Académique Documents
Professionnel Documents
Culture Documents
And
• Increasing international organized crime
• Privacy
• Compliance enforcement
• Cyber war fare
• Cloud/Virtualization
• PDAs, Smart Mobiles
• Social Networks / data mining concepts
• ….
Data sources:
2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015
Availability Confidentiality
Integrity Integrity
Priority
Confidentiality Availability
Protection target for security Production resources, incl. logistics IT- Infrastructure
IT Security Safety
Solution design and deployment plays an essential role in designing compliant solutions
• IEC 62443-2-4
System designs and Design + hand over / maintain
• DIN VDE V0831-104
Integrator deploys a secure solution
• BDEW WP
1-1 Terminology, concepts and 2-1 Establishing an IACS security 3-1 Security technologies for IACS 4-1 Product development
models program requirements
1-2 Master glossary of terms and 2-2 Operating an IACS security 3-2 Security assurance levels for 4-2 Technical security requirements
abbreviations program zones and conduits for IACS products
+
System designs and deploys Automation solution 2-4
Basic Process Complementary 3-2
Integrator Control System Safety Instrumented Hardware and
(BPCS) System (SIS) Software 3-3
IACS environment / project specific
is the base for
Zone Plant
Conduit
Zone Enterprise
Zone Network
Zone Control
Diagnosis
FR 2 – Use control 3
FR 3 – System integrity 3
FR 4 – Data confidentiality 1
FR 7 – Resource availability 3