IC34 Guide to IACS Cybersecurity Design and Networking

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/309

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

310 Terms

1
New cards

What is the primary focus of the IACS Cybersecurity course?

Design, implementation, and testing of cybersecurity in industrial automation and control systems.

2
New cards

What are some primary information sources for the course?

ISA/IEC 62443 standards, US Department of Homeland Security, NIST, and Center for Internet Security.

<p>ISA/IEC 62443 standards, US Department of Homeland Security, NIST, and Center for Internet Security.</p>
3
New cards

What are the three phases of the IACS Cybersecurity Lifecycle?

Assess, Develop & Implement, and Maintain.

<p>Assess, Develop &amp; Implement, and Maintain.</p>
4
New cards

What is the goal of the Assess phase in the IACS Cybersecurity Lifecycle?

To assign a Target Security Level (SL-T) and ensure that Achieved Security Level (SL-A) meets or exceeds it.

5
New cards

What happens during the Develop & Implement phase?

Countermeasures are implemented to meet the Target Security Level (SL-T).

6
New cards

What is the focus of the Maintain phase in the IACS Cybersecurity Lifecycle?

To ensure that Achieved Security Level (SL-A) is maintained and audited as necessary.

7
New cards

What is the first step in the Assess phase of the IACS Cybersecurity Lifecycle?

Conducting a High-Level Cyber Risk Assessment.

8
New cards

What is included in the Cybersecurity Requirements Specification?

It outlines the security requirements for industrial automation and control systems.

9
New cards

What is the significance of the ANSI/ISA-62443 standards?

They provide guidelines for security in industrial automation and control systems.

10
New cards

What is the role of periodic cybersecurity audits?

To assess and ensure the effectiveness of implemented cybersecurity measures.

11
New cards

What is the purpose of the Cyber Incident Response plan?

To outline procedures for responding to cybersecurity incidents.

12
New cards

What does the term 'system hardening' refer to?

The process of securing a system by reducing its surface of vulnerability.

13
New cards

What is the goal of network segmentation in cybersecurity?

To divide a network into smaller, manageable segments to enhance security.

14
New cards

What is the function of firewalls in cybersecurity?

To monitor and control incoming and outgoing network traffic based on predetermined security rules.

15
New cards

What is an Intrusion Detection System (IDS)?

A system that monitors network traffic for suspicious activity and alerts the user.

16
New cards

What does the acronym CEU stand for?

Continuing Education Units.

17
New cards

What is the importance of the Cybersecurity Acceptance Test Plan (CFAT/CSAT)?

To verify that cybersecurity measures meet specified requirements before deployment.

18
New cards

What does the Cybersecurity Management System include?

Policies, Procedures, Training & Awareness

19
New cards

What is the purpose of a Cybersecurity Requirements Specification (CRS)?

To outline the cybersecurity requirements for an IACS, including security levels and risk assessments.

20
New cards

What are the five Security Levels (SL) defined in ISA/IEC 62443?

SL 0: No requirements; SL 1: Protection against casual violations; SL 2: Protection against intentional violations with low resources; SL 3: Protection against intentional violations with moderate resources; SL 4: Protection against intentional violations with high resources.

21
New cards

What are the Four 'Ts' of Managing Risk?

Tolerate, Transfer, Terminate, Treat

22
New cards

What is the output of a risk assessment used for?

It serves as input for the development and implementation of security strategies.

23
New cards

What does SL-T stand for?

Target Security Level, which is the desired level of security for a specific zone or conduit.

24
New cards

What is the purpose of periodic cybersecurity audits?

To assess and ensure the effectiveness of the cybersecurity management system.

25
New cards

What information should a good risk assessment provide?

Risk profile, highest severity consequences, threats/vulnerabilities, target security levels, and recommendations.

26
New cards

What is included in the Cybersecurity Requirements Specification (CRS)?

SUC description, zone and conduit drawings, characteristics, operating environment assumptions, threat environment, security policies, tolerable risk, and regulatory requirements.

27
New cards

What is the purpose of the 'Deter' strategy in the Five 'Ds' of Treating Risk?

To discourage attackers from attempting a breach.

28
New cards

What does the 'Detect' strategy aim to achieve?

To monitor areas for unauthorized intrusion and respond appropriately.

29
New cards

What is the goal of the 'Delay' strategy?

To slow down an active intrusion to allow security response.

30
New cards

What is the 'Deny' strategy focused on?

Keeping unauthorized persons out while allowing authorized access.

31
New cards

What does the 'Defeat' strategy involve?

A security response to apprehend an intruder.

32
New cards

What is the significance of the security level correlation and iterative cycle?

It helps in assessing and improving the security posture of the system.

33
New cards

What is the purpose of developing a security strategy?

To identify zones, evaluate risks, establish target security levels, and develop access control measures.

34
New cards

What does SL-A represent?

Achieved security level, which is the current security level of a zone or conduit.

35
New cards

What does SL-C stand for?

Capability security level, the highest security level obtainable by a zone or component.

36
New cards

What is the role of surveillance technology in the 'Deter' strategy?

To make it obvious to potential intruders that they are being monitored.

37
New cards

What is the objective of the delay perimeter?

To slow down an intruder to allow security personnel to respond.

38
New cards

What is the importance of logical and physical boundaries in security documentation?

To define the scope and limits of security measures for each zone or conduit.

39
New cards

What are the main components of a security strategy for access points?

Identifying physical and cyber access points and developing corresponding security measures.

40
New cards

What does the term 'tolerable risk' refer to?

The level of risk that an organization is willing to accept.

41
New cards

What is the role of the ISA99 community?

To discuss and develop standards related to industrial automation and cybersecurity.

42
New cards

What is the purpose of establishing a Target Security Level (SL-T)?

To clearly communicate the desired security level for design and implementation.

43
New cards

What is meant by 'integrated, defense-in-depth' in the context of the Five 'Ds'?

A comprehensive approach that uses multiple layers of security measures to protect against threats.

44
New cards

What is the purpose of applying the 5Ds in IACS Cybersecurity?

To develop a multi-faceted physical and cybersecurity protection strategy.

45
New cards

What should security policies and procedures address?

Both physical and cybersecurity in the protection of assets.

46
New cards

What is required to establish physical security perimeters?

One or more barriers to unauthorized access to protected assets.

47
New cards

What is the objective of deterring cyber attacks?

To prevent attackers from attempting a breach of the system.

48
New cards

Name one strategy to deter cyber attacks.

Implementing policies and procedures.

49
New cards

What is the goal of detecting cyber attacks?

To monitor systems for unauthorized intrusion and respond appropriately.

50
New cards

What tools can be used for detecting cyber attacks?

Intrusion detection systems (IDS), security incident and event monitoring (SIEM), and anti-virus software.

51
New cards

What is the purpose of delaying cyber attacks?

To slow down an active intrusion to allow security teams to respond.

52
New cards

Name a strategy for delaying cyber attacks.

Implementing security hardening and patching.

53
New cards

What is the objective of denying cyber attacks?

To keep unauthorized users or software out while allowing authorized access.

54
New cards

What tools can be used to deny cyber attacks?

Firewalls, whitelisting, and intrusion prevention systems (IPS).

55
New cards

What does the 'defeat/respond' phase entail?

Taking action to eradicate intruders or malicious software and restoring normal conditions.

56
New cards

What is a secondary objective of the defeat/respond phase?

To retain forensic evidence to identify and apprehend the intruder.

57
New cards

What is included in a conceptual cybersecurity design specification?

Documenting new or upgraded security countermeasures to achieve the Target Security Level (SL-T).

58
New cards

What are the 7 Foundational Requirements (FR) in ISA/IEC-62443?

1. Identification and authentication control (IAC), 2. Use control (UC), 3. System integrity (SI), 4. Data confidentiality (DC), 5. Restricted data flow (RDF), 6. Timely response to events (TRE), 7. Resource availability (RA).

59
New cards

What does the SL vector method describe?

It describes security requirements for a zone, conduit, component, or system using multiple values instead of a single number.

60
New cards

What is the significance of the 'least privilege' principle?

It ensures that users have the minimum level of access necessary to perform their functions.

61
New cards

What is the role of access controls in foundational requirements?

Access controls must not prevent the operation of essential functions of high availability IACS.

62
New cards

What is the objective of the 'Deter' strategy in cybersecurity?

To discourage attackers from attempting to breach the system.

63
New cards

What is meant by 'security hardening'?

The process of securing a system by reducing its surface of vulnerability.

64
New cards

What is the function of intrusion prevention systems (IPS)?

To monitor network traffic for malicious activity and block it.

65
New cards

What is the purpose of multifactor authentication?

To enhance security by requiring multiple forms of verification before granting access.

66
New cards

What are some examples of delay strategies in cybersecurity?

Encryption, network segmentation, and access controls.

67
New cards

What is the importance of training personnel in cybersecurity?

To help them detect phishing and social engineering attacks effectively.

68
New cards

What does 'timely response to events' refer to in cybersecurity?

The ability to react quickly to security incidents to minimize damage.

69
New cards

What is a 'honey pot' system?

A security resource whose value lies in being probed, attacked, or compromised.

70
New cards

What does 'obscurity' refer to in deterrent strategies?

Making systems less visible or understandable to potential attackers.

71
New cards

What is the purpose of Authorization enforcement?

To ensure that only authorized users have access to the system.

72
New cards

What does SR2.02 refer to in wireless use control?

It refers to the management and control of wireless access to the system.

73
New cards

What is the significance of Session lock in control systems?

It prevents unauthorized access by locking user sessions after a period of inactivity.

74
New cards

What is the role of Active Directory in access control?

It provides centralized management for Windows-based systems and can also support Radius and LDAP.

75
New cards

What does FR3 focus on in System Integrity?

It ensures the integrity of the Industrial Automation and Control System (IACS) to prevent unauthorized manipulation.

76
New cards

What is meant by Communication integrity (SR3.01)?

It ensures that communication channels are secure and data is not altered during transmission.

77
New cards

What is the purpose of Data Confidentiality (FR4)?

To ensure the confidentiality of information on communication channels and in data repositories.

78
New cards

What technologies are used for Data Confidentiality?

Physical security, encryption/cryptography, and secure protocols.

79
New cards

What does FR5 aim to achieve regarding Restricted Data Flow?

It aims to limit unnecessary data flow by segmenting the control system via zones and conduits.

80
New cards

What is the function of Intrusion Detection Systems (IDS)?

To monitor network traffic for suspicious activity and potential threats.

81
New cards

What does FR6 emphasize in Timely Response to Events?

It emphasizes responding to security violations by notifying authorities and taking corrective action.

82
New cards

What is the role of Continuous Monitoring in security?

To ensure ongoing surveillance of the system for any security breaches or anomalies.

83
New cards

What does FR7 focus on regarding Resource Availability?

It ensures the availability of the control system against degradation or denial of essential services.

84
New cards

What technologies are utilized for Resource Availability?

Rate limiting firewalls, backup/restore tools, and Uninterruptible Power Supply (UPS).

85
New cards

What is the ISA 62443-4-1 framework about?

It outlines Product Security Development Life-Cycle Requirements for secure component development.

86
New cards

What does the term 'Defense in depth' refer to?

A security strategy that employs multiple layers of defense to protect information and systems.

87
New cards

What is the purpose of Change and version management in system integrity?

To track and control changes to system configurations and software to maintain integrity.

88
New cards

What does SR4.03 highlight in the context of Data Confidentiality?

It emphasizes the use of cryptography to protect sensitive information.

89
New cards

What is the significance of Error handling (SR3.07)?

To ensure that the system can gracefully handle errors without compromising security or functionality.

90
New cards

What does the term 'Malicious code protection' (SR3.02) refer to?

It involves measures to detect and prevent malware from affecting the system.

91
New cards

What is the purpose of Network segmentation (SR5.01)?

To isolate different parts of the network to enhance security and control data flow.

92
New cards

What does the term 'Least functionality' (SR7.07) imply?

It refers to configuring systems to provide only the necessary functions to reduce vulnerabilities.

93
New cards

What is the Capability Maturity Model Integration for Development (CMMI-DEV)?

A framework that ranges from Level 1: Initial to Level 4: Improving, focusing on continuous improvements in processes.

94
New cards

How many practice requirements are outlined in CMMI-DEV?

47 practice requirements covering development processes, threat modeling, and secure operation guidelines.

95
New cards

What does ISA/IEC-62443-4-2 provide?

Component requirements for four types of components: Software application, Embedded device, Host device, and Network device.

96
New cards

What is the purpose of ISA/IEC-62443-3-3?

It provides System Requirements (SR) and Requirement Enhancements (RE) for security.

97
New cards

What is the role of ISASecure in the certification process?

It uses certified components with matching or exceeding Security Level Capabilities (SL-C) to help in achieving Security Level Assurance (SL-A).

98
New cards

What are the seven foundational requirements in ANSI/ISA-62443-3-3?

They relate to Security Level Target Vector (SL-T) and technologies used per Foundational Requirement (FR).

99
New cards

What is the ISO OSI Reference Model?

A conceptual model for communication developed in the 1980s that partitions the flow of data in a communication system.

100
New cards

What does Layer 1 of the OSI model define?

The physical protocols for transmitting messages between devices, including frequencies, voltages, and connectors.