Research Article
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants
Table 13
Security controls for EWS platform.
| Target component | Security controls |
| EWS platform | B.1.2 account management | B.1.3 access enforcement | B.1.5 separation of functions | B.1.6 least privilege | B.1.7 unsuccessful logic attempts | B.1.8 system use notification | B.1.9 Previous logon notification | B.1.10 session lock |
|
|