Leveraging ISA 62443-3-2 For IACS Risk Assessment and Risk Related Strategies Available Now!
In his white paper, “Leveraging ISA 62443-3-2 For IACS Risk Assessment and Risk Related Strategies,” author Hal Thomas provides the reader with an overview of ISA 62443-3-2, “Security Risk Assessment for Design,” as well as a summary of some methodologies that can be used to assist execution of the industrial automation control system (IACS) cyber security risk assessment work process requirements detailed in the standard.
The major steps include:
Identification of the System under Consideration (SuC)
Perform an Initial Cyber Risk Assessment
Partition the SuC into Zones and Conduits
Perform a Detailed Level Cyber Risk Assessment
Document Updated Cyber Security Requirements for Detailed Design