Cyber PHA

[1] The technique is typically used in a workshop environment that includes a facilitator and a scribe with expertise in the Cyber PHA/HAZOP process, as well as multiple subject matter experts who are familiar with the industrial process, the industrial automation and control system (IACS) and related IT systems.

The workshop team typically includes representatives from operations, engineering, IT and health and safety.

The facilitator and scribe are typically responsible for gathering and organizing all of the information required to conduct the workshop (e.g. system architecture diagrams, vulnerability assessments, and previous PHA/HAZOPs) and training the workshop team on the method, if necessary.

Various spreadsheet templates, databases and commercial software tools have been developed to support the cyber method.

Another popular safety-oriented methodology for conducting ICS cybsersecurity risk assessments is the cyber bowtie method.

vectorial version
vectorial version