
Industrial Automation Control System (IACS) Cybersecurity Design & Implementation (IC34) focuses on the activities associated with the design and implementation of IACS cybersecurity countermeasures. This includes the selection of appropriate countermeasures based upon their security level capability and the nature of the threats and vulnerabilities identified in the assess phase. The access phase includes cybersecurity acceptance testing of the integrated solution to validate that countermeasures are properly implemented and the IACS has achieved the target security level.
Students will learn the information and skills to select and implement cybersecurity countermeasures for a new or existing IACS in order to achieve the target security level assigned to each IACS zone or conduit. Additionally, students will learn how to develop and execute test plans to verify the cybersecurity of an IACS solution has properly satisfied the objectives in the cybersecurity requirements specification.
Prerequisite
Successful completion of Using the ISA/IEC 62443 Standards to Secure Your Control Systems (IC32) and passing the ISA/IEC 62443 Cybersecurity Fundamentals Specialist certificate exam are mandatory prerequisites for this course.
Who Should Attend IC34?
- Control systems engineers and managers
- System integrators
- IT engineers and managers in industrial facilities
- Plant managers
- Plant safety and risk management personnel
View Offerings by Format
Classroom (IC34)Length: 3 days |
|
|
Visit our course formats page for a detailed description of each format.
Learning Objectives
- Interpret the results of an industrial control system (ICS) cybersecurity risk assessment
- Develop a cybersecurity requirements specification (CRS)
- Develop a conceptual design based upon information in a well-crafted CRS
- Explain the security development lifecycle (SLD) process and deliverables
- Perform a basic firewall configuration and commissioning
- Design a secure remote access solution
- Develop system hardening specification
- Implement a basic network intrusion detection system (IDS)
- Develop a cybersecurity acceptance test plan
- Cybersecurity factory acceptance test (CFAT)
- Cybersecurity site acceptance test (CSAT)
- Perform a basic CFAT or CSAT
Topics Covered
- Introduction to the ICS Cybersecurity Lifecycle
- Assessment phase
- Implementation phase
- Maintenance phase
- Conceptual Design Process
- Interpreting risk assessment results
- Cybersecurity requirements specifications
- Developing a conceptual design
- Conceptual design specification
- Detailed Design Process
- SDL
- Types of technology
- Selecting appropriate technology
- Developing a detailed design
- Documenting the design/specification
- Design & Implementation Examples
- Firewall design example
- Remote access design example
- System hardening design example
- Intrusion detection design example
- Testing
- Developing test plans
- CFAT
- CSAT
Exercises
- Building the board
- Firewalls
- Defining USB policy and procedure
- Network device hardening
- Remote access
- Using 62443 3-3 to validate achieved security level (SL-A)
Recommended Prerequisites
ISA course Assessing the Cybersecurity of New or Existing IACS Systems (IC33) or equivalent knowledge/experience.
Resources Included*
- ISA-62443-1-1-2007, Security for Industrial Automation and Control Systems, Part 1-1: Terminology, Concepts, and Models
- ISA-62443-2-1 (99.02.01)-2009, Security for Industrial Automation and Control Systems, Part 2-1: Establishing an Industrial Automation and Control Systems Security Program
- ANSI/ISA-62443-3‑2-2020, Security for industrial automation and control systems, Part 3‑2: Security risk assessment for system design
- ANSI/ISA-62443-3-3 (99.03.03)-2013, ANSI/ISA-62443-3-3 (99.03.03)-2013 Security for industrial automation and control systems, Part 3-3: System security requirements and security levels