Secure the product using cybersecurity best practices.
Securing should include
- identifying vulnerabilities and risks
- testing access points to the product
- using input/output validations
- applying the confidentiality, integrity, and availability (CIA) triad model as appropriate (e.g., authentication/encryption)
- identifying methods of remediation.
Process/Skill Questions:
- How are the cybersecurity principles applicable to ICS, control systems, and IIoT?