Research Article

Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants

Table 13

Security controls for EWS platform.

Target componentSecurity controls

EWS platformB.1.2 account management
B.1.3 access enforcement
B.1.5 separation of functions
B.1.6 least privilege
B.1.7 unsuccessful logic attempts
B.1.8 system use notification
B.1.9 Previous logon notification
B.1.10 session lock