NEW QUESTION 50
Who must be included in a training and security awareness program?
Available Choices (select all choices that are correct)
Modbus over Ethernet, also known as Modbus/TCP, is a protocol that encapsulates the Modbus/RTU data string inside the data section of the TCP frame. It then sets up a client/server exchange between nodes, using TCP/IP addressing to establish connections1. This makes it easy to manage in a firewall, because the firewall can filter the traffic based on the source and destination IP addresses and the TCP port number. The default TCP port for Modbus/TCP is 502, but it can be changed if needed. Modbus/TCP does not use any other ports or protocols, so the firewall rules can be simple and specific. References:
* 8: Open Modbus/TCP Specification, RTA Automation, 2010.
* [9]: Modbus Application Protocol Specification V1.1b3, Modbus Organization, 2012.
NEW QUESTION 51
In a defense-in-depth strategy, what is the purpose of role-based access control?
Available Choices (select all choices that are correct)
Role-based access control (RBAC) is a method of restricting access to resources based on the roles of individual users within an organization. RBAC assigns permissions and responsibilities to roles, rather than to individual users, and then assigns users to those roles. This way, users can only perform the actions that are relevant and necessary for their role, and not access or modify any other resources that are beyond their scope of authority. RBAC is one of the security countermeasures that can be implemented in a defense-in-depth strategy, which is a layered approach to protect industrial automation and control systems (IACS) from cyber threats. RBAC can help prevent unauthorized access, misuse, or sabotage of IACS resources, as well as reduce the risk of human error or insider attacks.
References:
* ISA/IEC 62443-3-3:2013, Security for industrial automation and control systems – Part 3-3: System security requirements and security levels, Clause 5.3.2.11
* ISA/IEC 62443-2-1:2010, Security for industrial automation and control systems – Part 2-1: Establishing an industrial automation and control systems security program, Clause 6.2.2.32
* ISA/IEC 62443-4-1:2018, Security for industrial automation and control systems – Part 4-1: Product security development life-cycle requirements, Clause 5.2.3.23
* ISA/IEC 62443-4-2:2019, Security for industrial automation and control systems – Part 4-2: Technical security requirements for IACS components, Clause 4.2.3.24
NEW QUESTION 54
What are the connections between security zones called?
Available Choices (select all choices that are correct)
According to the ISA/IEC 62443 standard, the connections between security zones are called conduits. A conduit is defined as a logical or physical grouping of communication channels connecting two or more zones that share common security requirements. A conduit can be used to control and monitor the data flow between zones, and to apply security measures such as encryption, authentication, filtering, or logging. A conduit can also be used to isolate zones from each other in case of a security breach or incident. A conduit can be implemented using various technologies, such as firewalls, routers, switches, cables, or wireless links.
However, these technologies are not synonymous with conduits, as they are only components of a conduit. A firewall, for example, can be used to create multiple conduits between different zones, or to protect a single zone fromexternal threats. Therefore, the other options (firewalls, tunnels, and pathways) are not correct names for the connections between security zones. References:
* ISA/IEC 62443-3-2:2016 – Security for industrial automation and control systems – Part 3-2: Security risk assessment and system design1
* ISA/IEC 62443-3-3:2013 – Security for industrial automation and control systems – Part 3-3: System security requirements and security levels2
* Zones and Conduits | Tofino Industrial Security Solution3
* Key Concepts of ISA/IEC 62443: Zones & Security Levels | Dragos4
NEW QUESTION 63
Which is an important difference between IT systems and IACS?
Available Choices (select all choices that are correct)
IT systems and IACS have different security priorities, requirements, and challenges. According to the ISA/IEC 62443 standards, the security priority for IT systems is confidentiality, which means protecting the data from unauthorized access or disclosure. The security priority for IACS is integrity, which means ensuring the accuracy and consistency of the data and the functionality of the system. A loss of integrity in an IACS can have severe consequences, such as physical damage, environmental harm, or human injury. Therefore, IACS cybersecurity must address safety issues, which are not typically considered in IT security. Safety is the ability of the system to prevent or mitigate hazardous events that can cause harm to people, property, or the environment. The ISA/IEC 62443 standards provide guidance and best practices for ensuring the safety and security of IACS, as well as the availability and reliability of the system. Availability is the ability of the system to perform its intended function when required, and reliability is the ability of the system to perform its intended function without failure. These properties are also important for IT systems, but they may have different trade-offs and implications for IACS. For example, an IACS may have stricter performance and availability requirements than an IT system, as a delay or disruption in the IACS operation can affect the industrial process and its outcomes. Additionally, an IACS may have longer equipment lifetimes and less frequent maintenance windows than an IT system, which can make patching and updating more difficult and risky. Furthermore, an IACS may use different technologies and architectures than an IT system, such as legacy devices, proprietary protocols, or specialized hardware. These factors can create compatibility and interoperability issues, as well as increase the attack surface and complexity of the IACS. Therefore, IT security solutions and practices may not be sufficient or suitable for IACS, and they may need to be adapted or supplemented by IACS-specific security measures. The ISA/IEC 62443 standards address these differences and provide a comprehensive framework for securing IACS throughout their lifecycle.
References: 1: Security of Industrial Automation and Control Systems – ISAGCA 2: ISA/IEC 62443 Series of Standards – ISA 3: ISA/IEC 62443 Series of Standards | ISAGCA 4: Securing IACS based on ISA/IEC 62443
– Part 1: The Big Picture
* The key differences between IT (Information Technology) systems and IACS (Industrial Automation and Control Systems) are centered on their primary security objectives and operational requirements:
* Option A: The IACS security priority is integrity. This is crucial because any unauthorized modification of data or commands can lead to severe operational disruptions and safety hazards.
* Option C: IACS cybersecurity must address safety issues. Safety is a primary concern in IACS environments where process disruptions or malfunctions can result in harm to human operators or damage to equipment. The primary security priority in traditional IT systems is often confidentiality, not availability as stated in Option B, and routers are commonly used in IACS networks, contrary to Option
D.