Preparing to answer the question, "What am I worried about that could happen to our ICS systems?" can help complete this activity.
During this security program development activity, ICS-specific security policies are conceptualized. The goal is to create a set of policies that is applicable to the ICS and its environment. The best approach to successfully complete this activity is through round table conversations with relevant IT personnel, management, ICS owners, stakeholders, and the various subject matter experts. Each policy under consideration should be individually discussed ...