RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Security Vision CII

Product
The name of the base system (platform): Security Vision Specialized platform for automating information security processes
Developers: GC Intelligent Security (Security Vision Brand)
Last Release Date: 2025/02/25
Technology: Information Security Management (SIEM)

Main article: Security Information and Event Management (SIEM)

A software product for automating the process of categorizing and ensuring the security of critical information infrastructure objects in accordance with legislative and regulatory requirements. Security Vision CII is built on the basis of a graphical workflow designer, which gives the Customer the opportunity to adapt the basic product procedures to their unique internal business processes.

Results of use

2025: Implementation of legal requirements in terms of CII in automatic mode

On February 25, 2025, Security Vision announced the entry into the market of the updated Security Vision CII product, which ensures the implementation of legislative requirements in terms of critical information infrastructure in automatic mode.

Security Vision CII

According to the company, Security Vision CII automates the following processes:

  • Formation of an up-to-date list of CII objects and critical processes
  • Categorization of CII objects in order to determine the category of significance
  • Modeling of threats safety information to identify actual threats in relation to the object of CII
  • Assessment of compliance of CII facilities with information security requirements
  • Handling Regulatory Requests and Related Tasks

Security Vision CII can be used both in small and medium-sized businesses and in large enterprises with a geographically distributed structure. For the latter, it is possible to divide powers and areas of responsibility (for example, the isolation of each of the branches or controlled enterprises).

The process of categorizing CII objects using CII Security Vision begins with identifying critical processes of the organization, in case of violation of which can lead to negative consequences. The product generates a list of critical processes and identifies critical information infrastructure objects that automate these processes.

The indicators of the significance criteria and their values are evaluated to determine the category of significance, and all the necessary information on the CII object is filled in. In this case, all information on related assets is automatically filled in from the asset model.

As a result of the categorization process, documents are formed that fully comply with the requirements of the FSTEC of Russia:

  • Information on the results of assigning one of the categories of significance to the CII object or on the absence of the need to assign one of these categories to it
  • Act of CII object categorization

The process of modeling threats in relation to CII objects is carried out taking into account all objects of influence and their components with the ability to flexibly form a modeling area.

Threat modeling includes:

  • Identification of negative consequences in the form of damage to the organization in the event of a computer incident, which may lead to a violation or termination of the critical process
  • Identify Potential Violators (Threat Sources)
  • Add risk groups automatically or manually
  • Add automatic or manual threat implementations
  • Add threats automatically or manually

Threat modeling is carried out in accordance with the methodological document of the FSTEC of Russia - "Methodology for assessing threats to information security." The result of the simulation is a list of current threats in relation to the objects of influence and their components, which, in turn, are part of the CII object.

The compliance assessment process is carried out in relation to the CII facilities to assess the requirements and safety measures implemented in accordance with the orders of the FSTEC of Russia No. 235 and No. 239. The assessment is carried out by filling out information on the current state of the CII facility with the ability to delegate (in whole or in part) questionnaires to the relevant experts.

Based on unrealized and incomplete requirements, a list is formed with the possibility of creating tasks to eliminate non-conformities.

Security Vision CII processes requests from the following regulators:

The request received from the regulator is entered into the system. If necessary, a task is formed for a certain performer with a due date, as well as with the ability to control the execution. Two-way integration with the main external ITSM systems is implemented with the ability to create applications and track their status.

The Security Vision of the CII has developed in depth the main reports on the CII processes both for sending to the FSTEC of Russia and for internal use.

Dashboards highlight CII objects, on which it is necessary to categorize and simulate threats in the near future, help to track current threats and violators on an ongoing basis. The interactive map displays statistics for all controlled organizations and branches distributed throughout the country.

2019: Linter DBMS compatibility

On July 8, 2019, Intelligent Security announced that, together with RELEX Group of Companies, they have successfully completed testing the compatibility of their own software products:

Companies have confirmed the compatibility of software products with the release of relevant certificates. Intellectual Security Group and RELEX Group plan to further develop the technological partnership and ensure the compatibility of their software products in the interests of customers.

Software products from both manufacturers ON are included in. register of Russian software Ministry of Communications