Research Article
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants
Table 6
Parameters for MTP and OM.
| Attack surface | Parameter of the security control | Applicable target | Security principle | Life stage |
| (S,WN,A) | Logic | Authorization | Development | Logic | Authentication | Development |
| (U,DA,A) | Logic | Authentication | Development | Logic | Authorization | Development |
| (U,DA,P) | OS and platform | Authorization | Development |
|
|