Research Article

Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants

Table 10

Security controls for MTP logic.

Target componentSecurity controls

MTP logicB.1.2 account management
B.1.3 access enforcement
B.1.5 separation of functions
B.1.7 unsuccessful logic attempts
B.1.9 Previous logon notification
B.1.10 session lock
B.3.19 thin nodes
B.4.2 user identification and authentication
B.4.3 Password requirements
B.5.8 authenticator feedback