Research Article

Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants

Table 12

Security controls for EWS logic.

Target componentSecurity controls

EWS logicB.1.2 account management
B.1.3 access enforcement
B.1.5 separation of functions
B.1.7 unsuccessful logic attempts
B.1.8 system use notification
B.1.9 Previous logon notification
B.1.10 session lock
B.3.19 thin nodes