This concept is a layered security mechanism that enhances the security of the whole system. Its benefit is that during an attack, if one layer gets compromised, other layers can still detect, react, and protect against as many attacks.
Security zones are physical or logical grouping of assets that share standard security requirements and isolating the critical control systems components. Conduits control the access to the zone by resisting several attacks, like Denial of Service, and protects the integrity and confidentiality of the network traffic.
- Cybersecurity Life Cycle for IACS using PDCA
The Plan, Do, Check, and Act method of security measure must be followed by each of the three roles defined in the standard. The PDCA cycle for the product supplier is the
product life cycle, as it is product/devices specific. For the integrator and asset owner, it is the plant life cycle, as it concentrates on the entire plant.