Identify cybersecurity considerations throughout the stages in the engineering design process.
Identification should include a review of the engineering design process, particularly the following stages:
- Identify the requirement and constraints of the design problem, including cybersecurity considerations.
- Evaluate the requirements and constraints of each solution to the design problem, including cybersecurity considerations.
- Justify an optimal solution to the design problem, including cybersecurity considerations.
- Determine the objectives for an engineering test of the solution to the design problem, including cybersecurity considerations.
- Test the solution to the design problem, using mathematical, conceptual, and/or physical modeling, simulating, and optimizing (including cybersecurity considerations).
- Evaluate the test results, including cybersecurity considerations.
Identification includes cybersecurity considerations such as the following:
- Security requirements
- Threat modeling
- Source code review
- Security testing
- Incident response
Teacher Resource: Layered Blueprints: A Method for Engineering OT Security (video), Sarah Fluchs, Security Consultant, Admeritia (https://youtu.be/bBjMZnoSYUs
Links to an external site.)
Process/Skill Questions:
- What’s the earliest stage during which one can perform threat modeling?
- Why is threat modeling important?
- Why is security testing important?