We use our own and third-party cookies to make our website work safely and personalize its content. Likewise, we use cookies to measure and obtain data on your navigation and to adjust advertising to your tastes and preferences. Press the "Accept all" button to confirm that you have read and accepted the information presented. To manage or disable these cookies, click on "Configuration". For more information see our cookies policy.
Modify cookies
Technical and functional Always active
This website uses its own Cookies to collect information in order to improve our services. If you continue browsing, you accept their installation. The user has the possibility of configuring his browser, being able, if he so wishes, to prevent them from being installed on his hard drive, although he must bear in mind that such action may cause difficulties in navigating the website.
Analytics and personalization
They allow the monitoring and analysis of the behavior of the users of this website. The information collected through this type of cookies is used to measure the activity of the web for the elaboration of user navigation profiles in order to introduce improvements based on the analysis of the usage data made by the users of the service. They allow us to save the user's preference information to improve the quality of our services and to offer a better experience through recommended products.
Marketing and advertising
These cookies are used to store information about the preferences and personal choices of the user through the continuous observation of their browsing habits. Thanks to them, we can know the browsing habits on the website and display advertising related to the user's browsing profile.
  • Blog
  • Training
  • Cyber security PHA Study

    The TEMA’s Cyber security PHA Study aims to protect the industrial process from a possible cyberattack, whether external or internal, as well as to evaluate the associated risk and identify possible solutions to avoid the consequences of these attacks to happen.

    This study is based on the international standard ISA / IEC 62443 Security for Industrial Automation and Control System, the first one that includes the concept of “Security Level” (SL), which defines a set of policies, procedures and practices that must be implemented to secure an area and its ICS (Industrial Control System).

    The Cybersecurity PHA Review (CSPR) is designed to define the Security Level (SL) required using the existing PHA as a starting point. TEMA includes this analysis in the HAZOP studies as an extension or add-on.

    The CSPR approach has been developed to adapt naturally to the normal life cycle of the design, implementation and operation project of the industrial process.

    The following information is gathered in the Safety Process Report:

    • List of hackable scenarios: possible consequences of a cyberattack in the HSE (in reference to the results of HAZOP).
    • Classification of hackable scenarios: prioritization of risk-based scenarios to allow a rapid response to vulnerabilities.
    • Security level: definition of the minimum requirements of the cybersecurity system for each identified scenario.
    • ICS alternatives: recommendations to obtain an intrinsically safe system against cyberattacks.

     

    Request more info

    I accept the legal terms