Industrial Cyber Security Controls from IEC62443 for ICS/OT
Sourabh Suman
6:14:54
Description
IEC 62443 Standard, and implementation in the industrial control system (ICS). Technical controls, Levels & assessment.
What You'll Learn?
- Details of IEC 62443 standard
- Authentication and Authorization controls
- Cybersecurity Controls for ICS/OT
- Controls: DFA, Firewalls, VPN, PKI
- Controls: Password, Biometric, Token
- Zones, Conduits and Security Levels
- Foundational requirements
- Log management
- High/Low level Risk assessment
- Industrial use case for SL1-SL3
Who is this for?
What You Need to Know?
More details
DescriptionSafeguarding critical infrastructures like Power plants, Oil & Gas industry, Wind power, Manufacturing, Food processing, etc., all are now integrated with IT technologies and some of them are connected to the internet as well. This convergence of IT and OT is increasing changes of being exposed or increased attack surface. Hence cybersecurity requirement for OT/ICS industry is a prime concern now. Most industries are now implementing these measures and mitigating risks.
ICS systems comprise SCADA, DCS, PLC, and many more proprietary systems and protocols, designing a cybersecurity solution for these systems need the understanding of both OT-related applications and IT-related controls which can fit into these environments.
In this course, we will learn about 62443 standard and technical controls which can be implemented in the ICS environment. Some controls can be implemented, what could be a probable weakness, and what does industry assessment says about those prescribed cybersecurity controls as per 62443-3-3. This course also covers risk assessment based on 62443-3-2 for high-level and detailed risk assessment. Industry uses case for zoning, segmentation is also explained in the course to make it easier to understand.
These are based on guidelines hence in the upcoming courses learner will understand the required cybersecurity controls for critical infrastructure.
Who this course is for:
- Control engineers, integrators, and architects who design or implement OT systems
- System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems
- Security consultants who perform security assessments and penetration testing of OT systems
- Cybersecurity managers who are responsible for OT systems
- Vendors that are developing products that will be deployed as part of an OT system
Safeguarding critical infrastructures like Power plants, Oil & Gas industry, Wind power, Manufacturing, Food processing, etc., all are now integrated with IT technologies and some of them are connected to the internet as well. This convergence of IT and OT is increasing changes of being exposed or increased attack surface. Hence cybersecurity requirement for OT/ICS industry is a prime concern now. Most industries are now implementing these measures and mitigating risks.
ICS systems comprise SCADA, DCS, PLC, and many more proprietary systems and protocols, designing a cybersecurity solution for these systems need the understanding of both OT-related applications and IT-related controls which can fit into these environments.
In this course, we will learn about 62443 standard and technical controls which can be implemented in the ICS environment. Some controls can be implemented, what could be a probable weakness, and what does industry assessment says about those prescribed cybersecurity controls as per 62443-3-3. This course also covers risk assessment based on 62443-3-2 for high-level and detailed risk assessment. Industry uses case for zoning, segmentation is also explained in the course to make it easier to understand.
These are based on guidelines hence in the upcoming courses learner will understand the required cybersecurity controls for critical infrastructure.
Who this course is for:
- Control engineers, integrators, and architects who design or implement OT systems
- System administrators, engineers, and other information technology (IT) professionals who administer, patch, or secure OT systems
- Security consultants who perform security assessments and penetration testing of OT systems
- Cybersecurity managers who are responsible for OT systems
- Vendors that are developing products that will be deployed as part of an OT system
User Reviews
Rating
Sourabh Suman
Instructor's Courses
Udemy
View courses Udemy- language english
- Training sessions 43
- duration 6:14:54
- English subtitles has
- Release Date 2022/11/20