Safeguarding critical infrastructures like Power plants, Oil & Gas industry, Wind power, Manufacturing, Food processing etc., all are now integrated with It technologies and some of them are connected to the internet as well. This convergence of IT and OT is increasing changes of being exposed or increased attack surface. Hence cybersecurity requirement for OT/ICS industry is prime concern now. Most of the industries are now implementing these measures and mitigating risks.
ICS systems comprises of SCADA, DCS, PLC and many more proprietary systems and protocols, designing a cybersecurity solution for these system needs understanding of both OT related applications and IT related controls which can fit into these environments.
In this course we will learn about 62443 standard and technical controls which can be implemented in the ICS environment. What are the controls and how that can be implemented, what could be probable weakness and what does industry assessment says about those prescribed cybersecurity controls.
At the end of course learner will have understanding of the type of cybersecurity controls for authentication and authorization, Network security, in the Industrial environment, like dual factor authentications, smart cards etc. These are based on guidelines hence in the upcoming courses learner will understand the required cybersecurity controls for the critical infrastructure.
Foundational Requirements
-
1Introduction About IEC
In this lecture we will learn about IEC 62443, In total, we will understand all segments of IEC 62443
-
2Security Levels (SL0 to SL5)
In this lecture you will learn about several Security level which will be used in upcoming lectures or in your industry as well.
-
3Levels of Control System (Contextual Model (L0-L4)
In this module you will learn about the levels of control system as per contextual model of 62443.
-
4Maturity Levels
In this module we will see what are four maturity levels and how they are different from security levels.
-
5Security Level types: Target, Achieved and Capability
In this module we will learn about types of security level as per standard.
-
6Zone & Conduits
In this module we will learn about zones and conduits, which is basic of contextual model or any other as per standard.
-
7Foundational requirements
In this chapter we will learn about foundational requirements for setting up or maintaining a IACS system
Authentication & Authorization Technologies
-
8Identification and Authentication
-
9Use Control
We will understand use control and its rationale , what is use control and privilege.
-
10System Integrity
-
11Data Confidentiality
-
12Restricted Data flow
We will learn about why network segmentation is required or how can we restrict data.
-
13Timely response to events
What are incidents and how to address this requirement
-
14Resource Availability
Availability is utmost important in industrial control system, that is why it is one of the foundational requirement.
Network Protection Technologies
-
15Authentication & Authorization Briefing
In this video you will see and understand the purpose and process of authentication and authorization. Please understand the authorization in brief.
-
16Role Based Access Control
-
17Password Authentication
This video will make you understand about the purpose and technical of password authentication in ICS/OT industry.
-
18Challenge/response Authentication
What is CHAP and how it works? Please see to understand.
-
19Physical Token Authentication
In this lecture you will learn about Physical token and its usage, strength and weakness of this solution, as per IEC 62443 standards.
-
20Smart Card Authentication
In this lecture you will learn about Smart card usage in industrial control system and recommendations as per IEC 62443.
-
21Biometric Authentication
In this lecture you will learn about Biometric usage in industrial control system and recommendations as per IEC 62443.
-
22Location Based Authentication
In this lecture we will see how location based authentication can be incorporated in the Industrial control system.
-
23Password Distribution & Management
In this video we will learn about importance of password management, types of password related attacks and types of OTP.
-
24Device to Device Authentication
In this video we will see what is device to device authentication and how it can be implemented in industrial system.
This is last for authorization and authentication, will continue next modules in next course, please keep on checking for next courses by me.
Encryption Technologies and Data Validation
-
25Network Firewalls
In this video you will understand about the types of network firewalls and differences between them. The recommendation and industry assessment of these firewalls.
-
26Host Based Firewalls
In this video you will understand about the types of host based firewalls. The recommendation and industry assessment of these firewalls.
-
27Virtual Local Area Networks (VLAN)
In this video you will learn about VLANS and what security benefit it will bring to the infrastructure.
Management, Audit, Measurement, Monitoring and Detection Tools
-
28Virtual Private Networks (VPN)
In this video you will learn about virtual private networks and types of VPN protocols.
-
29Symmetric Key Encryption
In this chapter we will learn about symmetric key encryption and how it works and very simplified explanation.
-
30Public Key Encryption
In this chapter we will learn about public key encryption and how it works and very simplified explanation.
Zones, Conduits and Risk Assessments
-
31Log Auditing Utilities
In this chapter we will learn about the log management methods, log collection and what we want to achieve.
-
32Virus and Malicious Code Detection
In this chapter we will learn about the virus detection system, what make a VDS effective.
-
33Intrusion Detection Systems
Types of Intrusion detection system and how to implement to get maximum out of it.
Cybersecurity Requirements & Techniques-Use Case
-
34How to implement
In this chapter we will learn about the basic process to start a cybersecurity program in industrial environment, like fist steps i.e how to start.
-
35Flowchart for Risk Assessment
Basic flowchart of the activities of the high level risk and detailed risk assessments.
-
36ZCR 1: Identification of SuC
This will explain identification of system under consideration.
-
37ZCR 2: High Level Risk Assessment
About High level risk assessment of the premises and IACS inventory.
-
38ZCR 3 : Partition of SuC in zones and conduits
In this chapter we will learn about the type of zones based on the functionalities, communication and other aspects.
-
39ZCR 4: Detailed Risk Assessment
In this chapter we will learn what to include in the detailed cybersecurity risk assessment.
-
40ZCR 5: Document Cybersecurity requirements, assumptions and constraints
We will learn about documentation, threat analysis and pitfalls of risk assessment.