The organization must maintain up-to-date documentation of all communication protocols used within its network segments, with special focus on those connected to supply-critical systems. This documentation should include:
- A list of all protocols in use (e.g., TCP, UDP, Modbus, OPC UA, HTTPS, SNMP) within each network segment.
- The purpose and justification for each protocol, including whether it is essential for operations.
- Security properties of each protocol (e.g., encryption, authentication, integrity protection).
- Points of access and boundaries where these protocols communicate with other segments or external parties.
Protocols must be regularly reviewed to ensure only necessary and secure protocols remain in use. Any insecure or outdated protocols should be identified, risk-assessed, and either mitigated or phased out.
Changes to protocol usage must go through the organization’s change management process and be approved by the network owner or security team.