2134 VEN – Design and Implementation of Cybersecurity in New and Existing Industrial Systems (IC34 v3.0)

‎The second phase in the Industrial Systems Cybersecurity Lifecycle (IACS – defined in ISA/IEC-62443-1-1) focuses on activities associated with the design and implementation of cybersecurity countermeasures. This involves the selection of appropriate countermeasures based on their security-level capability and the nature of the threats and vulnerabilities identified in the assessment phase. This phase also includes conducting cybersecurity tests for the acceptance of the integrated solution, to validate that the countermeasures are implemented correctly and that the industrial system under consideration has reached the required level of security.‎
· December 2, 2022

‎This course will provide students with the information and skills to select and apply cybersecurity countermeasures for new or existing industrial systems (IACS) to achieve the level of security required and assigned to each zone and conduit. In addition, participants will learn how to develop and execute test plans to verify that the cybersecurity of the integrated solution has met the objectives of the cybersecurity requirements specification.‎

Current version of the course‎: 3.0

You will be able to:

  • Interpret the results of an ICS cybersecurity risk assessment
  • Develop a cybersecurity requirements specification (CRS)
  • Develop a conceptual design based upon information in a well-crafted CRS
  • Explain the security development lifecycle process and deliverables
  • Perform a basic firewall configuration and commissioning
  • Design secure remote access solution
  • Develop system hardening specification
  • Implement a basic network intrusion detection system
  • Develop a Cybersecurity Acceptance test plan (CFAT/CSAT)
  • Perform a basic CFAT or CSAT

You Will Cover:

  • Introduction to the ICS Cybersecurity Lifecycle
    • Assessment phase
    • Implementation phase
    • Maintenance phase
  • Conceptual Design Process
    • Interpreting risk assessment results
    • Cybersecurity requirements specifications
    • Developing a conceptual design
    • Conceptual design specification
  • Detailed Design Process
    • Security Development Lifecycle (SDL)
    • Types of technology
    • Selecting appropriate technology
    • Developing a detailed design
    • Documenting the design/specification
  • Design & Implementation Examples
    • Firewall design example
    • Remote access design example
    • System hardening design example
    • Intrusion detection design example
  • Testing
    • Developing test plans
    • Cybersecurity Factory Acceptance Testing
    • Cybersecurity Site Acceptance Testing

Classroom/Laboratory Exercises:

  • Network and Packet Analysis
  • Firewalls and DMZ
  • Network Device Hardening
  • Define Policies and Procedures
  • Remote Access
  • Using Part 62443-3-3 to validate SL-A

Who Should Attend:

  • Control systems engineers and managers
  • System Integrators
  • IT engineers and managers of industrial facilities
  • Plant managers
  • Plant Safety and Risk Management

Recommended Pre-Requisites:

ISA Courses IC32 and IC33 or equivalent knowledge/experience.

The main objectives of ISA training is to make sure that the audience understands and interprets the requirements of the ISA/IEC-62443 series of standards correctly and what needs to be done.

While the exercises and products used in the lab helps to understand the concepts, it is not within the objectives of ISA to recommend any specific solution or to show how to comply with the multiple requirements.

+1 enrolled
Not Enrolled
This course is currently closed

Course Includes

  • 13 Lessons
  • 8 Quizzes
  • Course Certificate
Click to access the login or register cheese
You cannot copy content. You can download from download areas.