Research Article
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants
Table 8
Security controls for BP logic.
| Target component | Security controls |
| BP logic | B.1.2 account management | B.1.3 access enforcement | B.1.5 separation of functions | B.1.7 unsuccessful logic attempts | B.1.9 Previous logon notification | B.1.10 session lock | B.3.19 thin nodes | B.4.2 user identification and authentication | B.4.3 Password requirements | B.5.8 authenticator feedback |
|
|