Description:
The third phase in the IACS Cybersecurity Lifecycle (defined in ISA 62443-1-1) focuses on the activities associated with the ongoing operations and maintenance of IACS cybersecurity. This involves network diagnostics and troubleshooting, security monitoring and incident response, and maintenance of cybersecurity countermeasures implemented in the Design & Implementation phase. This phase also includes security management of change, backup and recovery procedures and periodic cybersecurity audits.
This course will provide students with the information and skills to detect and troubleshoot potential cybersecurity events as well as the skills to maintain the security level of an operating system throughout its lifecycle despite the challenges of an every changing threat environment.
You will be able to:
- Perform basic network diagnostics and troubleshooting
- Interpret the results of IACS device diagnostic alarms and event logs
- Implement IACS backup and restoration procedures
- Describe the IACS patch management life cycle and procedure
- Apply an antivirus management procedure
- Define the basics of application control and white listing tools
- Define the basics of network and host intrusion detection
- Define the basics of security incident and event monitoring tools
- Implement an incident response plan
- Implement an IACS management of change procedure
- Conduct a basic IACS cyber security audit
Classroom/Laboratory Exercises:
- Asset Inventory
- ICS Device Hardening
- Disabling USB Storage Devices
- Restrict access to USB drives
- Application Control / Whitelisting
- Microsoft Windows Software Update Services (WSUS)
- PLC backup and configuration management
- Change Management (MOC form)
- Event Detection Tracking and Log Monitoring
- Vulnerability Scanning
- Network Packet Capture Analysis
- Troubleshooting and Forensics