Sorting by

×

Phases of ICS Cyber security Lifecycle from IEC 62443

Industrial Control System Cybersecurity Lifecycle

The stages that a physical process or a management system goes through as it proceeds from start to end. These stages include conception, design, deployment, acquisition, operation, maintenance, decommissioning, and disposal.

As per 62443 cybersecurity lifecycle consists of three phases:

Assess Phase

The first phase of the cybersecurity lifecycle is the assessment or analysis phase. In this phase, the IACS (Industrial automation & control system) is identified, segmented into zones, and analyzed for risk. The requirements for the design are then defined. The objective of the assessment phase is to identify any shortcomings in the current cybersecurity of the facility.

No alt text provided for this image

Implement

The objectives for the implementation phase are to have a complete design that meets the requirements of the cybersecurity requirements and to have those designed countermeasures and systems implemented in the physical equipment. The implementation phase of the cybersecurity lifecycle includes the application of countermeasures, security level verification, and testing activities that make up the bulk of an upgrade, retrofit, or new project. 

No alt text provided for this image

Maintain

The cybersecurity lifecycle defines the maintenance phase as beginning with the actual operation of the plant or equipment. Therefore, the first step in the maintenance phase is a startup, followed by maintenance activities, ongoing security monitoring, periodic audits, and modification/decommissioning. The objective of the maintenance phase is to ensure that the level of cybersecurity for the IACS can be managed consistently throughout the lifecycle of the facility. The hardware assets of the IACS require periodic maintenance to maintain their cleanliness and correct operations.

No alt text provided for this image

If cybersecurity is not addressed in each of these phases, the safety and integrity of the IACS may not be achieved.

Leave a Reply

Your email address will not be published. Required fields are marked *