Research Article

Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants

Table 8

Security controls for BP logic.

Target componentSecurity controls

BP logicB.1.2 account management
B.1.3 access enforcement
B.1.5 separation of functions
B.1.7 unsuccessful logic attempts
B.1.9 Previous logon notification
B.1.10 session lock
B.3.19 thin nodes
B.4.2 user identification and authentication
B.4.3 Password requirements
B.5.8 authenticator feedback