Cybersecurity Lifecycle Questions and
Answers
What is the purpose of assigning a Target Security Level (SL-T) during the Assess
phase of ICS security implementation? - ANSWER-To determine the existing
vulnerabilities of the system.
What happens during the Develop & Implement phase of ICS security implementation?
- ANSWER-Countermeasures are implemented to meet the Target Security Level (SL-
T).
What is the primary goal of the Maintain phase in ICS security implementation? -
ANSWER-To ensure the Achieved Security Level (SL-A) is equal to or better than the
Target Security Level (SL-T).*
What is phase 1 of the IACS Cybersecurity Life Cycle? - ANSWER-Assess
What is phase 2 of the IACS Cybersecurity Life Cycle? - ANSWER-Develop &
Implement
What is phase 3 of the IACS Cybersecurity Life Cycle? - ANSWER-Maintain phase
What is step 3 of the IACS Cybersecurity Life Cycle (Assess Phase)? - ANSWER-Detail
Cyber Risk Assessment
What is step 4 of the IACS Cybersecurity Life Cycle (Develop & Implement Phase)? -
ANSWER-Cybersecurity Requirements Specification
What is step 1 of the IACS Cybersecurity Life Cycle (Assess Phase)? - ANSWER-High-
Level Cyber Risk Assessment
What are the continuous processes activities of the IACS Cybersecurity Life Cycle? -
ANSWER-Cybersecurity Management System: Policies, Procedures, Training &
Awareness, Periodic Cybersecurity Audits
A risk assessment should provide information about what? - ANSWER-An entire system
as well as each zone
What is step 2 of the IACS Cybersecurity Life Cycle (Assess Phase)? - ANSWER-
Allocation of IACS Assets to Security Zones or Conduits