Research Article

Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants

Table 7

Parameters for engineering workstation (EWS).

Attack surfaceParameter of the security control
Applicable targetSecurity principleLife stage

(S,DW,M)LogicAuthorizationDevelopment
(U,DA,P)OS and platformAuthorizationDevelopment