978-84-945412-0-9
This document presents the most effective activities to protect the digital technologies used in the operation of an industrial plant, from the earliest stages of their life cycle – design, supply and installation / commissioning -, incorporatin, in each of them, the appropriate cybersecurity measures and mechanisms, along with the rest of the functionality, quality and security requirements linked to operations.