What are the three phases of the IACS lifecycle?
Assess, Develop & Implement & Maintain
A zone is assigned a target security level (SL-T) during the … phase?
Assess
Countermeasures are implemented to meet the Target Security Level (SL-T) during the … phase?
Develop & Implement
During the … phase, you ensure the achieved security level (SL-A) is better then or equal to the Target Security Level (SL-T)?
Maintain
What are the three areas of the Assess phase?
High-Level Cyber Risk Assessment
Allocation of IACS Assets to Security Zones or Conduits
Detailed Cyber Risk Assessment
What are the continuous processes?
Cybersecurity Management System: Policies, Procedures, Training & Awareness (IEC 62443-2-1)
Periodic Cybersecurity Audits (IEC 62443-2-1)
What are the four areas of the Develop & Implement Phase?
Cybersecurity Requirements Specification (ISA 62443-3-2)
Design and engineering of Cybersecurity countermeasures (ISA 62443-3-3)
Design and development of other means of risk reduction
Installation, commissioning and validation of Cybersecurity countermeasures
What are the two areas of the Maintain Phase?
Cybersecurity Maintenance Monitoring and Management of Change (ISA 62443-2-1)
Cyber Incident Response & Recovery
(ISA 62443-2-1)
Venn Diagram
How does an Asset Owner use ISA/IEC 62443-2-1?
Asset Owner selects risk assessment methodology, assigns roles and responsibilities, ensures appropriate training, resources, etc.
How does an Asset Owner and ISP use ISA/IEC 62443-3-2
Asset Owner and Integration
Service Provider use this part
to assess the risks of the
(SuC) System under
Consideration and meet with
the different ZCR’s (Zone and
Conduit Requirements)
How does an Asset Owner and ISP use ISA/IEC 62443-3-3?
Asset Owner and Integration
Service Provider use this part as a
guidance to bridge from risk
assessment outcome towards
system related security
requirements based on assigned
SL-T (Security Level Target).
How does a Product Supplier use ISA/IEC 62443-3-3?
Product Suppliers use this part to
understand what needs to be
developed to meet the needs of
the market for a specific type of
system.
How does a Product Supplier use ISA/IEC 62443-4-1 and ISA/IEC 62443-4-2?
Product Supplier uses these
parts to understand the
requirements placed on
control system components
for specific security
capability levels (SL-C) and
develop the components
accordingly.
What is a SuC (System Under Consideration)?
An SuC (System Under Consideration)
consists of multiple IACS assets
ranging from tens of assets to
hundreds or thousands of them
What is the Necessary Information that needs documenting to perform a Risk Assessment? (Prepare phase)
What are the Key Components to gather in the prepare phase?
What is the purpose of System Architecture Diagrams?
*Illustrate the components of
the system
* Illustrate connectivity
* Illustrate physical location
What are some System Architecture Diagrams Recommendations?
How many ISA-95 Functional Layers?
5 = (0,1,2,3,4)
What is ISA 95 Level 0?
Level 0 — The physical process — Defines the actual physical processes.
What is ISA 95 Level 1?
Level 1 — Intelligent devices — Sensing and manipulating the physical processes. Process, sensors, analyzers, actuators and related instrumentation.
What is ISA 95 Level 2?
Level 2 — Control systems — Supervising, monitoring and controlling the physical processes. Real-time controls and software; DCS, human-machine interface (HMI); supervisory and data acquisition (SCADA) software.
What is ISA 95 Level 3?
Level 3 — Manufacturing operations systems — Managing production workflow to produce the desired products. Batch management; manufacturing execution/operations management
systems (MES/MOMS); laboratory, maintenance and plant performance management systems; data historians and related middleware. Time frame: shifts, hours, minutes, seconds.