ISA 62443 IC34 All Sets

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/227

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:09 PM on 3/18/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

228 Terms

1
New cards

What is the purpose of assigning a Target Security Level (SL-T) during the Assess phase of ICS security implementation?

To determine the existing vulnerabilities of the system.

2
New cards

What happens during the Develop & Implement phase of ICS security implementation?

Countermeasures are implemented to meet the Target Security Level (SL-T).

3
New cards

What is the primary goal of the Maintain phase in ICS security implementation?

To ensure the Achieved Security Level (SL-A) is equal to or better than the Target Security Level (SL-T).*

4
New cards

What is phase 1 of the IACS Cybersecurity Life Cycle?

Assess

5
New cards

What is phase 2 of the IACS Cybersecurity Life Cycle?

Develop & Implement

6
New cards

What is phase 3 of the IACS Cybersecurity Life Cycle?

Maintain phase

7
New cards

What is step 1 of the IACS Cybersecurity Life Cycle (Assess Phase)?

High-Level Cyber Risk Assessment

8
New cards

What is step 2 of the IACS Cybersecurity Life Cycle (Assess Phase)?

Allocation of IACS Assets to Security Zones or Conduits

9
New cards

What is step 3 of the IACS Cybersecurity Life Cycle (Assess Phase)?

Detail Cyber Risk Assessment

10
New cards

What is step 4 of the IACS Cybersecurity Life Cycle (Develop & Implement Phase)?

Cybersecurity Requirements Specification

11
New cards

What is step 5 of the IACS Cybersecurity Life Cycle (Develop & Implement Phase)?

Design and engineering of Cybersecurity countermeasures

12
New cards

What is step 6 of the IACS Cybersecurity Life Cycle (Develop & Implement Phase)?

Installation, commissioning and validation of Cybersecurity countermeasures

13
New cards

What is step 7 of the IACS Cybersecurity Life Cycle (Maintain)?

Cybersecurity Maintenance, Monitoring and Management of Change

14
New cards

What is step 8 of the IACS Cybersecurity Life Cycle (Maintain)?

Cyber Incident Response & Recovery

15
New cards

What are the continuous processes activities of the IACS Cybersecurity Life Cycle?

Cybersecurity Management System: Policies, Procedures, Training & Awareness, Periodic Cybersecurity Audits

16
New cards

A risk assessment should provide information about what?

An entire system as well as each zone

17
New cards

What information should be provided from a risk assessment?

-Risk profile

-Highest severity consequences

-Threats / vulnerabilities leading to the highest risks

-Target Security Levels

-Recommendations

18
New cards

A thorough risk assessment should deliver insights on system-wide, zone-specific, and conduit-specific levels and generate:

-Risk profile

-Highest severity consequences

-Threats / vulnerabilities leading to the highest risks

-Target Security Levels

-Recommendations

19
New cards

What is the output of a Risk Assessment called?

Cybersecurity Requirement Specification (CRS)

20
New cards

The CRS must include at least the following:

SUC description

Zone and conduit drawings

Zone and conduit characteristics

Operating environment assumptions

Threat environment

Organizational security policies

Tolerable risk

Regulatory requirements

21
New cards

What documents are required per zone/conduit?

•Name and/or unique identifier

•Accountable organization(s)

•Definition of logical boundary

•Definition of physical boundary, if applicable

•Safety designation

•List of all logical access points

•List of all physical access points

•List of data flows associated with each access point

•Connected zones or conduits

•List of assets and their classification, criticality and business value

•SL-T

•Applicable security requirements

•Applicable security policies

•Assumptions and external dependencies

22
New cards

How can the 5D's be applied to IACS's?

By developing a physical and cybersecurity protection strategy for each zone & conduit

23
New cards

What should physical and Cybersecurity protection strategy for each zone & conduit be based on?

-Risk assessment results

-Target Security Level

-Cybersecurity Requirements Specification

24
New cards

How many Security Levels (SLs) are defined in the ISA/IEC 62443 series?

5

25
New cards

What Security Level is defined as having no specific requirements or security protection necessary?

SL 0

26
New cards

What Security Level is defined as protection against casual or coincidental violation?

SL 1

27
New cards

What Security Level is defined as protection against intentional violation using simple means with low resources, generic skills and low motivation?

SL 2

28
New cards

What Security Level is defined as protection against intentional violation using sophisticated means with moderate resources, IACS specific skills and moderate motivation?

SL 3

29
New cards

What Security Level is defined as protection against intentional violation using sophisticated means with extended resources, IACS specific skills and high motivation?

SL 4

30
New cards

What Security Level (SL) is defined as the security level reached by a zone or conduit?

Achieved Security Level (SL-A)

31
New cards

What Security Level (SL) is defined as the highest security level obtainable by the zone, conduit, or component?

Capability Security Level (SL-C)

32
New cards

What Security Level (SL) must be verified by the ISASecure group EDSA/CSA Certifications?

Capability Security Level (SL-C)

33
New cards

For owner operators, what ISA standard maps the Capability Security Level (SL-C)?

ISA-62443-3-3

34
New cards

For product suppliers and ISASecure, what ISA standard maps the Capability Security Level (SL-C)?

ISA-62443-4-2

35
New cards

What Security Level (SL) is defined as assigned as part of the CRS documentation and the desired target of the zone or conduit?

Target Security Level (SL-T)

36
New cards

What is the purpose of establishing a Target Security Level (SL-T)?

Communicate the desired level of security for a specific zone or conduit.

37
New cards

How can the Target Security Level (SL-T) be expressed?

As a single value or a vector.

38
New cards

Where can you find more information on the SL vector approach?

Annex A of the ISA‑62443-3-3 standard

39
New cards

What are the two pillars of the IACS Cybersecurity Lifecycle contained within the ISA 62443-2-1?

Cybersecurity Management System: Policies, Procedures, Training & Awareness and Periodic Cybersecurity Audits

40
New cards

What is the first step of developing a Security Strategy?

Identify Zone

41
New cards

How many zones should be evaluated at once when developing your Security Strategy?

One at a time

42
New cards

What should be type of assessment results should be reviewed to inform the development of your Security Strategy?

Risk Assessment Results / Cybersecurity Requirement Specifications (CRS)

43
New cards

During the development of a Security Strategy, what should be done with Security Target Levels (SL-T)?

This type of Security Level (SL) should be established

44
New cards

Other than zones, what should be identified during the development of a Security Strategy?

physical and cyber access points

45
New cards

What is the objective and of developing a 5D physical and cybersecurity strategy while creating a Security Strategy?

To ensure security measures are in place to address each access point.

46
New cards

What are the four "T's" of Managing Risks?

Tolerate, Transfer, Terminate, Treat

47
New cards

Which "T" of Managing Risk is defined as risk known and accepted by the organization?

Tolerate

48
New cards

Which "T" of Managing Risk is defined as risk delegated to a third party?

Transfer

49
New cards

(True/False) Transferring risk to a third party eliminates the risk.

False

50
New cards

(True/False) The correlation of Security Levels is an Iterative Cycle

True

51
New cards

Which "T" of Managing Risk is defined as stopping the process, activity, or stopping the use of a premises, IT system at risk and hence the risk is no longer relevant.

Terminate

52
New cards

Which "T" of Managing Risk is defined as the endeavor to decrease the probability of the threat occurring or mitigate its impact through the implementation of appropriate controls and continuity strategies?

Treat

53
New cards

What are the five "Ds" of treating risk?

Deter

Detect

Delay

Deny

Defeat

54
New cards

What industries and sectors are the five "Ds" of treating risk used in?

-Nuclear weapons security

-Physical / perimeter security

-Military defense

55
New cards

What is the objective of the first "D" in treating risk, Deter?

Thwart the attacker from even attempting a breach of the system.

56
New cards

How does the deter perimeter relate to the location of the assets?

This perimeter is the farthest one from the location of the assets.

57
New cards

What are some examples of physical infrastructure that can contribute to deterrence in risk treatment?

Examples of physical infrastructure that can contribute to deterrence in risk treatment include fences, lighting, visible surveillance technology, and signs saying "no trespassing" or "area under surveillance."

58
New cards

What is the objective of the second "D" in treating risk, Detect?

The objective is to monitor large areas of space and accurately detect possible unauthorized intrusion in time to respond appropriately.

59
New cards

How does surveillance camera technology contribute to accurate detection?

Surveillance camera technology, especially megapixel cameras, is highly effective as an accurate detection tool.

60
New cards

What are important objectives when it comes to intrusion detection?

timely notification to security personnel and the ability to analyze in detail and with context the where an intrusion was detected

61
New cards

What is the objective of the third "D" in treating risk, Delay?

To slow down an active intrusion enough to force the intruder to give up or allow the security team to respond.

62
New cards

What is the objective of the fourth "D" in treating risk, Deny?

To keep unauthorized persons out, while allowing authorized persons to enter

63
New cards

What is the objective of the fifth "D" in treating risk, Deny?

A response that attempts to apprehend or the intruder or destroy the attack kill chain.

64
New cards

What is the objective of the sixthn "D" in treating risk, Defeat?

A security personnel response that attempts to apprehend the intruder.

65
New cards

How can the 5D's be applied to IACS's?

By developing a physical and cybersecurity protection strategy for each zone & conduit

66
New cards

What should physical and Cybersecurity protection strategy for each zone & conduit be based on?

-Risk assessment results

-Target Security Level

-Cybersecurity Requirements Specification

67
New cards

What is required to establish complementary physical and cybersecurity policies

Security policies and procedures shall be established for both physical and cybersecurity to protect assets.

68
New cards

What is required to establish physical security perimeter(s)?

Physical security perimeters shell be established to prevent unauthorized access to protected assets.

69
New cards

What is required to provide entry controls?

At each barrier or boundary, appropriate entry controls shall be provided.

70
New cards

What is the objective of deterring cyber attacks?

The goal is to discourage potential attackers from breaching the system, by demonstrating a firm commitment to system defense and pursuing prosecution of intruders.

71
New cards

Deter strategies and tools:

Policies and procedures

Warning banners

Obscurity

72
New cards

What is the objective of detecting cyber attacks?

The aim is to vigilantly monitor systems, enabling timely detection and appropriate response to potential unauthorized intrusions.

73
New cards

Detection strategies and tools:

Intrusion detection systems (IDS)

Security incident and event monitoring (SIEM)

Anti-virus

Firewalls

Email / URL filtering

Train personnel to detect phishing and social engineering

74
New cards

What is the goals of delaying cyber attacks?

The aim is to decelerate an ongoing intrusion, prompting the intruder to abandon the attack or enabling the security team to react.

75
New cards

Delay strategies and tools:

Security Hardening

Patching

Encryption

Network segmentation

Access controls

Honey Pot Systems

76
New cards

What is the goal of denying cyber attacks?

The goal is to prevent unauthorized users or software access, while granting access to authorized users or software.

77
New cards

Denial strategies and tools:

Firewalls

Whitelisting

Intrusion Prevention Systems (IPS)

Access controls

78
New cards

What is the goal of defeat/responding to cyber attacks?

The aim is to eliminate intruders or malicious software, restore the system to normal, and retain forensic evidence to identify and prosecute the intruder.

79
New cards

Defeat/respond strategies and tools:

Malware removal tools

Policies & procedures

Intrusion Prevention

80
New cards

Conceptual Cybersecurity Design Specifications:

Document the new or upgraded security countermeasures that are planned to achieve the Target Security Level (SL-T)

Scope of work

Conceptual system architecture

Budgetary cost and schedule estimates

i.e. new systems (Greenfield) vs existing systems or (Brownfield)

81
New cards

What Foundational Requirements (FR) is Identification and authentication control (IAC)?

FR 1

82
New cards

What are three common constraints of Control System Security?

Support of essential functions

Compensating countermeasures

Least privilege

83
New cards

What Foundational Requirements (FR) is Use control (UC)?

FR 2

84
New cards

What Foundational Requirements (FR) is System integrity (SI)?

FR 3

85
New cards

What Foundational Requirements (FR) is Data confidentiality (DC)?

FR 4

86
New cards

What Foundational Requirements (FR) is Restricted data flow (RDF)?

FR 5

87
New cards

What Foundational Requirements (FR) is Timely response to events (TRE)?

FR 6

88
New cards

What Foundational Requirements (FR) is Resource availability (RA)?

FR 7

89
New cards

How can a vector be more effective in describing the security requirements for a zone, conduit, component, or system compared to a single number?

By providing a more detailed and comprehensive representation of security requirements, considering multiple aspects or parameters beyond a single number.

90
New cards

In what scenario can the security level be defined per PR instead of having the same security level for each Foundational Requirement (FR)?

If a system does not require the same security level for every Foundational Requirement (FR), it is possible to define the security level on a per PR (Protection Requirement) basis, tailoring the security measures accordingly.

91
New cards

What is definition of FR 1?

Identify and authenticate all users before allowing them to access to the control system.

92
New cards

(True/False) For FR 1, "Users" includes humans, software processes, and devices.

True

93
New cards

What is a definition of FR 2?

Ensure that authenticated users only have access to authorized actions within the control system.

94
New cards

What two Functional Requirements (FRs) compose Access Control?

FR 1 and FR 2

95
New cards

What is a definition of FR 3?

Ensure the integrity of the IACS by safeguarding communication channels, maintaining secure configurations and software, implementing change and version management, protecting against malware, securing stored data/records, utilizing encryption, and enabling read-only access.

96
New cards

What is a definition of FR 4?

The key components of a secure industrial control system include physical security, secure communication protocols, data integrity, malware protection, EICAR test string verification, source code management systems, detection of unauthorized changes, secure programming techniques, input validation on HMI and controller, and error handling for output to a predetermined state during attacks.

97
New cards

What is a definition of FR 5?

Ensure the confidentiality of sensitive information by protecting communication channels and data repositories against unauthorized disclosure and eavesdropping.

98
New cards

What technologies ensure Data Confidentiality?

Physical security measures, encryption/cryptography, and the use of secure protocols.

99
New cards

What Technologies ensure System Integrity?

Network segmentation through zones and conduits to control data flow and the use of unidirectional gateways, stateful firewalls, and DMZs to isolate control system networks from business or public networks.

100
New cards

What is a definition of FR 5?

Segmenting the control system using zones and conduits to limit unnecessary data flow and disconnecting control system networks from business or public networks. This is achieved through the use of unidirectional gateways, stateful firewalls, and DMZs to effectively manage the flow of information.

Explore top flashcards

flashcards
APUSH Progressive Era PEDLIGS
84
Updated 907d ago
0.0(0)
flashcards
US History Chapter 10 Test
32
Updated 98d ago
0.0(0)
flashcards
Latin and Greek Roots List 1-3
75
Updated 333d ago
0.0(0)
flashcards
Numbers 1 - 20
20
Updated 528d ago
0.0(0)
flashcards
Business Law - Midterm
126
Updated 186d ago
0.0(0)
flashcards
La inmigración
45
Updated 488d ago
0.0(0)
flashcards
APUSH Progressive Era PEDLIGS
84
Updated 907d ago
0.0(0)
flashcards
US History Chapter 10 Test
32
Updated 98d ago
0.0(0)
flashcards
Latin and Greek Roots List 1-3
75
Updated 333d ago
0.0(0)
flashcards
Numbers 1 - 20
20
Updated 528d ago
0.0(0)
flashcards
Business Law - Midterm
126
Updated 186d ago
0.0(0)
flashcards
La inmigración
45
Updated 488d ago
0.0(0)