Official course description
The official course description can be accessed at Module description
Course coarse objectives
In general, the course objectives are :
- Understand the unique security challenges associated with OT environments
- Comprehend the main cybersecurity standards related to OT environments
- Identify and assess the risks and threats associated with OT systems
- Understand which security measures are suitable to protect OT systems and how to respond to incidents
Objectives
The specific course objectives can be found, on a chapter base, below.
Securing OT-relevant Aspects of SCADA, DCS & ICS
At the end of the course the student is capable of
- defining and explaining the roles of SCADA, DCS, and ICS in industrial environments
- distinguishing between IT and OT security and explaining the unique challenges of securing OT systems
- explaining segmentation and its role in isolating OT from IT networks to enhance security
- understanding the risks associated with legacy OT systems and developing strategies for mitigation
- evaluating the impact of industry-specific regulations on OT security practices and compliance
- applying risk management strategies and cybersecurity maturity models to improve OT security
- analyzing major OT security incidents (e.g., Stuxnet) and deriving lessons learned to inform security strategies
- evaluating the success of security measures implemented in real-world OT environments
- explaining how legacy systems contribute to security risks in OT environments due to outdated protocols and vulnerability management challenges
- analyzing the convergence of IT and OT security and implementing integrated security strategies
Communication Technology Relevant to OT Environment
At the end of the course the student is capable of
- distinguishing between the communication needs of IT and OT
- explaining the role of communication systems in enabling real-time data exchange and control in OT environments
- describing the different wired communication technologies used in OT
- identifying key wireless communication technologies in OT
- identifying communication security risks in OT, including threats like eavesdropping and data manipulation
- applying network segmentation strategies to improve OT communication security by isolating OT from IT networks.
- configuring secure access control mechanisms, including authentication and authorization, for OT communication systems.
- explaining the challenges of integrating heterogeneous OT systems and ensuring communication compatibility across legacy and modern technologies
- explaining the role of cloud computing in OT communication and its use in aggregating and analyzing OT data
- identifying the challenges of remote OT communication
- deploying Intrusion Detection Systems (IDS) to protect OT communication systems from abnormal behavior
Threat Models in OT Systems
At the end of the course the student is capable of
- explaining the definition and importance of OT threat models in understanding risks and vulnerabilities in OT systems
- identifying the critical consequences of OT system failures, such as safety risks and operational disruptions
- understanding why OT threat models require different considerations compared to IT threat models, such as the focus on physical integrity and availability
- understanding common types of threats targeting OT environments, including malware, ransomware, APTs (Advanced Persistent Threat), insider threats, and physical attacks
- identifying the primary threat actors in OT environments, including cybercriminals, nation-state actors, hacktivists, and insiders
- analyzing the impact of malware and ransomware attacks on OT systems, referencing concrete examples like Stuxnet and Triton
- evaluating insider threats in OT, including both malicious and unintentional risks from employees or contractors
- evaluating the safety risks posed by compromised OT systems, including potential harm to workers and the public
- conducting a risk assessment for OT systems, identifying critical assets, vulnerabilities, and potential attack vectors
Product Lifecycle in OT
At the end of the course the student is capable of
- explaining the concept of the product lifecycle in OT systems, including hardware and software components
- understanding why the product lifecycle in OT is critical, emphasizing the long lifecycles, safety, and reliability of OT systems
- identifying the key stages of the OT product lifecycle, from design to decommissioning
- explaining the importance of requirements gathering in the design phase and how it supports industrial environments and compliance with industry standards
- understanding the key design considerations for OT systems, including safety, reliability, interoperability, and cybersecurity
- recognizing how security-by-design principles are integrated during the design phase of OT systems, including threat modeling and risk assessment
- explaining the challenges involved in developing OT hardware and software, particularly with limited resources and real-time processing requirements
- understanding the importance of prototyping and security testing (e.g., penetration testing, vulnerability scanning) during OT system development
- explaining the key activities in the deployment and installation phase of OT systems, including system integration and initial security hardening.
- identifying the role of compliance and certification in ensuring OT systems meet regulatory and industry standards during deployment
PKI (Public Key Infrastructure) in OT
At the end of the course the student is capable of
- defining Public Key Infrastructure (PKI) and explaining its key components, including public and private keys, digital certificates, Certificate Authorities (CAs) and Certificate Revocation Lists (CRLs)
- understanding the general role of PKI in authentication, encryption, and ensuring data integrity in both IT and OT environments
- recognizing the growing importance of PKI in OT systems, specifically in securing communication between OT devices and between OT and IT networks
- describing how asymmetric cryptography works, including the use of public keys for encryption and private keys for decryption, in the context of OT security
- understanding the structure and format of digital certificates (X.509) and their role in device identity management and secure communication in OT
- explaining the function of Certificate Authorities (CAs) in managing the lifecycle of digital certificates and ensuring trust within the OT environment
- understanding the challenges of integrating PKI with legacy OT systems and how PKI can be retrofitted to enhance security without replacing older devices
- identifying the key challenges in implementing PKI in OT, including performance and latency issues, limited resources on OT devices, and complexities in certificate management
- understanding the complexities of integrating PKI between IT and OT systems, including the challenges of reconciling different security protocols and management tools
Incident Response in an OT Context
At the end of the course the student is capable of
- defining what constitutes an incident in an OT environment, including cyber-attacks, equipment failures, unauthorized access, and malicious manipulation of control systems
- understanding the importance of having an Incident Response (IR) plan tailored specifically for OT systems and why traditional IT-based incident response strategies are insufficient for OT environments
- identifying the key differences between IT and OT incident response, particularly in relation to operational continuity, safety risks, and the real-time requirements of OT systems
- explaining the unique challenges in OT incident response, such as the real-time nature of OT systems, limited visibility into OT environments, interdependencies between IT and OT, and safety risks associated with OT failures
- recognizing the human safety consequences of OT cybersecurity incidents and how they differ from the impacts of IT system breaches
- understanding and explaining the stages of incident response in OT, from preparation through post-incident analysis, and why each phase is critical for minimizing damage and restoring operations
- understanding the key tools and techniques used in OT incident response, such as Industrial IDS/IPS (IIDS), OT SIEM (Security Information & Event Management) systems and Endpoint Detection and Response (EDR) tools
- evaluating the challenges and solutions demonstrated in real-world OT incident responses, including the role of specialized tools, team coordination, and safety considerations
- understanding the significance of regulatory compliance in OT incident response, including how to meet the requirements of industry standards
- analyzing real-world case studies to understand how OT organizations have responded to cybersecurity incidents, such as a ransomware attack on a power plant or a cyber-attack on a manufacturing facility
Introduction to IEC 62443
At the end of the course the student is capable of
- explaining what IEC 62443 is, including its purpose and scope in securing Industrial Automation and Control Systems (IACS) and Industrial Control Systems (ICS)
- identifying the structure of IEC 62443,
including its four major parts:
- Part 1: General Concepts
- Part 2: Policies and Procedures
- Part 3: System Requirements
- Part 4: Component Requirements
- describing the key goals of IEC 62443, including providing a framework for securing industrial networks, devices, control systems, and their components against cybersecurity threats, while ensuring operational safety and efficiency
- understanding the core principles of IEC 62443, including:
- Risk management and the security lifecycle
- The defense-in-depth approach to cybersecurity
- The importance of security zones and conduits in ICS environments
- applying the concept of risk management in industrial control systems, including conducting risk assessments, threat modeling, and determining appropriate security measures aligned with the system’s risk profile
- breaking down the key sections of Part 1: General Concepts, Part 2: Policies and Procedures, Part 3: System Requirements and Part 4: Component Requirements in IEC 62443, including terms like security levels (SL), assets, threats, and risk management models, and their relevance to designing secure industrial systems
- explaining the Security Levels (SL) in IEC 62443, including the four levels (SL 1 to SL 4), and how they define the security measures required for different levels of criticality and risk.
- discussing the risk and threat management processes outlined in IEC 62443, including threat modeling, vulnerability assessments, and strategies for proactively identifying and mitigating potential threats to OT systems
- explaining how incident response and recovery is integrated into the IEC 62443 framework, ensuring that OT systems are resilient and able to recover quickly from cybersecurity incidents without compromising safety or operational continuity
- discussing the potential barriers to adoption of IEC 62443, including resistance to change in certain industries, the need for significant investment in security measures and training, and the adaptation of legacy systems to meet current cybersecurity requirements
- evaluating how IEC 62443 contributes to overall cybersecurity resilience in OT environments, ensuring the protection of critical infrastructure from cyber threats while maintaining safe and reliable operations
- summarizing how IEC 62443 can be used as a comprehensive framework to align an organization’s OT security strategies, policies, and operational procedures with global best practices and regulatory standards