workstation, intrusion
detection system, wireless access point, serial radio, application server,
database server, terminal server, web server, virtual private network, link
encryption, DCS, printer, and clock.

Component
Questions

A generated list of control system cybersecurity questions based on the
defined SAL and components contained within the network topology
diagram.

Confidentiality
Level

Applicable to DoD information systems, the confidentiality level is
primarily used to establish acceptable access factors, such as
requirements for individual security clearances or background
investigations, access approvals, and need-to-know determinations;
interconnection controls and approvals; and acceptable methods by
which users may access the system (e.g., intranet, Internet, wireless).
The DoD has three defined confidentiality levels: classified, sensitive,
and public.

Critical Asset

Those facilities, systems, and equipment, which if destroyed, damaged,
degraded, or otherwise rendered unavailable, would have a significant
impact on the ability to serve large quantities of customers for an
extended period of time, would have a detrimental impact on the
reliability or operability of the electric grid, or would cause significant risk
to public health and safety.

Mission Assurance
Category

Applicable to DoD information systems, the mission assurance category
reflects the importance of information relative to the achievement of DoD
goals and objectives. Mission assurance categories are primarily used to
determine the requirements for availability and integrity. The DoD has
three defined mission assurance categories: MAC I, MAC II, and MAC
III. MAC I systems require the most stringent protection measures.

Public Information

Official information that has been reviewed and approved for public
release by the information owner.

Resource Library

Electronic copies of cybersecurity documentation are included in the tool
for reference, including federal codes, white papers, reports, industry
Standards, and guidelines.

CSET User Manual

Security Assurance
Level

202

The relative consequences of a successful attack against the control
system being evaluated. The consequence analysis identifies the worst,
reasonable consequence that could be generated by a specific threat
scenario. The General SAL provides an overall rating of the criticality
based on the users’ review of security threat scenarios and estimated
consequences.
The SAL ranges from Low to Very High.

Security Categories

The security categories are related to the NIST 800-53 Standards and
are defined as:
CONFIDENTIALITY
“Preserving authorized restrictions on information access and disclosure,
including means for protecting personal privacy and proprietary
information…”
A loss of confidentiality is the unauthorized disclosure of information.
INTEGRITY
“Guarding against improper information modification or destruction, and
includes ensuring information non-repudiation and authenticity…”
A loss of integrity is the unauthorized modification or destruction of
information.
AVAILABILITY
“Ensuring timely and reliable access to and use of information…”
A loss of availability is the disruption of access to or use of information or
an information system.

CSET User Manual

Security
Categorization

Security Level

203

The NIST 800-53-related security categorizations of Low, Moderate, and
High are explained as:
LOW:
The loss of confidentiality, integrity, or availability could be expected to
have a limited adverse effect on organizational operations,
organizational assets, or individuals.
AMPLIFICATION: A limited adverse effect means that, for example, the
loss of confidentiality, integrity, or availability might: (i) cause a
degradation in mission capability to an extent and duration that the
organization is able to perform its primary functions, but the
effectiveness of the functions is noticeably reduced; (ii) result in minor
damage to organizational assets; (iii) result in minor financial loss; or (iv)
result in minor harm to individuals.
MODERATE:
The loss of confidentiality, integrity, or availability could be expected to
have a serious adverse effect on organizational operations,
organizational assets, or individuals.
AMPLIFICATION: A serious adverse effect means that, for example, the
loss of confidentiality, integrity, or availability might: (i) cause a
significant degradation in mission capability to an extent and duration
that the organization is able to perform its primary functions, but the
effectiveness of the functions is significantly reduced; (ii) result in
significant damage to organizational assets; (iii) result in significant
financial loss; or (iv) result in significant harm to individuals that does not
involve loss of life or serious life threatening injuries.
HIGH:
The loss of confidentiality, integrity, or availability could be expected to
have a severe or catastrophic adverse effect on organizational
operations, organizational assets, or individuals.
AMPLIFICATION: A severe or catastrophic adverse effect means that,
for example, the loss of confidentiality, integrity, or availability might: (i)
cause a severe degradation in or loss of mission capability to an extent
and duration that the organization is not able to perform one or more of
its primary functions; (ii) result in major damage to organizational assets;
(iii) result in major financial loss; or (iv) result in severe or catastrophic
harm to individuals involving loss of life or serious life threatening
injuries.

The rating of High, Moderate, or Low for Confidentiality, Integrity, and
Availability according to FIPS 199 and NIST SP800-60.

CSET User Manual

Sensitive
Information

204

Any information, the loss, misuse, or unauthorized access to or
modification of which could adversely affect the national interest or the
conduct of federal programs, or the privacy to which individuals are
entitled under Section 552a of Title 5, United States Code (the Privacy
Act), but which has not been specifically authorized under criteria
established by an executive order or an act of Congress to be kept
secret in the interest of national defense or foreign policy.

CSET User Manual

205

Frequently Asked Questions (FAQs)
This is a list of questions that new users may find helpful.

My system is running slow. How can I make it go faster?
This release may run slower than previous releases of CSET. Check to make sure that there is
sufficient RAM on the user's computer. 3 GB of RAM is recommended. Check the Task
Manager to verify that the computer is not paging to the disk drive, which would cause a
significant drop in performance. The delays typically come from the system loading and caching
data between the main screens. There is a greater delay when using a large diagram or when
multiple Standards are selected. A faster processor will also help.

How do I import a file from a previous release of CSET?
See Import a CSET Assessment for more information.

Why isn’t the Catalog of Recommendations available in Questions
mode on the Standards screen?
The Catalog of Recommendations, Version 7 was the foundation for the Universal Questions
and so to select it would be to double-select the same set of questions. To avoid confusion, it is
not selectable in Questions mode.

What Standard should I use?
Only the user can answer that question for his or her organization; however, extensive help
information can be found by reviewing the Cybersecurity Standard Selection help section. The
user may also consult the User Guide available from the Home screen. For a brief description of
the available Standards, see the CSET Standards and Question Groupings help section.

Can I unclick an answer in the Questions screen after making a
selection?
Yes. Simply click the radio button again to clear it.

The video tutorials will not open.
With CSET Version 6.0 and later, the tutorial videos were redesigned to play in YouTube.
Therefore, an active Internet connection and suitable internet browser are required to view
them. CSET will provide the web address or URL. The user must copy it and paste the URL into
the Internet browser address bar. If the web address provided by CSET does not work, try
opening YouTube (www.youtube.com) separately then searching on "Cyber Security Evaluation

CSET User Manual

Tool." Searching on "CSET" alone may not provide the desired results.
Internet connections with low bandwidth can result in reduced video quality.
To view closed captioning in YouTube click on the cc icon.

206

CSET User Manual

207

CSET Revision History
Document
Revision

Date

Change Description

0

August 2009

Initial release

1.0

April 2010

Updated Regulatory Basis in Section 2. Added
instructions for new functionality in the drawing tool.

1.1

May 2010

Added need for Word 2007 to support RTF report.
Revised description of component diagram zones.

2.0

August 2010

Updated Regulatory Basis in Section 2. Added
instructions for new navigation and user interface.

3.0

July 2011

Updated Regulatory Basis in Section 2. Added
instructions for the resource library, diagram layering,
line security, and new report format.

4.0

January 2012

Updated the component diagram section to explain
the use of Microsoft Visio.

5.0

December 2012

5.1

June 2013

6.0

January 2014

6.1

July 2014

New architectural change to .NET and new approach
with questions and requirements. New diagramming
tool and system redesign for ease of use. Added new
standards and modified default approach for
component questions. Added new analysis
capabilities and enhance resource library.
Modifications to the Questions screen with headings,
new standards, and modifications to standards and
analysis to accommodate the CNSSI baseline and
overlay.
Added aggregation functionality and new standards,
modified the diagram interface to improve usability,
added the ability to create a component inventory list
from the diagram, and added new Security Plan
Report option. Video tutorials were moved to
YouTube for online viewing.
Added new Cybersecurity Framework mode to the
standards options, revised the Analysis function to
include Framework details, and modified the Network
Diagram tool to improve how Zones are used and to
clarify tab and menu names.

CSET User Manual

208

6.2

January 2015

Added fields for the Real Property and Site Unique
Identification (RDSUID) information, added a new
Security Assurance Level (SAL) determination for
CNSS, added functionality to import information
pertaining to the network diagram from Grass Marlin,
added functionality to export information pertaining to
eMASS, and added two new standards.

7.0

August 2015

Implemented a new, more modern design for the tool.
Increased responsiveness of the Questions and
Diagram screens. Added Cybersecurity Capability
Maturity Model (C2M2), DoD Instruction 8510.01, and
NISTIR 7628 Volume 1, Revision 1 as new standards.

7.1

January 2016

8.0

September 2016

Added 43 new components to the diagram including
new radio and medical components. Added ability to
change parameter values on requirement text.
Redesigned the analysis screens and added NERC
Rev. 5 Compliance analysis capability. Added NIST
SP800-161 Supply Chain Risk Management.
Deprecated CNSSI 1253 Baseline and Overlay
Standards.
Redesigned the overall process to streamline the
Preparation, Assessment, and Results processes and
make the CSET tool easier to use by novice users.
Added the ability to create custom questionnaires or
custom question sets from any of the existing
standard questions. Added the following Standards:
Control Correlation Identifier Specification V2 Release
0.1, Critical Security Controls Version 6, Health
Insurance Portability and Accountability Act Security
Rule and NIST Special Publication 800-171. Added
ability to collect discoveries on questions.
Added four new components/symbols to the diagram.

8.1

February 2018

9.0

October 2018

Fixed several application errors and started adding
basic accessibility functionality to address 508
requirements.
Moved to a web application with mobile capabilities.



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.5
Linearized                      : Yes
Author                          : McKenzie J. Willmore
Create Date                     : 2018:11:01 18:05:08-06:00
Modify Date                     : 2018:11:01 18:14:51-06:00
Language                        : en-US
Tagged PDF                      : Yes
XMP Toolkit                     : Adobe XMP Core 5.6-c015 84.159810, 2016/09/10-02:41:30
Format                          : application/pdf
Creator                         : McKenzie J. Willmore
Creator Tool                    : Microsoft® Word 2013
Metadata Date                   : 2018:11:01 18:14:51-06:00
Producer                        : Microsoft® Word 2013
Document ID                     : uuid:451e6988-896d-4061-bbad-b569ee79fe24
Instance ID                     : uuid:44aee64e-d811-4d83-987d-f44a6bae8d41
Page Count                      : 208
EXIF Metadata provided by EXIF.tools

Navigation menu