What does it cover
•
Defining the systems that are susceptible to
cyber threats
•
Risk assessment and ALARP demonstration-
note the issues here.
•
Putting proportionate control measures. The
guide identifies a range of example measures.
•
Operation and maintenance
•
Audit, monitor and review
•
Change control