The name of the base system (platform): | Security Vision Specialized platform for automating information security processes |
Developers: | GC Intelligent Security (Security Vision Brand) |
Last Release Date: | 2025/02/25 |
Technology: | Information Security Management (SIEM) |
Main article: Security Information and Event Management (SIEM)
A software product for automating the process of categorizing and ensuring the security of critical information infrastructure objects in accordance with legislative and regulatory requirements. Security Vision CII is built on the basis of a graphical workflow designer, which gives the Customer the opportunity to adapt the basic product procedures to their unique internal business processes.
Results of use
- aggregation and accounting of information about CII objects in a single workspace
- automation of the process of categorization of CII objects
- control of compliance measures
- development of private threat models of CII objects
- generation of reports and information on CII facilities
- interaction with technical infrastructure of NKTsKI (State system of detection, prevention and elimination of consequences of computer attacks)
2025: Implementation of legal requirements in terms of CII in automatic mode
On February 25, 2025, Security Vision announced the entry into the market of the updated Security Vision CII product, which ensures the implementation of legislative requirements in terms of critical information infrastructure in automatic mode.
According to the company, Security Vision CII automates the following processes:
- Formation of an up-to-date list of CII objects and critical processes
- Categorization of CII objects in order to determine the category of significance
- Modeling of threats safety information to identify actual threats in relation to the object of CII
- Assessment of compliance of CII facilities with information security requirements
- Handling Regulatory Requests and Related Tasks
Security Vision CII can be used both in small and medium-sized businesses and in large enterprises with a geographically distributed structure. For the latter, it is possible to divide powers and areas of responsibility (for example, the isolation of each of the branches or controlled enterprises).
The process of categorizing CII objects using CII Security Vision begins with identifying critical processes of the organization, in case of violation of which can lead to negative consequences. The product generates a list of critical processes and identifies critical information infrastructure objects that automate these processes.
The indicators of the significance criteria and their values are evaluated to determine the category of significance, and all the necessary information on the CII object is filled in. In this case, all information on related assets is automatically filled in from the asset model.
As a result of the categorization process, documents are formed that fully comply with the requirements of the FSTEC of Russia:
- Information on the results of assigning one of the categories of significance to the CII object or on the absence of the need to assign one of these categories to it
- Act of CII object categorization
The process of modeling threats in relation to CII objects is carried out taking into account all objects of influence and their components with the ability to flexibly form a modeling area.
Threat modeling includes:
- Identification of negative consequences in the form of damage to the organization in the event of a computer incident, which may lead to a violation or termination of the critical process
- Identify Potential Violators (Threat Sources)
- Add risk groups automatically or manually
- Add automatic or manual threat implementations
- Add threats automatically or manually
Threat modeling is carried out in accordance with the methodological document of the FSTEC of Russia - "Methodology for assessing threats to information security." The result of the simulation is a list of current threats in relation to the objects of influence and their components, which, in turn, are part of the CII object.
The compliance assessment process is carried out in relation to the CII facilities to assess the requirements and safety measures implemented in accordance with the orders of the FSTEC of Russia No. 235 and No. 239. The assessment is carried out by filling out information on the current state of the CII facility with the ability to delegate (in whole or in part) questionnaires to the relevant experts.
Based on unrealized and incomplete requirements, a list is formed with the possibility of creating tasks to eliminate non-conformities.
Security Vision CII processes requests from the following regulators:
- Bank of Russia
- FSTEC of Russia
- FSB of Russia
The request received from the regulator is entered into the system. If necessary, a task is formed for a certain performer with a due date, as well as with the ability to control the execution. Two-way integration with the main external ITSM systems is implemented with the ability to create applications and track their status.
The Security Vision of the CII has developed in depth the main reports on the CII processes both for sending to the FSTEC of Russia and for internal use.
Dashboards highlight CII objects, on which it is necessary to categorize and simulate threats in the near future, help to track current threats and violators on an ongoing basis. The interactive map displays statistics for all controlled organizations and branches distributed throughout the country.
2019: Linter DBMS compatibility
On July 8, 2019, Intelligent Security announced that, together with RELEX Group of Companies, they have successfully completed testing the compatibility of their own software products:
- Security Vision Cyber Risk System and DBMS LINTER BASTION and DBMS LINTER STANDARD;
- Security Vision Incident Response Platform DBMS LINTER BASTION and DBMS LINTER STANDARD;
- Security Vision Security Governance, Risk Management and Compliance and DBMS LINTER BASTION and DBMS LINTER STANDARD;
- Security Vision Security Operation Center and DBMS LINTER BASTION and DBMS LINTER STANDARD;
- Security Vision CII and DBMS LINTER BASTION and DBMS LINTER STANDARD.
Companies have confirmed the compatibility of software products with the release of relevant certificates. Intellectual Security Group and RELEX Group plan to further develop the technological partnership and ensure the compatibility of their software products in the interests of customers.
Software products from both manufacturers ON are included in. register of Russian software Ministry of Communications