According to the ISA/IEC 62443-3-2 standard, implementing countermeasures is one of the steps in the security risk assessment for system design. The standard defines a comprehensive set of engineering measures to guide organizations through the process of assessing the risk of a particular industrial automation and control system (IACS) and identifying and applying security countermeasures to reduce that risk to tolerable levels. The standard recommends the following steps for implementing countermeasures:
Establish the risk tolerance: This step involves determining the acceptable level of risk for the organization and the system under consideration, based on the business objectives, legal and regulatory requirements, and stakeholder expectations. The risk tolerance can be expressed as a target security level (SL-T) for each zone or conduit in the system.
Select common countermeasures: This step involves selecting the appropriate security countermeasures for each zone or conduit, based on the SL-T and the existing security level (SL-A) of the system. The standard provides a list of common countermeasures for each security level, covering the domains of physical security, network security, system security, and application security. The selected countermeasures should be documented and justified in the security risk assessment report. References: ISA/IEC 62443 Cybersecurity Series Designated as IEC Horizontal Standards, Cybersecurity Risk Assessment According to ISA/IEC 62443-3-2
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit