Research Article

Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants

Table 6

Parameters for MTP and OM.

Attack surfaceParameter of the security control
Applicable targetSecurity principleLife stage

(S,WN,A)LogicAuthorizationDevelopment
LogicAuthenticationDevelopment

(U,DA,A)LogicAuthenticationDevelopment
LogicAuthorizationDevelopment

(U,DA,P)OS and platformAuthorizationDevelopment