Industrial Cyber Security Controls from IEC62443 for ICS/OT
- Description
- Curriculum
- FAQ
- Reviews
Safeguarding critical infrastructures like Power plants, Oil & Gas industry, Wind power, Manufacturing, Food processing etc., all are now integrated with It technologies and some of them are connected to the internet as well. This convergence of IT and OT is increasing changes of being exposed or increased attack surface. Hence cybersecurity requirement for OT/ICS industry is prime concern now. Most of the industries are now implementing these measures and mitigating risks.
ICS systems comprises of SCADA, DCS, PLC and many more proprietary systems and protocols, designing a cybersecurity solution for these system needs understanding of both OT related applications and IT related controls which can fit into these environments.
In this course we will learn about 62443 standard and technical controls which can be implemented in the ICS environment. What are the controls and how that can be implemented, what could be probable weakness and what does industry assessment says about those prescribed cybersecurity controls.
At the end of course learner will have understanding of the type of cybersecurity controls for authentication and authorization, Network security, in the Industrial environment, like dual factor authentications, smart cards etc. These are based on guidelines hence in the upcoming courses learner will understand the required cybersecurity controls for the critical infrastructure.
-
1Introduction About IECVideo lesson
In this lecture we will learn about IEC 62443, In total, we will understand all segments of IEC 62443
-
2Security Levels (SL0 to SL5)Video lesson
In this lecture you will learn about several Security level which will be used in upcoming lectures or in your industry as well.
-
3Levels of Control System (Contextual Model (L0-L4)Video lesson
In this module you will learn about the levels of control system as per contextual model of 62443.
-
4Maturity LevelsVideo lesson
In this module we will see what are four maturity levels and how they are different from security levels.
-
5Security Level types: Target, Achieved and CapabilityVideo lesson
In this module we will learn about types of security level as per standard.
-
6Zone & ConduitsVideo lesson
In this module we will learn about zones and conduits, which is basic of contextual model or any other as per standard.
-
7Foundational requirementsVideo lesson
In this chapter we will learn about foundational requirements for setting up or maintaining a IACS system
-
8Identification and AuthenticationVideo lesson
-
9Use ControlVideo lesson
We will understand use control and its rationale , what is use control and privilege.
-
10System IntegrityVideo lesson
-
11Data ConfidentialityVideo lesson
-
12Restricted Data flowVideo lesson
We will learn about why network segmentation is required or how can we restrict data.
-
13Timely response to eventsVideo lesson
What are incidents and how to address this requirement
-
14Resource AvailabilityVideo lesson
Availability is utmost important in industrial control system, that is why it is one of the foundational requirement.
-
15Authentication & Authorization BriefingVideo lesson
In this video you will see and understand the purpose and process of authentication and authorization. Please understand the authorization in brief.
-
16Role Based Access ControlVideo lesson
-
17Password AuthenticationVideo lesson
This video will make you understand about the purpose and technical of password authentication in ICS/OT industry.
-
18Challenge/response AuthenticationVideo lesson
What is CHAP and how it works? Please see to understand.
-
19Physical Token AuthenticationVideo lesson
In this lecture you will learn about Physical token and its usage, strength and weakness of this solution, as per IEC 62443 standards.
-
20Smart Card AuthenticationVideo lesson
In this lecture you will learn about Smart card usage in industrial control system and recommendations as per IEC 62443.
-
21Biometric AuthenticationVideo lesson
In this lecture you will learn about Biometric usage in industrial control system and recommendations as per IEC 62443.
-
22Location Based AuthenticationVideo lesson
In this lecture we will see how location based authentication can be incorporated in the Industrial control system.
-
23Password Distribution & ManagementVideo lesson
In this video we will learn about importance of password management, types of password related attacks and types of OTP.
-
24Device to Device AuthenticationVideo lesson
In this video we will see what is device to device authentication and how it can be implemented in industrial system.
This is last for authorization and authentication, will continue next modules in next course, please keep on checking for next courses by me.
-
25Network FirewallsVideo lesson
In this video you will understand about the types of network firewalls and differences between them. The recommendation and industry assessment of these firewalls.
-
26Host Based FirewallsVideo lesson
In this video you will understand about the types of host based firewalls. The recommendation and industry assessment of these firewalls.
-
27Virtual Local Area Networks (VLAN)Video lesson
In this video you will learn about VLANS and what security benefit it will bring to the infrastructure.
-
28Virtual Private Networks (VPN)Video lesson
In this video you will learn about virtual private networks and types of VPN protocols.
-
29Symmetric Key EncryptionVideo lesson
In this chapter we will learn about symmetric key encryption and how it works and very simplified explanation.
-
30Public Key EncryptionVideo lesson
In this chapter we will learn about public key encryption and how it works and very simplified explanation.
-
31Log Auditing UtilitiesVideo lesson
In this chapter we will learn about the log management methods, log collection and what we want to achieve.
-
32Virus and Malicious Code DetectionVideo lesson
In this chapter we will learn about the virus detection system, what make a VDS effective.
-
33Intrusion Detection SystemsVideo lesson
Types of Intrusion detection system and how to implement to get maximum out of it.
-
34How to implementVideo lesson
In this chapter we will learn about the basic process to start a cybersecurity program in industrial environment, like fist steps i.e how to start.
-
35Flowchart for Risk AssessmentVideo lesson
Basic flowchart of the activities of the high level risk and detailed risk assessments.
-
36ZCR 1: Identification of SuCVideo lesson
This will explain identification of system under consideration.
-
37ZCR 2: High Level Risk AssessmentVideo lesson
About High level risk assessment of the premises and IACS inventory.
-
38ZCR 3 : Partition of SuC in zones and conduitsVideo lesson
In this chapter we will learn about the type of zones based on the functionalities, communication and other aspects.
-
39ZCR 4: Detailed Risk AssessmentVideo lesson
In this chapter we will learn what to include in the detailed cybersecurity risk assessment.
-
40ZCR 5: Document Cybersecurity requirements, assumptions and constraintsVideo lesson
We will learn about documentation, threat analysis and pitfalls of risk assessment.
External Links May Contain Affiliate Links read more