Part 2: Attacking and Securing SISs
Understanding effective SIS cybersecurity necessitates a grasp of threat actors’ Tactics, Techniques, and Procedures (TTPs). Chapter 4 offers a high-level overview of common attack methodologies and explores how process safety networks present a unique attack surface with various attack vectors.
A robust cybersecurity strategy hinges on proper design and a Comprehensive Cybersecurity Management System (CSMS). Deploying appropriate security controls is essential to enforce both logical and physical security. Chapter 5 delves into practical security controls, emphasizing their importance in SIS deployment.
This part has the following chapters:
- Chapter 4, Hacking Safety Instrumented Systems
- Chapter 5, Securing Safety Instrumented Systems
This section provides the foundational knowledge and practical strategies necessary for securing SISs against sophisticated cyber threats.