Secure the product using cybersecurity best practices.

Securing should include

  • identifying vulnerabilities and risks
  • testing access points to the product
  • using input/output validations
  • applying the confidentiality, integrity, and availability (CIA) triad model as appropriate (e.g., authentication/encryption)
  • identifying methods of remediation.

Process/Skill Questions:

  • How are the cybersecurity principles applicable to ICS, control systems, and IIoT?