DOCUMENT MANAGEMENT
Document history:
| Version |
Date of issue |
Change |
Modified by |
| ST-CSF.001-0 |
08/2025 |
New Document |
Dr Vladimir Bunic |
STANDARD KEY INFORMATION
1. PURPOSE OF THIS STANDARD
This standard provides BEST practices for implementing unified risk management through converged security frameworks. It defines the requirements for integrating cybersecurity, physical security, and operational technology security into a cohesive organisational approach that addresses hybrid, systemic, and cascading risks.
Through application of this standard, organisations will establish consistent security governance controls aligned with ISO 31000:2018, ISO 27001:2022, and ISO 22301:2019. The correlation between GDPR and ISO 27001:2022 must be specifically addressed, as both frameworks emphasise data protection by design and systematic risk assessment.
The practices defined in this standard document are the minimum requirements for the specified scope. If an organisation is subject to additional regulatory standards (e.g., NIS2 Directive, DORA, PCI DSS, sector-specific regulations), then the most restrictive requirements apply. Critical infrastructure operators must implement additional controls as specified by their sectoral regulations.
2. EXPECTED BENEFITS
Through application of this standard, organisations will achieve:
- Enhanced threat detection and response capabilities
- Improved resource allocation and operational efficiency
- Reduced compliance fragmentation and regulatory risk
- Strengthened organisational resilience against hybrid threats
- Unified incident response protocols
3. SCOPE
This standard applies to all organisational entities, subsidiaries, and business units under direct managerial control. For joint ventures or partnerships where the organisation does not have majority control, this standard applies when accessing, processing, or managing organisational systems, data, or facilities.
In scope:
- All IT systems and infrastructure
- All OT systems and industrial control systems
- Physical security systems and access controls
- Cloud services and hybrid environments
- Third-party integrations and supply chain security
- Data processing and storage systems
- Mobile devices accessing organisational resources
- Identity and access management system
4. IMPLEMENTATION TIMELINE OF THE STANDARD
This standard is valid as of its date of issue and adherence is mandatory. Full implementation must be completed within 12 months. Existing systems must be assessed for compliance within 6 months.
5. CONFIDENTIALITY
This document is for General Use within the organisation.
6. TERMINOLOGY
For clarification of terms used in this standard, refer to the associated document ";Converged Security Framework Terminology". Key definitions include:
- Converged Security Framework: A unified approach integrating cybersecurity, physical security, and operational technology security into a cohesive risk management strategy
- Hybrid Risks: Threats exploiting vulnerabilities across both physical and digital domains simultaneously
- Systemic Risks: Interconnected system failures that can cascade across multiple operational areas
- Cascading Risks: Sequential failures triggered by initial incidents that propagate through organisational dependencies
ANNEXE A - ASSOCIATED DOCUMENTS
Organisations must refer to the following associated documents for detailed implementation guidance:
AD-CSF.001 - Converged Security Framework Terminology
PURPOSE: This document provides mandatory definitions and terminology for implementing ST-CSF.001 Converged Security Framework.
MANDATORY DEFINITIONS:
- Converged Security Framework:
- A unified approach integrating cybersecurity, physical security, and operational technology security into a cohesive risk management strategy that addresses hybrid, systemic, and cascading risks across all organisational domains.
- Hybrid Risks:
- Threats that exploit vulnerabilities across both physical and digital domains simultaneously, requiring coordinated response across multiple security disciplines.
- Systemic Risks:
- Interconnected system failures that can cascade across multiple operational areas, potentially causing organisation-wide disruption through network effects and dependencies.
- Cascading Risks:
- Sequential failures triggered by initial incidents that propagate through organisational dependencies, creating amplified impact beyond the original threat scope.
- Chief Converged Security Officer (CCSO):
- Executive role with authority over cybersecurity, physical security, and operational technology security functions, accountable for unified risk management across all security domains.
- Cross-Domain Integration:
- The technical and procedural unification of security controls, processes, and governance across cybersecurity, physical security, and operational technology domains.
- IT/OT Convergence:
- The integration of information technology and operational technology systems, creating new risk vectors that require specialised security controls and governance approaches.
- Zero Trust Architecture:
- Security model requiring continuous verification of all users, devices, and network connections regardless of location or previous authentication status.
AD-CSF.002 – Converged Security Implementation Guide
PURPOSE: This document provides mandatory implementation procedures for ST-CSF.001 Converged Security Framework.
IMPLEMENTATION PHASES:
Phase 1: Assessment and Planning (Months 1-3)
- Conduct a baseline security maturity assessment across all domains
- Identify current security silos and integration gaps
- Develop a converged security roadmap with milestones
- Establish a governance structure and appoint CCSO
- Define cross-domain KPIs and success metrics
Phase 2: Technology Integration (Months 4-8)
- Deploy unified SIEM/PSIM platforms
- Implement zero-trust architecture foundations
- Integrate identity and access management systems
- Establish API security frameworks
- Deploy AI/ML threat detection capabilities
Phase 3: Process Integration (Months 6-10)
- Unify incident response procedures
- Implement cross-domain risk assessment methodologies
- Establish unified vendor management processes
- Deploy integrated training programmes
- Implement change management initiatives
Phase 4: Operational Excellence (Months 9-12)
- Conduct cross-domain security exercises
- Implement continuous monitoring systems
- Establish resilience metrics and benchmarking
- Deploy adaptive security frameworks
- Complete compliance validation and certification
AD-CSF.003 - Cross-Domain Risk Assessment Methodology
PURPOSE: This document defines mandatory risk assessment procedures for identifying and evaluating hybrid, systemic, and cascading risks.
RISK ASSESSMENT FRAMEWORK:
- Hybrid Risk Assessment
- Identify vulnerabilities spanning physical and cyber domains
- Assess attack vectors exploiting cross-domain weaknesses
- Evaluate impact scenarios for simultaneous domain compromise
- Develop coordinated mitigation strategies
- Systemic Risk Assessment
- Map interdependencies between security domains
- Identify single points of failure affecting multiple domains
- Assess network effects and amplification factors
- Model organisation-wide impact scenarios
- Cascading Risk Assessment
- Document dependency chains across security domains
- Identify cascade triggers and propagation pathways
- Assess containment capabilities and circuit breakers
- Develop cascade prevention and mitigation strategies
- IT/OT Convergence Risk Assessment
- Evaluate integration vulnerabilities in converged environments
- Assess industrial control system security implications
- Identify business continuity risks from IT/OT failures
- Develop specialised protection strategies
AD-CSF.004 - Unified Incident Response Procedures
PURPOSE: This document defines mandatory incident response procedures for cross-domain security incidents.
INCIDENT CLASSIFICATION:
Class 1: Hybrid Incidents
- Simultaneous physical and cyber security breaches
- Coordinated attacks exploiting multiple domain vulnerabilities
- Incidents requiring cross-domain response coordination
Class 2: Systemic Incidents
- Failures affecting multiple security domains simultaneously
- Network effect incidents with organisation-wide implications
- Incidents threatening critical business functions
Class 3: Cascading Incidents
- Sequential failures propagating across domain boundaries
- Incidents with amplifying effects through dependency chains
- Incidents requiring cascade containment procedures
RESPONSE PROCEDURES:
- Detection and Alerting
- Unified alerting across SIEM/PSIM platforms
- Automated correlation of cross-domain indicators
- Immediate escalation for hybrid/systemic incidents
- Response Team Activation
- Cross-domain response team mobilisation
- Unified command and control structure
- Clear communication protocols and authority
- Containment and Mitigation
- Coordinated containment across affected domains
- Cascade interruption procedures
- Business continuity activation
AD-CSF.005 - Technology Integration Standards
PURPOSE: This document defines mandatory technical standards for converged security technology integration.
INTEGRATION STANDARDS:
- Platform Integration
- SIEM/PSIM unified deployment requirements
- API security standards (mutual TLS, rate limiting)
- Interoperability protocols (ONVIF, STIX/TAXII)
- Zero-trust architecture implementation
- Identity and Access Management
- Unified IAM system requirements
- Multi-factor authentication standards
- Privileged access management integration
- Dynamic risk-based authentication
- Network Security
- Network segmentation for IT/OT/IoT environments
- Controlled interface specifications
- Encryption standards across all domains
- Traffic monitoring and analysis requirements
- AI/ML Integration
- Automated threat detection requirements
- Predictive analytics implementation
- Cross-domain correlation capabilities
- Machine learning model validation
AD-CSF.006 – Training and Certification Requirements
PURPOSE: This document defines mandatory training and certification requirements for converged security implementation.
TRAINING PROGRAMMES:
- Executive Leadership Programme
- Converged security strategy and governance
- Business value and competitive advantage
- Risk management across multiple domains
- Change leadership and cultural transformation
- Security Professional Programme
- Cross-domain security integration
- Hybrid threat identification and response
- Technology integration and management
- Incident response coordination
- Operational Personnel Programme
- Converged security awareness
- Hybrid threat recognition and reporting
- Cross-domain security procedures
- Emergency response protocols
CERTIFICATION REQUIREMENTS:
Level 1: Awareness Certification
- All personnel must complete within 6 months
- Annual recertification required
- Covers basic converged security concepts
Level 2: Professional Certification
- Security personnel must complete within 12 months
- Bi-annual recertification required
- Covers technical implementation and procedures
Level 3: Leadership Certification
- Management personnel must complete within 18 months
- Tri-annual recertification required
- Covers strategy, governance, and business value