ISA IC33 Flashcards
(116 cards)
Security Life Cycle include?
Access,
Develop & implement,
and Maintain Phase
Security Life Cycle is.
Continuous steps to minimize risk.
IC33 focus on the Access Phase. Access Phase include?
1- High Level Cybersecurity assessment
2- Allocation of IACS assets to Security Zones and Conduits
3- Detailed Cyber Risk Assessment
IC33 Access phase focuses are found in?
ISA/IEC62443-3-2
IC34 is related to the Develop & Implement phase which include?
4- Cyber Security Requirement Specification (CRS) ISA 62443-3-2
5- Design and Engineering of Cybersecurity Countermeasures ISA 62443-3-3
6- Installation, Commissioning, and Validation of Cyber security Countermeasures
- It also includes Design and Develop other means of Risk Reduction
IC34 Develop and Develop phase works with
ISA 62443-3-2 and ISA 62443-3-3
IC37 is the Maintain Phase which includes…
7- Cybersecurity maintenance, monitoring, and management of change ISA 62443-2-1
8- Cyber security response and Recovery ISA 62443-2-1
IC37 works with?
ISA/IEC62443-2-1
ISA 62443-2-1 also used for the the what?
- Cybersecurity management system for policies, procedures, training & Awareness.
- Periodic Cybersecurity Audits.
Before running any assessment you must define what?
The Scope of the project must be defined first.
Scope
Determine the parameters on what is included in the assessment and how it is performed.
Scope include?
1- Identify Requirement
2- Specify Devices.
3- Select Collection Method
4- Document
The Documents in the scope is to help identify
1- constrains
2- deliverables
3- assumptions
4- boundaries
Key Component of project scope include
1- system architecture diagram
2- Network Diagram
3- asset Inventory
4- Criticality assessment
ISA 62443 Reference Model include
- Level 0 Process
- Level 1 Safety/Protection and Basic Control
- Level 2 Supervisory Control
- Level 3 Operations Management
- Level 4 Enterprise Systems
Network Diagram should illustrate
- How the network logically and physically constructed.
- ## Port assignment, VLANS, device types.
Asset Inventory should be done for all component such as software, hardware, and network this can be done by means of
- Documentations
- Tools such as automated tools.
- Using Site Surveys.
Automated tools should always be tested
this is important to ensure no security vulnerability are introduced in the network.
Cyber Criticality Assessment
Is the measure of the negative impact, should information are not available, not reliable, or compromised . it will always refer to the AIC and how each one of them is effected.
CHAPTER 2
Cybersecurity vulnerability assessment
RISK IS?
Threat * Vulnerability * Consequences.
Understanding Vulnerability will help with
Better understanding the Risk.
Management is responsible to determine
The Acceptable Risk Level that they can tolerate - risk Tolerance.
Risk Types are divided into the following
- Design Risk Out by changing the design
- Reduce Risk by implementing countermeasure.
- Transfer risk using insurance.
- Eliminate and remove redundant controls.
- Accept Risk