7. Establishing an IACS Security Program Flashcards
1
Q
List 6 Activities that are part of developing a CSMS
A
- Initiate CSMS Program
- High Level Risk Assessment
- Detailed Risk Assessment
- Establish Policy, organization and awareness
- Select and implement countermeasures
- Maintain the CSMS
2
Q
List 4 tasks that occur within “Initiate a CSMS”.
A
- Obtain leadership commitment, support and funding
- Develop a business rationale
- Develop the CSMS Scope
- Involve Stakeholders
3
Q
List 5 tasks that occur within “High level risk assessment”
A
- Define the methodology for identifying risks
- Identify risks
- Define the methodology for assessing the priority of risks
- Assess the priority of risks
- Document the results and rationale
4
Q
List 4 tasks that occur within “Detailed risk assessment”
A
- Inventory IACS systems, networks and devices
- Screen and prioritize
- Identify detailed vulnerabilities
- Identify and prioritize associated risks
5
Q
List 5 tasks that occur within “Establish Policy, Organization & awareness”
A
- Create policies and procedures
- Implement policies and procedures
- Communicate policies
- Develop training activities
- Assign organisational responsibilities
6
Q
List 5 tasks that occur within “Select and implement countermeasures”
A
- Establish the risk tolerance
- Select common countermeasures
- a) Select countermeasures - common countermeasures are a starting point to this
- Implement countermeasures
- Develop new or modify existing systems
7
Q
A