Security Risk Assessment MSD0054 en

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4
At a glance
Powered by AI
The key takeaways are that the course provides training on security risk assessment according to IEC 62443 and covers topics such as threat assessment, vulnerability assessment, security risk matrices, and documentation requirements.

The objective of the course is to provide participants with a fundamental understanding of the principles of industrial automation and control system (IACS) cybersecurity risk assessment.

Functional, process and technical safety engineers, control and instrument engineers, process engineers, operations personnel and managers, maintenance staff, consultants, and persons involved in management, engineering, operations and safety of process operations would benefit most from attending this course.

www.gminternational.

com

Cyber Security Program


Security Risk Assessment Training

GM International in cooperation with TVC Functional Safety Services are pleased to recommend the TÜV Rheinland Cyber Security Training
Program, a unique opportunity to provide evidence of competency in Cyber Security from an internationally recognized organisation. The CySec
Specialist (TÜV Rheinland) certificate program demonstrates competency with respect to assessing and specifying Industrial Automation Control
and Safety System (IACS) Security and provides a skill set enabling staff to fulfill responsibilities and to perform activities to recognised standards of
competence, in order to:
− reduce the risk of a successful cyber attack
− satisfy legal and regulatory requirements
− meet the organisation’s system security and business objectives

By understanding:

• The principles and concepts in the internationally agreed standard • The concept and principle of reducing risks to As Low As Reasonably
IEC 62443 Practicable (ALARP)
• The concepts and principles behind international standards that cover • Understanding how and when to apply qualitative, semi quantitative and
the area of cyber security and how and when to apply them including: quantitative risk assessment techniques and methods
- Security Risk Assessment (SRA) - IEC 61511-1 2nd Edition • How to calibrate, prepare and apply popular security risk determination
- Cybersecurity Management System (CSMS) and SRA – IEC 62443 methodologies, such as Attack Trees
- Network and Information Systems (NIS) • The Interface between SRA and the Cybersecurity Requirements
• Defining Tolerable risk criteria for Security Specification

COURSE OBJECTIVES
The objective of the course is to provide participants with a fundamental understanding of the principles of IACS Cybersecurity Risk Assessment in
the process industries according to IEC 62443 and to understand:

• The role and the process of Security Risk Assessment (SRA) in gaining an understanding of the security risks on the facility and their potential
consequences.

• The concept of Security Level – Targets (SL-T) and the Cyber Security Requirements Specification (CSRS)

• The relationship between SL-T and CSRS to the design and implementation of security countermeasures that are capable and able to achieve the
security requirements needed of the determined security level.

Successful participants, who have sufficient experience and have passed both the Cybersecurity fundamentals and Security Risk Assessment exams,
will be eligible for the prestigious CySec Specialist (TÜV Rheinland) certificate in Security Risk Assessment.

WHO SHOULD ATTEND?


Functional, Process and Technical Safety Engineers, Control and Instrument Engineers and Managers, Process Engineers, Operations personnel and
managers, maintenance staff, consultants, advisors and persons involved in management, engineering, operations and safety of process operations
as well as persons with PH&RA experience and who are currently involved process hazard and risk analysis, and will be required to take part in the
Security Risk Assessments and Cybersecurity requirements specification.
www.gminternational.com

Cyber Security Program


Security Risk Assessment Training

COURSE PROVIDER
TVC FUNCTIONAL SAFETY SERVICES FZ-LLC (tinovc.com)

Our team of industry-leading experts are providing worldwide Functional Safety and IACS Cybersecurity Training and Consultancy Services for
equipment manufacturers, consultancy organizations, EPC’s, End Users in the Oil & Gas, Chemical, Petrochemical, Pharmaceutical, LNG, Mining, Refining
and Petroleum Industries. We are delivering consultancy support to all activity phases of the safety lifecycle and have translated our over 30 years’
industrial experiences in practical training courses using our hands-on examples of our expertise to bring the theoretical and practical aspects together
in an understandable fashion. TVC is an accepted course provider under the TÜV Rheinland Functional Safety and Cyber Security Training Program.
The brand TVC has gained recognition in the Process Industry as the most practical & simple explained training courses and seminars conducted in a
professional manner.

COURSE INFORMATION PREREQUISITES

• Course dates: check here In accordance with the TÜV Rheinland Functional Safety and Cyber
• Course language: English Security Training Program:
• Duration: 3,5 day
• Course exam date: check here • A minimum of 3 to 5 years’ experience in a related field (e.g. Control &
Instrumentation, process engineering, IT/OT, functional safety or cyber
Day 4 consists of a three-hour examination based on a mixture of security).
multiple choice and open SRA questions.
• University degree or equivalent engineering experience and
The course is based around a practical case study that will be responsibilities as certified by employer or engineering institution.
developed across the three days of the course taking the
delegate through the SRA process. The course is a modular
structure of classroom tuition followed by a case study practical,
which will take the participant through the SRA process as
identified in IEC 62443-3-2.

FEES CONTACTS AND REGISTRATION


Please contact us for detailed information about fees. Registration is valid only upon receipt of registration form and
The price includes: payment.

• Course material For more detailed information or any other question please
• Registration fees and certificate of attendance contact: [email protected]
• Upon successful completion of the exam a CySec Specialist
(TÜV Rheinland) - Risk Assessment certificate and a listing on
the TÜV Rheinland website
www.gminternational.com

Cyber Security Program


Security Risk Assessment Training

EXAM, RULES AND REGULATIONS


On day 4, a three (3) hour competency examination compromising 30 multiple-choice questions (1 mark per question) and open questions 10
questions (4 marks per question). The pass score criterion is 75% on each paper.

PRE-READING INFORMATION
At the beginning of the course there will be a brief overview of Cyber Security Fundamentals, with the topics covered being: Network Basics, Network
Security Basics, Industrial Protocols and Creating a CSMS Program, with a focus on IEC 62443-2-1:2009.

This course will be assessed through two examinations:

1. The first being a multiple-choice exam covering elements both from the course itself and these cyber security
fundamentals. As such, you will receive a slide deck containing information about these fundamentals, 2 weeks before the course
commences and when we have received payment. It is therefore highly recommended that these slides are read before the start of the
course. 

2. The second exam will be an open question exam, covering the information taught within the course.

It is also highly recommended that the following are also read:

- IEC 62443, specifically the documents IEC 62443-2-1, IEC 62443-3-1 and the draft IEC 62443-3-2.

- If you are UK-based the Operational Guidance-0086 by the HSE.

Beyond this there are no further required or recommended books for the security course.  However, there are other sources of information that can
be read to enhance your understanding of the subject area.

Relevant Background Reading

The book Security PHA Review: For Consequence-Based Cybersecurity by Ed Marszal and Jim McGlone, describes a similar technique to the
technique taught on the course and therefore, may be useful for gaining a fuller understanding of the material. It is, however, not required for the
course.

Additional Reading

Other material, including white papers and other books, such as Hacking Exposed: Industrial Control Systems by Bodungen, C.E, et. Al and Industrial
Network Security 2nd Edition by Knapp, E.D, et, al, may be mentioned during the course relating to specific areas or questions. Where appropriate,
information will be provided on the source of this information.
www.gminternational.com

Cyber Security Program


Security Risk Assessment Training

TRAINING PROGRAM

Day 1 Agenda Day 3 Agenda


Provides an introduction to the background, concepts and principles to be Develops on the case study work carried out in day one and two taking
applied to the Security risk assessment, competency, compliance, security the outputs from the High-Level SRA and the Zone and Conduit exercise
management and the relevant international standards. The Security and then examining the prioritised risk zones in detail in the Detailed-Level
Risk Assessment using a risk matrix will be discussed as well as the SRA. Also covered is the relation between the Detailed-Level SRA and
introduction to the case study. The topics covered are: Attack Trees and how they may be used in both the risk assessment and
the effective implementation of the countermeasures/security controls.
• Introduction to TUV Rheinland Cyber Security (CySec) Program
The topics covered are:
• Requirements for Cyber Security in the IACS environment, including
IEC 61511 and the Network and Information Systems (NIS) directive. • IEC 62443 Detailed-Level SRA requirements
• Security Management and Common Management Systems • Description of Attack Surfaces in the ICS Environment
• Introduction to Security in the IACS environment • Detailed-Level SRA Process
• Introduction to the relevant Security and Safety Standards - Determination of Threats including Threat Assessment
• Introduction to the IEC 62443 Security Lifecycle - Determination of Vulnerabilities including Vulnerability Assessment
• Introduction to Risk Assessment specific standards - Determination of the Detailed Risk and Security Level
• Asset Inventory and it’s relation to Security Risk Assessment - Targets through the use of a Security Risk Matrix
• Introduction to the Case Study • The Importance of Security Level - Targets and their relation to
• Asset Inventory exercise – Session 1 • Foundational Requirements
• Types of Risk Assessment – Quantitative, Semi Quantitative & • How pruning of Attack Trees can be used to demonstrate a Risk-Based
Qualitative approach to risk reduction
• High-Level Security Risk Assessment • Detailed-Level SRA exercise – Session 4
- How to use previous Process Hazard Analysis (PHA) as an • Risk Management (Acceptance)
input to High-Level SRA • IEC 62443 Required Documentation for SRA, including the
- Determination of the High-Level Threat Scenarios Cybersecurity
- Determination of the High-Level Vulnerabilities • Requirement Specification (CRS)
- Determination of the High-Level Risk • Risk Management (Monitoring and Review)
- Determination of the preliminary Security Level - Target • Concluding remarks
• High-Level SRA exercise – Session 2 • Format of exam and preparation and close

Day 2 Agenda
Further develops on the concepts, principles and techniques carried out in
day one and the case study work by taking the output from the High-Level
SRA and evaluates the risks based on their likelihood and consequence
and prioritises them for examination in the Detailed-Level SRA. The second
day also includes an explanation of what outputs would be expected
from the High-Level SRA. The principles and activities of the Zoning and
Conduit sections of the IEC 62443 will also be explained. The topics
covered are:
• The required outputs from the High-Level SRA
• Requirements of IEC 62443 with relation to the Zone and Conduit
exercise.
• Trust Boundaries, Entry Points and further benefits of the Zone and
Conduit exercise
• Allocation of IACS to Zone
- Network Segmentation
- System Architecture
• Allocation of Zones Exercise – Session 3 MSD0054 REV.0 (04/2021)

You might also like