Research Article
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants
Table 11
Security controls for MTP platform.
| Target component | Security controls |
| MTP platform | B.1.2 account management | B.1.3 access enforcement | B.1.5 separation of functions | B.1.6 least privilege | B.1.7 unsuccessful logic attempts | B.1.8 system use notification | B.1.9 Previous logon notification | B.1.10 session lock | B.1.22 use of external systems | B.2.9 Protection of audit information | B.2.10 nonrepudiation | B.3.2 application Partitioning and security function isolation | B.3.11 unauthorized remote activation of services | B.3.13 public key infrastructure certificates | B.3.19 thin nodes |
|
|