ISA-62443-1-1-draft

April 12, 2018 | Author: jmvicaria | Category: Access Control, Computer Security, Online Safety & Privacy, Technology, Securities
Share Embed Donate


Short Description

Models and concepts...

Description

FOR REVIEW PURPOSES ONLY!

THIS DOCUMENT IS A WORKING DRAFT OF AN ISA99 COMMITTEE WORK PRODUCT. IT MAY NOT . BE ACCURATE OF COMPLETE AND IS SUBJECT TO CHANGE WITHOUT NOTICE IT IS PROVIDED SOLELY FOR THE PURPOSE OF REVIEW IN SUPPORT OF FURTHER DEVELOPMENT OF COMMITTEE WORK PRODUCTS. THIS DOCUMENT MAY NOT BE COPIED, DISTRIBUTED TO OTHERS, OR OFFERED FOR FURTHER REPRODUCTION OR FOR SALE.

Copyright © by the International Society of Automation. All rights reserved. Not for resale. Printed in the United States of America. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), without the prior written permission of the Publisher.

ISA 67 Alexander Drive P. O. Box 12277 Research Triangle Park, North Carolina 27709 USA

This page intentionally left blank

1 2

ISA-62443-1-1 Security for industrial automation and control systems Models and Concepts Draft 5, Edit 4 August 2015

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

–2 –

ISA99, WG03

3 4 5 . e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

ISA Security for industrial automation and control systems Models and Concepts ISBN: -to-be-assigned-

Copyright © 2015 by ISA. All rights reserved. Not for resale. Printed in the United States of Am eri ca .

ISA 67 Alexander Drive P. O. Box 12277 Research Triangle Park, NC 27709 USA

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

ISA-62443-1-1, D5E4, August 2015

PREFACE

6 7 8

–3 –

This preface, as well as all footnotes and annexes, is included for information purposes and is not part of ISA-62443-1-1.

9 10 11 12 13 14

This document has been prepared as part of the service of ISA, the International Society of Automa tio n, to war d a goal of uniformity in th e fiel d of ins trumentatio n. To be of re al value , this document should not be static but should be subject to periodic review. Toward this end, the Society welcomes all comments and criticisms and asks that they be addressed to the Secretary, Standards and Practices Board; ISA; 67 Alexander Drive; P. O. Box 12277; Research Triangle Park, NC 27709; Telephone (919) 549-8411; Fax (919) 549-8288; E-mail:

15

[email protected].

16 17 18 19 20 21 22 23 24 25 26

The ISA Standards and Practices Department is aware of the growing need for attention to the metric system of units in general and the International System of Units (SI) in particular, in th e preparation of instrumentation standards. The Department is further aware of the benefits to USA users of ISA standards of incorporating suitable references to the SI (and the metric system) in their business and professional dealings with other countries. Toward this end, this Department will endeavor to introduce SI-acceptable metric units in all new and revised standards, recommended practices and technical reports to the greatest extent possible. Standard for Use of the International System of Units (SI): The Modern Metric System, published by the Am erican Society for Testing and Materials as IEE E/ASTM SI 10-97, and future revisions, will be the reference guide for definitions, symbols, abbreviations, and conversion factors.

27 28 29 30 31

It is the policy of ISA to encourage and welcome the participation of all concerned individuals and interests in the development of ISA standards, recommended practices and technical reports. Participation in the ISA standards-making process by an individual in no way constitutes endorsement by the employer of that individual, of ISA or of any of the standards, recommended practices and technical reports that ISA develops.

32 33 34 35 36

CAUTION – ISA adheres to the policy of the American National Standards Institute with regard to patents. If ISA is informed of an existing patent that is required for use of the standard, it will require the owner of the patent to either grant a royalty-free license for use of the patent by users complying with the standard or a license on reasonable terms and conditions that are free from unfair discrimination.

37 38 39 40 41 42 43 44

Even if ISA is unaware of any patent covering this Standard, the user is cautioned that implementation of the standard may require use of techniques, processes or materials covered by patent rights. ISA takes no position on the existence or validity of any patent rights that may be involved in implementing the standard. ISA is not responsible for identifying all patents that may require a license before implementation of the standard or for investigating the validity or scope of any patents brought to its attention. The user should carefully investigate relevant patents before using the standard for the user’s intended application.

45 46 47

However, ISA asks that anyone reviewing this standard who is aware of any patents that may impact implementation of the standard notify the ISA Standards and Practices Department of the patent and its owner.

48 49 50 51 52 53 54

Additionally, the use of this standard may involve hazardous materials, operations or equipment. The standard cannot anticipate all possible applications or address all possible safety issues associated with use in hazardous conditions. The user of this standard must exercise sound professional judgment concerning its use and applicability under the user’s particular circumstances. The user must also consid er the applicability of any governmental regulatory limitations and established safety and health practices before implementing this standard.

55

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015 56 57

–4 –

ISA99, WG03

The following people served as active members of ISA99, Working Group 03, Task Group 0 for the preparation of this document:

58 Name

Company

C ontributor 

Eric Cosman

OIT Concepts LLC



Jim Gilsinn

Kenexis



Tom Good Evan Hand

DuPont Conagra Foods

 

Dennis Holstein

OPUS Consulting Group



Eric Hopp

Rockwe ll Automation



Pierre Kobes

Siemens



Jeff Potter

Emerson Process Management



Ragnar Schierholz

ABB



Leon Steinocher

Consultan t

Chris Stephens

Fluor



Bradley Taylor

The George Washingto n University/ NAVSEA



Donovan Tindill

Honeyw ell



Rich Weekly

Barr-Tho rp Electric Co., Inc.





Jean-Pierr e Hauet

59 60

Reviewer

Maverick Technologie s

Bruce Billedeaux



. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

–5 –

ISA-62443-1-1, D5E4, August 2015

CONTENTS

61 62 63

PREFACE ................. ................. ................ ................. ................. ................ ................. .......... 3

64

FOREWORD ................ ................. ................ ................. ................ ................. ................ ........ 9

65

INTRODUCTION ............... ................. ................. ................. ................ ................. ................ 10

66

1

Scope ................. ................. ................ ................. ................. ................ ................. ........ 11

67

2

Normative references ................ ................ ................ ................. ................. ................. ..11

68

3

Terms, definitions, abbreviated

terms, acronyms, and conventions ... ................ .............. 12

69

3.1

Terms and definitions ............... ................ ................. ................. ................ ........... 12

70

3.2

Abbreviated t erm s a nd acron yms ... ..... ... ... ..... ... ..... ... ... ... ... ..... ... ... ..... ... ... ..... ... ... ... 24

3.3

Conventions .............. ................. ................. ................. ................ ................. ........ 24

71 72

4

The ISA ‑ 62443 standards ............... ................ ................. ................. ................ ..............25

73

5

The Situation ................. ................. ................ ................. ................. ................. .............27

74

5.1

Overview ................. ................. ................ ................. ................ .................. .......... 27

75

5.2

Business Environment ................. ................ ................. ................ ................. ........27

76

5.3

Current Systems ............... ................ ................ ................. ................. ................. ..27

77

5.4

Current Trends ................. ................ ................ ................. ................. ................. ..28

78

5.5

Potential Consequences ................ ................. ................. ................ ................. .....29

79

5.6

Impact of Countermeasures .................

80

5.7

Common Constraints ................ ................. ................ ................. ................ ...........29

81 82 83

5.7.1 6

................. ................ ................. ................ 29

Support of Essential Functions ................ ................. ................. ................ 29

5.7.2 Compensating countermeasures............................ ................. ................ ...30 Security Elements ............... ................. ................. ................. ................ ................. ........30

84

6.1

Introduction ............... ................. ................. ................. ................ ................. ........ 30

85

6.2

People ............... ................. ................. ................. ................ ................. ................ 31

86

6.3

Processes ............... ................ ................. ................. ................. ................. .......... 32

87

6.4

Technology ................ ................. ................. ................. ................ ................. ........ 32

88

6.5

Use Cases ............... ................ ................. ................. ................. ................. ..........33

89

6.6

Summary ................. ................. ................ ................. ................ .................. .......... 35

90

7

91 92

Roles and Responsibilities .............. 7.1

8

................ ................. ................. ................ .............. 35

General ................ ................. ................ ................. ................. ................. ............. 35

IACS Definition ................. ................. ................ ................. ................ .................. ..........36

93

8.1

Functionality Included ............... ................ ................. ................. ................ ...........36

94

8.2

Systems and Interfaces ............... ................ ................. ................ ................. ........ 37

95

8.3

Act ivi ty-Based Crite ria ..... ... ..... ... ... ..... ... ..... ... ... ... ... ..... ... ... ..... ... ... ..... ... ... ..... ... ..... . 37

96

8.4

Ass et- Base d Crite ri a ... ... ... ... ... ... ..... ... ... ..... ... ... ... ... ..... ... ... ..... ... ... ..... ... ... ..... ... ..... . 37

97

8.5

Consequence-Based

98

9

Criteria ............... ................ ................. ................. ................38

Models ............... ................ ................. ................. ................. ................ ................. ........ 38

99

9.1

General ................ ................. ................ ................. ................. ................. ............. 38

100

9.2

Reference Model ................ ................. ................ ................. ................. ................38

101

9.2.1

Level 4 – Enterprise Business Systems ............... ................ ................. ..... 39

102

9.2.2

Level 3 - Operations Management .........................

103

9.2.3

Level 2 – Supervisory Control .....................

104

9.2.4

Level 1 – Local or Basic Control ............................

105

9.2.5

Level 0 – Process .............. ................. ................. ................ ................. .....40

106

9.3

................. ................ ... 39

................. ................ .............. 39 ................. ................ ... 39

Reference Architecture Model ................ ................ ................. ................. ............. 40

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015 107

9.4

–6 –

ISA99, WG03

Zone Model ............... ................. ................. ................. ................ ................. ........41

108

10 General Concepts ............... ................. ................. ................. ................ ................. ........41

109

10.1 Security Context ............... ................ ................ ................. ................. ................. ..41

110

10.2 Security Objectives..............................

111

10.3 Least Privilege ................. ................ ................ ................. ................. ................. .. 43

112

10.4 Defense in Depth................ ................. ................ ................. ................. ................ 43

113

10.5 Threat-Risk Assessment ................ ................. ................. ................ ................. .....43

114

10.6 Policies and Procedures ...........................

................ ................. ................. ................42

................. ................. ................ ........... 43

115

10.6.1 General ................ ................ ................ ................. ................. ................. .. 43

116

10.6.2 Enterprise Level ................ ................. ................. ................ ................. ..... 44

117

10.6.3 Operational Level .............. ................. ................. ................ ................. ..... 45

118

10.7 Topics Covered by Policies and Procedures .................

119

10.8 Key Management......................

................ ................. ........ 45

................ ................. ................. ................ ...........47

120

10.8.1 Introduction ............... ................ ................. ................. ................ ..............47

121

10.8.2 Generation and distribution of keys ................ ................. ................ ........... 48

122 123 124

10.8.3 Key State Phases .............. ................. ................. ................ ................. ..... 49 11 Fundamental Concepts ................ ................. ................ ................. ................. ................49 11.1 Security Life Cycle ................ ................ ................. ................. ................ .............. 49

125

11.1.1 Introduction ............... ................ ................. ................. ................ ..............49

126

11.1.2 Product life cycle ............... ................. ................. ................ ................. ..... 51

127

11.1.3 IACS Life Cycle ............... ................ ................. ................ ................. ........ 52

128

11.2 Maturity Levels ................. ................ ................ ................. ................. ................. ..54

129

11.2.1 Maturity Phases ............... ................ ................. ................ ................. ........55

130 131

11.3 Zones and Conduits ................. ................. ................ ................. ................ ........... 58 11.3.1 Introduction ............... ................ ................. ................. ................ ..............58

132

11.3.2 Zones ............... ................. ................. ................. ................ ................. ..... 58

133

11.3.3 Conduits ............... ................ ................ ................. ................. ................. .. 58

134

11.3.4 Channels ................ ................. ................ ................. ................. ................ 59

135

11.3.5 Determining Requirements ................. ................. ................ ................. ..... 59

136

11.3.6 Defining Zones ................ ................ ................. ................ ................. ........60

137

11.3.7 Zone Identification ................ ................. ................ ................. ................. ..60

138

11.3.8 Defining Conduits .............. ................. ................. ................ ................. .....62

139

11.4 Security Levels ................. ................ ................ ................. ................. ................. ..64

140

11.4.1 Introduction ............... ................ ................. ................. ................ ..............64

141

11.4.2 Definition ................ ................. ................ ................. ................. ................ 64

142

11.4.3 Types of Security Levels .... ................. ................. ................ ................. ..... 65

143

11.4.4 Using Security Levels ................. ................ ................. ................. ............. 65

144

11.4.5 Security Level Vector ............ ................ ................. ................. ................. .. 68

145 146

11.4.6 Foundational Requirements ................ ................. ................ ................. ..... 68 11.4.7 Level Definitions ................ ................. ................. ................ ................. .....69

147 148

11.4.8 Security Level Vector Format ........ ................. ................. ................ ........... 70 11.5 Foundational Requirements ................. ................. ................ ................. ................71

149

11.5.1 FR 1 – Iden tification and authentication control

150

11.5.2 FR 2 – Use control (UC) ............... ................. ................. ................. .......... 72

(IAC) ...........................

..... 71

151

11.5.3 FR 3 – System integrity (SI) ........ ................ ................. ................ .............. 72

152

11.5.4 FR 4 – Data confidentiality (DC) .............. ................. ................. ................ 72

153

11.5.5 FR 5 – Restricted data flow (RDF) .......................

154

11.5.6 FR 6 – Timely response to events ( TRE) .............................

................ ................. ..... 73 ................. ..... 73

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

–7 –

ISA-62443-1-1, D5E4, August 2015

155

11.5.7 FR 7 – Resource availability (RA) ..................... ................ ................. ........ 73

156

11.6 Safety and Security ............... ................ ................. ................. ................ .............. 73

157

11.6.1 Rationale ................ ................. ................ ................. ................. ................ 74

158

12 Compliance Metrics ............... ................. ................. ................. ................ ................. .....74

159

Annex A – Zones and Conduits Examples ..... ................. ................. ................ ................. ..... 75

160

A.1

Introduction ............... ................. ................. ................. ................ ................. ........ 75

161

A.2

Untrusted Conduits ................ ................ ................. ................. ................ ..............75

162

A.3

Multi-Plant Model................ ................. ................ ................. ................. ................75

163 164

A.4 A.5

(Description) .............. ................. ................. ................. ................ ................. ........ 76 SCADA Applications ................. ................. ................ ................. ................ ...........77

165 166 167 168 169

Annex B – Truck Loading Description.......................

................. ................. ................. .......... 81

B.1

Introduction ............... ................. ................. ................. ................ ................. ........ 81

B.2

Safety and Security ............... ................ ................. ................. ................ .............. 90

Annex C – Example: Pr ocedure to apply f oundational req uirements .. ................. ................. .. 92 C.1

Overview ................. ................. ................ ................. ................ .................. .......... 92

170

C.1.1

Description of example system under consideration ................ ................. .. 92

171

C.1.2

Technical Approach ................. ................. ................ ................. ................92

172

C.1.3

Achie ved s ecu ri ty ass urance lev el .... ... ... ... ... ... ... ... ..... ... ... ..... ... ... ..... ... ... ... 95

173 174 175 176

C.2

System security assurance when commissioned ... ................ ................. ................ 96

C.3

System security assurance

during after c ommissioning ..............................

........... 96

Annex D (inform ative) Un der st anding ho w t o use the ISA99 adaptation of the IEC styleguide ................ ................. ................. ................. ................ ................. ................ ... 97

177

D.1

Overview ................. ................. ................ ................. ................ .................. .......... 97

178 179

D.2 D.3

Document and page formatting ................. ................. ................. ................. .......... 97 Sectioning ............... ................ ................. ................. ................. ................. .......... 98

180

D.4

Figures ................. ................. ................ ................. ................. ................. ............. 99

181

D.5

Tables ............... ................. ................. ................. ................ ................. ................ 99

182

D.6

Wording and language recommendations ............... ................. ................ ............ 100

183

BIBLIOGRAPHY ............... ................. ................. ................. ................ ................. .............. 101

184 185

Figure 1 – ISA ‑ 62443 Work Products ............... ................ ................. ................. ................. .. 26

186

Figure 2 – Security Elements Grouping ....................

187

Figure 3 – Three-Legged Table .....................

188

Figure 4 – Implementation of People, Process, and Technology ................. ................. .......... 35

189

Figure 5 – Reference Model .......................

190

Figure 6 – Physical Architecture Model Example .... ................ ................. ................ .............. 41

191

Figure 7 – Context Element Relationships ... ................ ................. ................ ................. ........ 42

192

Figure 8 – Context Model .........................

193

Figure 9 – Key management life cycle ................. ................. ................ ................. ................ 48

194

Figure 10 – Security aspects in relevant life cycles .....................

195

Figure 11 – Interdepende ncies in product and IAC S lifecycles ................ ................. ............. 51

196

Figure 12 – High-level process-industry

197

Figure 13 – High-level manufacturing exam ple showing zones and conduits ........... .............. 67

198

Figure 14 – High-level manufacturing exam ple showing zones and conduits ........... .............. 68

199

Figure 15 – Conduit Example ...........................

200

Figure 16 – Multiplant Zone Example .......................

................. ................. ................. .......... 31

................. ................. ................ ................ ...... 34

................. ................ ................. ................. ........ 39

................ ................. ................. ................ ........... 42

................. ................. ........ 50

example showing zones and conduits......................

66

................ ................. ................. ................ ... 75 ................. ................. ................. .......... 76

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

–8 –

ISA99, WG03

201

Figure 17 – Separate Zones Example ................. ................. ................ ................. ................ 77

202

Figure 18 – SCADA Zone Example ............... ................. ................. ................ ................. ..... 78

203

Figure 19 – SCADA Separate Zones Example ................ ................. ................ ................. ..... 79

204

Figure 20 – Enterprise Conduit ................ ................. ................ ................. ................ ........... 79

205

Figure 21 – SCADA Conduit Example ................. ................. ................ ................. ................ 80

206

Figure 22 – Chemical Truck

207

Figure 23 – Chemical Truck Loading System with Definition of SUT Boundar y ...... ................ 82

208

Figure 24 – Diagram o f major components for chemical truck loading example .....................

209

Figure 25 – Zone and Conduit Identification .............

210

Figure 26 – High-level process-industry

211

Figure 27 – High-level manufacturing exam ple show ing zones and conduits .............. ........... 89

212

Figure 28 – Examp le application - Chemical truck loading station ................ ................. ........ 92

Loading Control System Architecture

Diagram ............... ........... 81

83

................. ................. ................ ........... 86

example showing zones and conduits......................

88

213 214

Table 1 – E lements App lied to Change Contro l and Configuration Managem ent ............... ..... 34

215

Table 2 – Entities with relevant life cycles and the respective m ain responsible role

216

Table 3 – Security Maturity Phases ............... ................. ................. ................ ................. ..... 56

217

Table 4 – Concept Phase .........................

218

Table 5 – Functional Analysis Phase .. ................. ................. ................ ................. ................ 56

219

Table 6 – Implementation Phase ..............................

220

Table 7 – Operations Phase .................. ................ ................. ................. ................ .............. 57

221

Table 8 – Recycle and Disposal Phase ............... ................ ................. ................. ................ 57

222

Table 9 – Zone Characteristics ................ ................. ................ ................. ................ ........... 87

223 224

............. 50

................ ................. ................. ................ ........... 56

................. ................. ................ ........... 57

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03 225

–9 –

ISA-62443-1-1, D5E4, August 2015

FOREWORD

226 227 228

This document is part of a multipart standard th at addresses the issue of security for industrial automation and control systems (IACS). It has been developed by working group 03 of the ISA99 committee in cooperation with IEC TC65/WG10.

229 230 231

This document describes the concepts and models that form the foundation of all standards in the series. Many of these topics are addressed in more detail in one or more related standards. It supersedes the srcinal version of this standard (ISA-99.00.01-2007).

232 233

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 10 –

ISA99, WG03

234

INTRODUCTION

235 236 237 238

NOTE The format of this document fol lows the ISO/IEC re quirements disc ussed in ISO/IEC Di rectives, Part 2. [15] 1 The ISO/IEC Directives specify the format of this document as well as the use of terms like “shall”, “should”, and “may”. The use of those terms for the requirements specified in Clause 4 of this document use the conventions discussed in the ISO/IEC Directives, Appendix H.

239 240

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

————————— 1 Numbers in square brackets refer to the

Bibliography .

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 11 –

ISA-62443-1-1, D5E4, August 2015

241

1

242 243 244

This document is the first in the ISA ‑ 62443 series of standards that addresses various aspects of IACS security. It introduces concepts and models that are described and applied in more detail in subsequent standards in the series.

245 246 247 248

The content of this document includes both general purpose cyber security elements that are applicable in the IACS environment, as well as a small set of concepts and models that are specific or unique to IACS. Normative content is limited to what required to define essential concepts that must be consistently applied across all aspects of and IACS security response.

249 250 251 252 253

The intended audience for this specification is the IACS community, including asset owners, system integrators, product suppliers, service providers and, where appropriate, compliance authorities. Compliance authorities include but are not limited to government agencies and regulators with the legal authority to perform audits to verify compliance with governing laws and regulations.

254 255 256 257 258 259

System integrators, product suppliers and service providers will use this document to evaluate whether their products and services can provide the functional security capability to meet the asset owner’s target security level requirements. As with the assignment of these requirements, applicability of individual control system requirements and requirement enhancements must be based on an asset owner’s security policies, procedures and risk assessment in the context of their specific site.

260 261 262

There is insufficient detail in this document to design and build a comprehensive security architecture. That requires additional system-level analysis and development of derived requirements that are the subject of other documents in the ISA ‑ 62443 series.

263

2

264 265 266

The following referenced for the application document. For dated references, onlydocuments the edition are citedindispensable applies. For undated references,of thethis latest edition of the referenced document (including any amendments) applies.

267

ISA ‑ TR62443-1-2, Security for Industrial Automation and Control Systems

268 269

ISA ‑ 62443-2-1, Security for industrial automation and control systems Industrial automation and control system security management system

270 271

ISA ‑ 62443-3-2, Security for Industrial Automation and Control Systems Assessment and System Des ign

272 273

ISA ‑ 62443-3-3, Security for Industrial Automation and Control Systems Requirements and Security Levels

274 275

ANSI/I SA-95.00.0 1-2000, Enterp rise -C ontro l Sys tem Int egr ation – Models and Terminology, Clause 5 (Hierarchy Models)

276 277

ISO/IEC 27001 – Information technology management systems – Requirements

278 279

ISO/IEC 27002, Information technology information security management

280

Scope

Normative references

– Security techniques

– Security techniques

– Master Glossary – Requirements for an

– Security Risk

– System Security

– Information security

– Code of practice for

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 12 –

ISA99, WG03

281

3

Terms, definitions, abbreviated terms, acronyms, and conventions

282

3.1

283 284

For the purposes of this document, the terms and definitions given in ISA following apply.

285 286 287 288

3.1.1 access ability and means to communicate with or otherwise interact with a system in order to use system resources

289 290 291

Note to entry: Access may involve physical access (authorization to be allowed physically in an area, possession of a physical key lock, PIN code, or access card or biometric attributes that allow access) or logical access (authorizati on to log in to a system and application, through a combination of logical and physical means)

292 293 294 295 296

3.1.2 access control protection of system resources against unauthorized access; a process by which use of system resources is regulated according to a security policy and is permitted by only authorized entities (users, programs, processes, or other systems) according to that policy

297 298 299 300 301

3.1.3 accountability property of a system (including all of its system resources) that ensures that the actions of a system entity may be traced uniquely to that entity, which can be held responsible for its actions

302 303 304

3.1.4 actuator actuating element connected to process equipment and to the control system

305 306 307 308 309

3.1.5 application software program that performs specific functions initiated by a user command or a process event and that can be executed without access to system control, monitoring, or administrative privileges

310 311 312

3.1.6 area subset of a site’s physical, geographic, or

313 314 315

Note to entry: An area may contain manufacturing lines, process cells, and production units. Areas may be connected to each other by a site local area network and may contain systems related to the operations performed in that area.

316 317 318 319

3.1.7 asset physical or logical object owned by or under the custodial duties of an organization, having either a perceived or actual value to the organization

320 321

Note to entry: In the case of industrial automation and control systems the physical assets that have the largest directly measurabl e value may be the equipment under control.

322 323 324

3.1.8 asset operator individual or organization responsible for the operation of the IACS

325 326 327

3.1.9 asset owner individual or organization that owns the IACS assets

Terms and definitions

‑ 62443-1-1 and the

logical group of assets

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 13 –

ISA-62443-1-1, D5E4, August 2015

328 329 330 331 332

3.1.10 attack assault on a system that derives from an intelligent threat — i.e., an intelligent act that is a deliberate attempt (especially in the sense of a method or technique) to evade security services and violate the security policy of a system

333

Note to entry: There are different commonly recognized classes of attack:

334 335

An “ac ti ve att ack ” att em pts to alt er sys tem res our ces or aff ect the ir op era ti on. A “pa ssi ve at tac k” at tem pt s to lea rn or make use of information from the system but does not affect system resource s.

336 337

An “in sid e att ack ” is an att ack ini tia te d by an entity inside the security perimeter (an “insider” ) – i.e., an entity that is authorized to access system resources but uses them in a way not approved by those who granted the

338 339 340

authorization . An “outside attack”attacking is initiatedfrom fromoutside outsidethe the security perimet er, by an unauthorized illegitimate user of the system (including an insider perimeter). Potential outsideorattackers range from amateur pranksters to organized criminals, international terrorists, and hostile governments.

341 342 343 344 345 346

3.1.11 audit independent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established policies and operational procedures, and to recommend necessary changes in controls, policies, or proc edures (See “security audit”)

347 348 349 350

Note to entry: There are three forms of audit. (1) External audits are conducted by parties who are not employees or contractors of the organization. (2) Internal audit are conducted by a separate organizational unit dedicated to internal auditing. (3) Controls self assessments are conducted by peer members of the process automation function.

351 352 353 354

3.1.12 authenticate verify the identity of a user, user device, or other entity, or to establish the validity of a transmission

355 356 357 358 359

3.1.13 authentication security measure designed to establish the validity of a transmission, message, or srcinator, or a means of verifying an individual's authorization to receive specific categories of information

360 361 362

3.1.14 authorization right or a permission that is granted to a system entity to access a system resource

363 364 365 366 367

3.1.15 availability probability that an asset, under the combined influence of its reliability, maintainability, and security, will be able to fulfill its required function over a stated period of time, or at a given point in time

368 369 370

3.1.16 border edge or boundary of a physical or logical security zone

371 372 373

3.1.17 botnet collection of software robots, or bots, which run autonomously

374

Note to entry: A botnet's srcinator can control the

375 376 377

3.1.18 boundary software, hardware, or other physical barrier that limits access to a system or part of a system

group remotely, possibly for nefarious purpo

ses.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 14 –

ISA99, WG03

378 379 380 381 382

3.1.19 business system collection of information technology elements (i.e., hardware, software and services) installed with the intent to facilitate an organiza tion’s business process or processes (administrative or project)

383 384 385 386

3.1.20 cell lower-level element of a manufacturing process that performs manufacturing, field device control, or vehicle functions

387 388

Note to entry: Entities at this may be connected by an area control network and may contain information systems relate d tolevel the operations performedtogether in that entity.

389 390 391

3.1.21 channel specific communication path established within a communication conduit (

392 393 394

3.1.22 client device or application receiving or requesting services or information from a server application

395 396 397 398

3.1.23 communication path logical connection between a source and one or more destinations, which could be devices, physical processes, data items, commands, or programmatic interfaces

399 400

Note to entry: The communication path is not limited to wired or wireless networks, but includes other means of communication such as memory, procedure calls , state of physical plant, portable media, and human interactions.

401 402

3.1.24 communication system

403 404

arrangement of hardware, software, and propagation media to allow the transfer of messages (ISO/IEC 7498 application layer service data units) from one application to another

405 406 407 408

3.1.25 compromise unauthorized disclosure, modification, substitution, or use of information (including plaintext cryptographic keys and other critical security parameters)

409 410 411

3.1.26 conduit logical grouping of communication assets that protects the security of the channels it contains

412

Note to entry: This is analogous to

413 414 415

3.1.27 confidentiality assurance that information is not disclosed to unauthorized individuals, processes, or devices

416 417

3.1.28 control center

418 419 420 421 422

central location used to operate a set of assets

423

Note 2 to entry:

424 425 426 427 428

3.1.29 control equipment class that includes distributed control systems, programmable logic controllers, SCADA systems, associated operator interface consoles, and field sensing and control devices used to manage and control the process

See “conduit”).

the way that a physical conduit protects cables from physical damage.

Note 1 to entry: Infrastructu re industr ies typicall y use one o r more control c enters to su pervise or coordinate the ir operations. If there are multiple control centers (for example, a backup center at a separate site), they are typically connected together via a wide area network. The control center contains the SCADA host computers and associated operator display devices plus ancillary information systems such as a historian. In some industries the term “control room” may be mor

e commonly used.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 15 –

ISA-62443-1-1, D5E4, August 2015

429 430 431

Note to entry: The term also includes field bus networks where control logic and algorithms are executed on intelligent electronic devices that coordinate actions with each other, as well as systems used to monitor the process and the systems used to maintain the process.

432 433 434

3.1.30 control network time-critical network that is typically connected to

435 436

Note to entry: The control network can be subdivided into zones, and there can be multiple separate control networks within one company or site.

437 438

3.1.31 cost

439

value of impact to an organization or person that can be m

440 441 442 443 444

3.1.32 countermeasure action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken

445 446

Note to entry: The term “Control” is also used to describe this concept in some contexts. The term countermeasure has been chosen for this standard to avoid confusion with the word control in the cont ext of “process control.”

447 448

3.1.33 cryptographic algorithm

449 450

algorithm based upon the science of cryptography, including encryption algorithms, cryptographic hash algorithms, digital signature algorithms, and key agreement algorithms

451 452 453

3.1.34 cryptographic key input parameter that varies the transformation performed by a

454 455 456 457 458

Note to entry: Usually shortened to just “key.”

459 460 461 462

3.1.36 data integrity property that data has not been changed, destroyed, or lost in an unauthorized or accidental manner

463 464

Note to entry: This term deals with constancy of and confidence in data values, not with the information that the values represent or the trustworthiness of the source of the values.

465 466 467 468

3.1.37 decryption process of changing cipher text into plaintext using a cryptographic algorithm and key (See “encryption”)

469 470 471 472

3.1.38 defense in depth provision of multiple security protections, especially in layers, with the intent to delay if not prevent an attack

473 474

Note to entry: Defense in depth implies layers of following features:

equipment that controls physical processes

easured

cryptographic algorithm

3.1.35 data confidentiality property that information is not made available or disclosed to any unauthorized system entity, including unauthorized individuals, entities, or processes

security and detection, even on single systems, and provides the

475

a)

attackers are faced with brea king through or bypassing each layer w ithout being detected

476

b)

flaw i n one layer c an be mitigated by capabilities in other layers

477

c)

system security becomes a set of layers w ithin the overall network security.

478 479 480

3.1.39 demilitarized zone perimeter network segment that is logically between internal and external networks

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 16 –

ISA99, WG03

481 482 483

Note 1 to entry: The purpose of a demilitarized zone is to enforce the internal network’s policy for external information exchange and to provide external, untrusted sources with restricted access to releasable information while shielding the internal network from outside attacks.

484 485 486

Note 2 to entry: In the context of industrial automation and control systems, the term “internal network” is typically applied to the network or segment that is the primary focus of protection. For example, a control network could be considered “internal” when connected to an “external” business network.

487 488 489 490

3.1.40 denial of service prevention or interruption of authorized access to operations and functions

491 492

Note to entry: In the context of industrial automation and control systems, denial of service can refer to loss of process function, not just loss of data communications.

493 494 495 496

3.1.41 digital signature result of a cryptographic transformation of data which, when properly implemented, provides the services of srcin authentication, data integrity, and signer non-repudiation

497 498 499 500

3.1.42 distributed control system type of control system in which the system elements are dispersed but operated in a coupled manner

501 502

Note 1 to entry: Distribu ted control syste ms may have shorter in SCADA systems.

503 504 505

Note 2 to entry: Distributed control systems are commonly associated with continuous processes such as electric power generation; oil and gas refining; chemical, pharmaceutical and paper manufacture, as well as discrete processes such as automobile and other goods manufacture, packaging, and warehousing .

506 507

3.1.43 domain

508 509 510

environment context thatof is defined by a security security model, security architecture toorinclude a set system resources and the policy, set of system entities thatorhave the right to access the resources

511 512 513

3.1.44 eavesdropping monitoring or recording of communicated information by unauthorized parties

514 515 516 517

3.1.45 electronic security actions required to preclude unauthorized use of, denial of service to, modifications to, disclosure of, loss of revenue from, or destruction of critical systems or informational assets

518 519 520 521 522 523 524

Note to entry: The objective is to reduce the risk of causing personal injury or endangering public health, losing public or consumer confidence, disclosing sensitive assets, failing to protect business assets or failing to comply with regulations. These concepts are applied to any system in the production process and include both stand and networked components. Communica tions between systems may be either through internal messaging or b human or machine interfaces that authenticate, operate, control, or exchange data with any of these control systems. Electronic security includes the concepts of identification, authentication, accountability, authorization, availability , and privacy.

525 526 527 528

3.1.46 encryption cryptographic transformation of plaintext into ciphertext that conceals the data’s srcinal meaning to prevent it from being known or u sed (See “decryption”)

529 530

Note to entry: If the transformation is reversible, the corresponding reversal process is called “decryption,” which is a transformation that restores encrypted data to its srcinal state.

531 532 533 534

3.1.47 enterprise business entity that produces or transports products or operates and maintains infrastructure services

a system resource or the delaying of system

coupling time cons tants than those typi cally found

-alone y any

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 17 –

ISA-62443-1-1, D5E4, August 2015

535 536 537 538

3.1.48 equipment under control equipment, machinery, apparatus or plant used for manufacturing, process, transportation, medical or other activities

539 540 541 542

3.1.49 essential function function or capability that is required to maintain health, safety, the environment and availability for the equipment under control

543 544 545 546

Note to entry: Essential function s include, but are not limited to, the safe ty instrumented functio n (SIF), the control function and the ability of the operator to view and manipulate the equipment under control. The loss of essential functions is commonly termed loss of protection, loss of control and loss of view respectively. In some industries additional functions such as history may be considered essential.

547 548 549 550

3.1.50 firewall inter-network connection device that restricts data communication traffic between two connected networks

551 552 553

Note to entry: A firewall may be either an application installed on a general-purpose computer or a dedicated platform (appliance) that forwards or rejects/dro ps packets on a network. Typical ly firewalls are used to d efine zone borders. Firewal ls generally have rules restricti ng which ports are open.

554 555 556 557 558

3.1.51 gateway relay mechanism that attaches to two (or more) computer networks that have similar functions but dissimilar implementations and that enables host computers on one network to communicate with hosts on the other

559 560

Note to entry: Also described as an intermediate system that is the translation interface between two computer networks.

561 562 563

3.1.52 geographic site subset of an enterprise’s physical, geographic, or logical group of assets

564 565

Note to entry: A geographic site may contain areas, manufacturing lines, process cells, process units, control centers, and vehicles and may be connected to other sites by a wide area network.

566 567 568 569

3.1.53 host computer that is attached to a communication subnetwork or inter-network and can use services provided by the network to exchange data with other attached systems

570 571 572 573

3.1.54 industrial automation and control systems collection of personnel, hardware, and software that can affect or influence the safe, secure, and reliable operation of an industrial process

574

Note to entry: These systems include, but are not limited to:

575 576 577 578 579 580 581 582

a) industrial control systems, including distributed control systems (DCSs), programmable logic controllers (PLCs), remote terminal units (RTUs), intelligent electronic devices, supervisory control and data acquisition (SCADA), networked electron ic sensing and control, and monitoring and diagnostic systems. ( In this context, process control systems include basic process control system and safety-instrumented system [SIS] functions, whether they are physically separate or integrated.)

583 584

c) associated internal, human, network, or machine interfaces used to provide control, safety, and manufacturing operations functionali ty to continuous, batch, discrete, and other processes.

585 586 587 588

3.1.55 insider “trusted” person, employee, contractor, or supplier who has information that is not generally known to the public (See “outsider”)

b) associated information systems such as advanced or multivariable control, online optimizers, dedicated equipment monitors, graphical interfaces, process historians, manufacturing execution systems, and plant information management systems.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 18 –

ISA99, WG03

589 590 591 592 593

3.1.56 integrity quality of a system reflecting the logical correctness and reliability of the operating system, the logical completeness of the hardware and software implementing the protection mechanisms, and the consistency of the data structures and occurrence of the stored data

594 595

Note to entry: In a formal security mode, integrity is often interpreted more narrowly to mean protection against unauthorized modificatio n or destruction of information.

596 597 598

3.1.57 interception capture and disclosure of message contents or use of traffic analysis to compromise the

599 600

confidentiality of a communication system based on message destination or srcin, frequency or length of transmission, and other communication attributes

601 602 603

3.1.58 interface logical entry or exit point that provides access to the module for logical inform

604 605 606

3.1.59 intrusion unauthorized act of compromising a system (See “attack”).

607 608 609 610 611

3.1.60 intrusion detection security service that monitors and analyzes system events for the purpose of finding, and providing real-time or near real-time warning of, attempts to access system resources in an unauthorized manner

612 613

3.1.61 ISO

614

International Organization for Standardization

615 616 617 618 619 620

3.1.62 key management process of handling and controlling cryptographic keys and related material (such as initialization values) during their life cycle in a cryptographic system, including ordering, generating, distributing, storing, loading, escrowing, archiving, auditing, and destroying the keys and related material

621 622 623 624

3.1.63 line lower-level element of a manufacturing process that performs manufacturing, field device control, or vehicle functions

625

Note to entry: See “Cell”

626 627 628 629

3.1.64 local area network communications network designed to connect computers and other intelligent devices in a limited geographic area (typically less than 10 kilometers)

630 631 632 633 634 635

3.1.65 malicious code programs or code written for the purpose of gathering information about systems or users, destroying system data, providing a foothold for further intrusion into a system, falsifying system data and reports, or providing time-consuming irritation to system operations and maintenance personnel

636 637

Note 1 to entry: Malicious code attacks can take the form of viruses, worms, Trojan Horses, or other automated exploits.

638

Note 2 to entry: Malicious code is also often referred to as “malware.”

ation flows

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 19 –

ISA-62443-1-1, D5E4, August 2015

639 640 641 642

3.1.66 manufacturing operations collection of production, maintenance, and quality assurance operations and their relationship to other activities of a production facility

643

Note to entry: Manufacturing operations include:

644 645

a) manufacturing or processing facility activities that coordinate the conversion of raw materials or parts into products.

646

b) functions that may be

647 648

c) managing information about the schedules, use, capability, definition, history, and status of all resources (personnel , equipment, and material) within the manufacturing facility.

649 650 651

3.1.67 OPC set of specifications for the exchange of information in a process control environment

652 653

Note to entry: The abbrevi ation “OPC” srcinally came from “OLE for Process Control”, where “OLE” was short for “Object Linking and Embedding.”

654 655 656 657

3.1.68 outsider person or group not “trusted” with inside access, who may or may not be known to the targeted organization (See “insider”)

658

Note to entry: Outsiders may or may not have been insiders at one time.

659 660 661

3.1.69 penetration successful unauthorized access to a protected system resource

662 663

3.1.70 plaintext

664 665

unencoded that is input to and transformed by an encryption process, or that is output by a decryptiondata process

666 667 668 669

3.1.71 privilege authorization or set of authorizations to perform specific functions, especially in the context of a computer operating system

670 671

Note to entry: Examples of functions that are controlled through the use of changing setpoints, modifying control algorithms.

672 673 674 675

3.1.72 process series of operations performed in the making, treatment or transportation of a product or material

676 677

Note to entry: This standard makes extensive use of the term “process” to describ the industrial automation and control system.

678 679

3.1.73 protocol

680 681

set of communication) rules (i.e., formats and procedures) (e.g., between systems to implement and control some type of association

682 683 684 685 686

3.1.74 reference model framework for understanding significant relationships among the entities of some environment, and for the development of consistent standards or specifications supporting that environment.

687 688

Note: A reference model is based on a small number of unifying concepts and may be used as a basis for education and explaining standards to a non-specialist.

the personnel, equipment, and material involved in

performed by physical equipment, human effort, and information systems.

privilege include acknowledging alarms,

e the equipment under control of

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 20 –

ISA99, WG03

689 690 691 692

3.1.75 reliability ability of a system to perform a required function under stated conditions for a specified period of time

693 694 695 696

3.1.76 remote access use of systems that are inside the perimeter of the security zone being addressed from a different geographical location with the same rights as when physically present at the location

697 698 699 700

Note to entry: The exact definition of “remote” can vary according to situation. For example, access may come from a location that is remote to the specific zone, but still within the boundaries of a company or organization. This might represent a lower risk than access that srcinates from a location that is remote and outside of a company’s boundaries.

701 702 703 704

3.1.77 repudiation denial by one of the entities involved in a communication of having participated in all or part of the communication

705 706 707 708

3.1.78 risk expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular consequence

709 710 711 712 713 714

3.1.79 risk assessment process that systematically identifies potential vulnerabilities to valuable system resources and threats to those resources, quantifies loss exposures and consequences based on probability of occurrence, and (optionally) recommends how to allocate resources to countermeasures to minimize total exposure

715 716 717 718

Note 1 to entry: Types of

719 720 721 722

3.1.80 risk management process of identifying and applying countermeasures commensurate with the value of the assets protected based on a risk assessment

723 724 725 726 727

3.1.81 router gateway between two networks at OSI layer 3 and that relays and directs data packets through that inter-network. The most common form of router passes Internet Protocol (IP) packets

728 729 730

3.1.82 safety freedom from unacceptable risk

731 732 733

3.1.83 safety-instrumented system system used to implement one or more safety-instrumented functions

734 735

Note to entry: A safety-instrumented system is composed of any combination of sensor(s), logic solver(s), and actuator(s).

736 737 738 739

3.1.84 safety integrity level discrete level (one out of four) for specifying the safety integrity requirements of the safetyinstrumented functions to be allocated to the safety-instrumented systems

740

Note to entry: Safety integrity level 4 has the highest level of safety integrity; safety integ

resources include physic

al, logical and human.

Note 2 to entry: Risk assessments are often combined with vulnerability assessments to identify vulnerab ilities and quantify the associated risk. They are carried out initially and periodically to reflect changes in the organization's risk tolerance, vulnerabilities, procedure s, personnel and technological changes.

rity level 1 has the lowest.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 21 –

ISA-62443-1-1, D5E4, August 2015

741 742 743 744

3.1.85 secret condition of information being protected from being known by any system entities except those intended to know it

745 746 747

3.1.86 security 1. measures taken to protect a system

748 749

2.

condition of a system that results from the establishment and maintenance of measures to protect the system

750 751

3.

condition of system resources being free from unauthorized or accidental change, destruction, or loss

752 753 754 755

4.

capability o f a computer-based system to provide adequate confidence that unauthorized persons and systems can neither modify the software and its data nor gain access to the system functions, and yet to ensure that this is not denied to authorized persons and systems

756 757

5.

prevention of illegal or u nwanted penetration of or interference w intended operation of an industrial automation and control system

758 759

Note to entry: Measures can be controls related to physical security (controlling physical access to computing assets) or logical security (capabi lity to login to a given system and application.)

760 761 762 763 764

3.1.87 security architecture plan and set of principles that describe the security services that a system is required to provide to meet the needs of its users, the system elements required to implement the services, and the performance levels required in the elements to deal with the threat

765 766 767

environment

768 769 770 771 772 773

3.1.88 security audit independent review and examination of a system's records and activities to determine the adequacy of system controls, ensure compliance with established security policy and procedures, detect breaches in security services, and recommend any changes that are indicated for countermeasures

774 775 776

3.1.89 security control See “countermeasure”

777 778 779

3.1.90 security event occurrence in a system that is relevant to the security of the system

780 781 782

3.1.91 security incident adverse event in a system or network or the threat of the occurrence of such an event

783 784

Note to entry: The term “near miss” is sometimes used to describe an event that could have been an incident under slightly different circumstanc es.

785 786 787 788 789

3.1.92 security level level corresponding to the required effectiveness of countermeasures and inherent security properties of devices and systems for a zone or conduit based on assessment of risk for the zone or conduit

access and from unauthorized

ith the proper and

Note to entry: In this context, security architecture would be an architecture to protect the control network from intentional or unintentional security events.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 22 –

ISA99, WG03

790 791 792 793 794

3.1.93 security objective aspect of security which to achieve is the purpose and objective of using certain mitigation measures, such as confidentiality, integrity, availability, user authenticity, access authorization, accountability

795 796 797 798

3.1.94 security perimeter boundary (logical or physical) of the domain in which a security policy or security architecture applies, i.e., the boundary of the space in which security services protect system resources

799 800 801 802

3.1.95 security policy set of rules that specify or regu protect its assets

803 804 805

3.1.96 security procedures definitions of exactly how practices are implemented and executed

806 807 808 809 810

3.1.97 security program a combination of all aspects of managing security, ranging from the definition and communication of policies through implementation of best industry practices and ongoing operation and auditing

811 812 813 814

3.1.98 security services mechanisms used to provide confidentiality, data integrity, authentication, or no repudiation of information

815 816 817 818

3.1.99 security violation act or event that disobeys or otherwise breaches security policy through an intrusion or the actions of a well-meaning insider

819 820 821

3.1.100 security zone grouping of logical or physical assets that share common security requirements

822 823

Note 1 to entry: All unqualified uses of the word “zone” in this standard should be assumed to zone.

824 825 826

Note 2 to entry: A zone has a clear border with other zones. The security policy of a zone is typically enforced by a combination of mechanisms both at the zone edge and within the zone. Zones can be hierarchic al in the sense that they can be comprised of a collection of subzones.

827 828 829

3.1.101 sensor measuring element connected to process equipment and to the control system

830 831 832

3.1.102 server device or application that provides information or services to client applications and devices

833 834 835 836 837

3.1.103 supervisory control and data acquisition (SCADA) system type of loosely coupled distributed monitoring and control system commonly associated with electric power transmission and distribution systems, oil and gas pipelines, and water and sewage systems

838 839

Note to entry: Supervisory control systems are also used within batch, continuous, and discrete manufacturing plants to centralize monitoring and control activities for these sites.

late how a system or organization provides securit

y services to

refer to a security

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 23 –

ISA-62443-1-1, D5E4, August 2015

840 841 842

3.1.104 system interacting, interrelated, or interdependent elements forming a complex whole

843 844 845 846 847

3.1.105 system software special software designed for a specific computer system or family of computer systems to facilitate the operation and maintenance of the computer system and associated programs and data

848

3.1.106

849 850 851

threat potential for violation of security, which exists when there is a circum or event that could breach security and cause harm

852 853 854 855 856

3.1.107 traffic analysis inference of information from observable characteristics of data flow(s), even when the data are encrypted or otherwise not directly available, including the identities and locations of source(s) and destination(s) and the presence, amount, frequency, and duration of occurrence

857 858 859 860 861

3.1.108 trojan horse computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program

862 863 864

3.1.109 unit lower-level element of a manufacturing process that performs manufacturing, field device

865 866

control, or vehicle functions

867 868 869 870 871

3.1.110 use case technique for capturing potential functional requirements that employs the use of one or more scenarios that convey how the system should interact with the end user or another system to achieve a specific goal

872 873 874 875

Note to entry: Typically use cases treat the system as a black box, and the interactions with the system, including system responses, are as perceived from outside of the system. Use cases are popular because they simplify the description of requirements, and avoid the problem of making assumptions about how this functionality will be accomplished.

876 877 878 879

3.1.111 user person, organization entity, or automated process that accesses a system, whether authorized to do so or not

880 881 882 883

3.1.112 virus self-replicating or self-reproducing program that spreads by inserting copies of itself into other executable code or documents

884 885 886 887

3.1.113 vulnerability flaw or weakness in a system's design, implementation, or operation and management that could be exploited to violate the system's integrity or security policy

888 889 890 891

3.1.114 wide area network communications network designed to connect computers, networks and other devices over a large distance, such as across the country or world

stance, capability, action,

Note to entry: See “Cell”

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 24 –

ISA99, WG03

892 893 894 895

3.1.115 wiretapping attack that intercepts and accesses data and other information contained in a flow in a communication system

896 897 898

Note 1 to entry: Although the term srcinally referred to making a mechanical connection to an electrical conductor that links two nodes, it is now used to refer to reading information from any sort of medium u sed for a link or directly from a node, such as a gateway or subnetwork switch.

899 900

Note 2 to entry: “Active wiretapping” attempts to alter the data or otherwise affect the flow; “passive wiretapping” only attempts to observe the flow and gain knowledge of information it contains.

901

3.1.116

902 903 904

worm computer program that can run independently, can propagate a complete working version of itself onto other hosts on a network, and may consume computer resources destructively

905 906 907

3.1.117 zone See “security zone”

908

3.2

909

The following abbreviated terms and acronyms are used in this document.

even

Abbreviated terms and acronyms

ANSI

Am erica n Nat ion al Stan dards Inst itute

CIA

Confidentiality, Integrity, and Availability

CN

Control Network

COTS

Commercial Off The Shelf

IACS

Industrial Automation and Control System

IEC

International Electrotechnical Commission

ISA

International Society of Automation

ISO

International Organization for Standardization

SUC

System Under Consideration

TR

Technical Report

910

3.3

911 912 913 914

SKELETON NOTE This sub-clause is where specific conventions used in the document, like specific clause/sub clause formatting, special text conventions, or any other things that the reader should know in order to read the document. The reader may still need some introduction to conventions used throughout the document, but this subclause allows for a greater explanation in one place.

Conventions

915

3.3.1

916

The following terms are reserved for

917 918

shall: The word “shall ”, equivalent to "is required to", is used to indicate mandatory requirements, to be followed strictly in order to conform to the standard and from which no

919 920 921

deviation is permitted. must: The use of the word “must ” is depreciated and shall not be used when stating mandatory requirements. The word “must ” is only used to describe unavoidable situations.

922

should: The word “should ”, equivalent to "is recommended that", is used to indicate

Reserv ed terms normative clauses.

923 924

 Among several possibilities one is recommended as mentioning or excluding others.

925



That a certain course of action is preferred b ut not required.

926



That (in the negative form) a certain course of action i s depreciated but not prohibited.

927 928

particularly suitable,

without

may: The word “ma y”, equivalent to "is permitted", is used to indicate a course of action permissible within the limits of this standard.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 25 –

ISA-62443-1-1, D5E4, August 2015

929 930

can: The word “ca n”, equivalent to "is able to", is used to indicate possibility and capability, whether material or physical.

931

3.3.2

932 933

Commensurate with ISA ‑ 62443 ‑ 2 ‑ 4, the term “Solution” is used as a proper noun (and therefore capitalized) in this document to prevent confusion with other uses of the term.

934

4

935 936

ISA ‑ 62443 is a multi-part standard designed to address the need to design cybersecurity robustness and resilience into industrial automation control systems (IACS). Robustness

937 938 939 940 941 942 943

provides the capabilities for the system under consideration (SuC) to operate under a range of cyber-induced perturbations and disturbances. Resilience provides the capabilities to restore the SuC under unexpected and rare cyber-induced events. Robustness and resilience are not general properties of IACS but a relative to specific classes of cyber-induced perturbations. A SuC that is resilient or robust to a certain type of cyber -induced perturbations may be brittle or fragile to another. Such a trade-off is the subject of profiles, which others can derive from the ISA ‑ 62443 requirements and guidelines.

944 945 946 947 948 949 950

The goal in developing the ISA ‑ 62443 series is to improve the availability, integrity and confidentiality of components or systems used for industrial automation and control, and to provide criteria for procuring and implementing secure industrial automation and control ‑ 62443 is intended to improve electronic systems. Conformance with the guidance in ISA security and help identify and address vulnerabilities, reducing the risk of compromising confidential information or causing degradation or failure of the equipment (hardware and software) of processes under control.

951 952 953

The concept of industrial automation and control systems electronic security is applied in the broadest possible sense, encompassing all types of plants, facilities, and systems in all industries. Manufacturing and control systems include, but are not limited to:

954 955

– hardware and software systems such as DCS, PLC, SCADA, sensing, and monitoring and diagnostic systems

956 957 958



959 960 961

Guidance is directed towards those responsible for designing, implementing, or managing industrial automation and control systems. This guidance also applies to users, system integrators, security practitioners, and control systems manufacturers and vendors.

962 963 964 965 966 967

The ISA ‑ 62443 series builds on established standards for the security of general purpose information technology systems (e.g., the ISO/IEC 27000 series), identifying and addressing the important differences present in Industrial Automation and Control Systems (IACS). Many of these differences are based on the reality that cyber security risks with IACS may have Health, Safety or Environment (HSE) implications and the response should be integrated with other existing risk management practices addressing th ese risks.

968

The structure and organization of the ISA

Prope r noun s

The ISA 62443 standards

networked electronic

associated int ernal, human, network, or machine interfaces used to provide control, safety, and manufacturing operations functionality to continuous, batch, discrete, and other processes.

‑ 62443 series of work products is shown in Figure 1.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 26 –

ISA99, WG03

969 970

Figure 1 – I SA 62443 Work Products

971 972

The standards and reports in the series are arranged in four groups or tiers, corresponding to the primary focus and intended audience.

973 974

The first of general tier includes documents that address topics that are common to the entire series. These include:

975 976



ISA ‑ 62443-1-1 (This document) introduces the concepts and models used throughout the series.

977 978



ISA ‑ TR62443-1-2 is a master glossary of terms and abbreviations used throughout the series.

979 980



ISA ‑ 62443-1-3 describes a series of quantitative metrics derived from the foundational requirements, system requirements and associated.

981 982



ISA-TR62443-1-4 provides a more detailed de scription of the underlying life cy cle for IACS security, as well as several use cases that illustrate various applications.

983 984

Documents in the second tier focus on the policies and procedures associated with IACS security. These include:

985 986



ISA ‑ 62443-2-1 describes what is required to define and implement an effective IACS cyber security management system.

987 988



ISA ‑ 62443-2-2 provides specific guidance on what is required to operate an effective IACS cyber security management system.

989 990



ISA ‑ TR62443-2-3 provides guidance on the specific subject of patch management for IACS.

991



ISA ‑ 62443-2-4 (adopted from IEC 62433-2-4) specifies requirements for suppliers of IACS.

992

Documents in the third tier address requirements at the system level. These include:

993 994



ISA ‑ TR62443-3-1 describes the application of various security technologies to an IACS environment.

995



ISA ‑ 62443-3-2 addresses security risk assessment and system design for IACS.

996 997



ISA ‑ 62443-3-3 describes the foundational system security requirements and security assurance levels.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03 998 999

– 27 –

ISA-62443-1-1, D5E4, August 2015

The fourth and final tier includes information about the more specific and detailed requirements associated with the development of IACS products. These include:

1000 1001



ISA ‑ 62443-4-1 describes the derived requirements that are applicable to the development of products.

1002 1003 1004



ISA ‑ 62443-4-2 contains sets of derived requirements that provide a detailed mapping of the system requirements to subsystems and components of the system under consideration.

1005

5

The Situation

1006

5.1

1007 1008 1009 1010

Industrial automation and control systems operate within a complex environment. Appreciation of the nature of this environment is an essential prerequisite to ensuring its security. This includes understanding the business environment, current systems and trends, and potential consequences.

1011

5.2

1012 1013 1014 1015

Organizations are increasingly sharing information between business and industrial automation systems, and partners in one business venture may be competitors in another. At the same time new technology enables more advanced capabilities in support of business needs.

1016 1017 1018

Alth oug h techno log y ch anges an d partner rela tions hip s ma y be go od for bus in ess , they increase the potential risk of compromising security. As the threats to businesses increase, so does the need for security.

1019 1020

Because industrial automation and control systems equipment connects directly to a process, loss of sensitive information or interruption in the flow of information are not the only

1021 1022 1023 1024

consequences of a security breach. The potential loss of life or production, environment damage, regulatory violation, and compromise to operational safety are far more serious consequences. These may have ramifications beyond the targeted organization; they may grievously damage the infrastructure of the host region or nation.

1025 1026 1027 1028 1029 1030 1031 1032

External threats are not the only concern; knowledgeable insiders with malicious intent or even an innocent unintended act can pose a serious security risk. Additionally, industrial automation and control systems are often integrated with other business systems. Modif or testing operational systems has led to unintended effects on system operations. Personnel from outside the control systems area increasingly perform security testing on the systems, exacerbating the number and consequence of these effects. Combining all these factors, it is easy to see that the potential of someone gaining unauthorized or damaging access to an industrial process is not trivial.

1033

5.3

1034 1035 1036 1037 1038 1039

Industrial automation and control systems have evolved from individual, i solated computers with proprietary operating systems and networks to interconnected systems and applications employing commercial off the shelf (COTS) technology (i.e., operating systems and protocols). These control systems are increasingly being integrated with non-IACS systems and applications through various communication networks. This increased level of integration provides significant business benefits, including:

1040 1041 1042 1043

a) Increased visibility of industrial control system activities (work in process, equipment status, production schedules) and integrated processing systems from the business level, contributing to the improved ability to conduct analyses to drive down production costs and improve productivity.

1044 1045

b) Integrated manufacturing a nd production systems have more di rect access to business level information, enabling a more responsive enterprise.

1046 1047

c) Common interfaces that reduce ove production processes.

Overview

Business Environment

al

ying

Current Systems

rall support costs and permit remote su

pport of

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015 1048 1049

– 28 –

ISA99, WG03

d) Remote monitoring of the process control systems that reduces support costs and allows problems to be solved more quickly.

1050

There are definite security related considerations

associated with each of these benefits.

1051 1052 1053 1054

Devices, open networking technologies and increased connectivity provide increased opportunities for cyber-attack against control system hardware and software. That weakness may lead to health, safety and environmental (HSE), financial and/or reputational consequences in deployed control systems.

1055 1056 1057 1058 1059 1060 1061

Organizations deploying general commodity information technology (IT) cyber security solutions to address IACS security may not fully comprehend the results of this decision. While many business IT applications and security solutions can be applied to IACS, they need to be applied in an appropriate way to eliminate inadvertent consequences. For this reason, the approach used to define system requirements needs to be based on a combination of functional requirements and risk assessment, often including an awareness of operational issues as well.

1062 1063 1064 1065 1066

It is possible to define standards for models and information exchanges that allow the industrial automation and control systems community to share information in a consistent way. However, this ability to exchange information increases vulnerability to misuse and attack by individuals with malicious intent and introduces potential risks to the enterprise using industrial automation and control systems.

1067 1068 1069

Industrial automation and control systems configurations can be very complex in terms of physical hardware, programming, and communications. This complexity can often make it difficult to determine:

1070

a) who is authorized to a ccess electronic information.

1071

b) when a user can have access to the i nformation.

1072 1073

c) what data or functions a user should be able to access. d) where the access request srcin ates.

1074

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

e) how the access is requested.

1075

5.4

1076 1077

Several trends contribute to the increased emphasis on the security of industrial automation and control systems:

Current Trends

1078 1079

a) Businesses have reported more unauthorized attempts (either intentional unintentional) to access electronic information each year than in the previous year.

1080 1081 1082 1083

b) Industrial automation and control systems include more COTS software components (e.g., operating systems and protocols) and are interconnecting with business networks, making these systems susceptible to the same software attacks as are present in business and desktop devices.

1084 1085 1086

c) The use of jo int ventures, alliance p artners, and outsourced services i n the industrial sector has led to a more complex situation with respect to the number of organizations and groups contributing to security of the industrial automation and control system.

1087 1088 1089

d) Tools to automate atta cks are commonly available . The potential threat from the use of these tools now includes cyber criminals and cyber terrorists who may have more resources and knowledge to attack an industrial automation and control system.

1090 1091 1092

e) The focus on unauthorized access has broadened from amateur attackers or disgruntled employees to deliberate criminal or terrorist activities aimed at impacting large groups and facilities.

1093 1094 1095 1096

f)

The adoption of industry standard protocols such as Internet Protocol (IP) for communication between industrial automation and control systems and field devices exposes these systems to the same vulnerabilities as business systems at the network layer.

or

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 29 –

ISA-62443-1-1, D5E4, August 2015

1097 1098 1099 1100 1101 1102

These and other trends have combined to significantly increase organization’s risks associated with the design and operation of their industrial automation and control systems. At th e sam e tim e, electronic sec urity of indus trial contro l sys tem s ha s bec om e a mo re significant and widely acknowledged concern. This shift requires more structured guidelines and procedures to define electronic security applicable to industrial automation and control systems, as well as the respective connectivity to other systems.

1103

5.5

1104 1105 1106 1107

People who know the features and weaknesses of open operating systems and networks could potentially intrude into console devices, remote devices, databases, and, in some cases, control platforms. The consequences of intrusions into industrial automation and control systems may include:

Potential Consequences

1108

a) unauthorized access,

theft, or misuse of confidential information

1109

b) publication of information to unau thorized destinations

1110

c) loss of integrity or reliability of process data and production information

1111

d) loss of system availability

1112 1113

e) process upsets leading to compromised process functionali ty, inferior product quality, lost production capacity, compromised process safety, or environmental releases

1114

f)

1115

g) personal injury

1116

h) violation of legal and regulatory requirements

1117

i)

1118

j)

equipment damage

risk to public health and confidence threats to a nation’s security.

1119

5.6

Impact of Countermeasures

1120 1121 1122 1123 1124 1125 1126

Security countermeasures applied in an IACS environment should not have the potential to cause loss of essential services and functions, including emergency procedures. IACS security goals focus on control system availability, plant protection, plant operations (even in a degraded mode) and time-critical system response. General purpose security goals often do not place the same emphasis on these factors and may be more concerned with protecting information rather than physical assets. These different goals need to be clearly stated as security objectives regardless of the degree of plant integration achieved.

1127 1128 1129 1130 1131

A ke y step in ris k ass es sm ent , as requ ired by ISA ‑ 62443-2-1, is the identification of which services and functions are truly essential for operations. (For example, in some facilities engineering support may be determined to be a non-essential service or function.) It may be acceptable for a security action to cause temporary loss of a non -essential service or function, unlike an essential service or function that should not be adversely affected.

1132

5.7

1133 1134 1135

There are a number of common constraints that shall be adhered to in the application of security to an IACS. This clause and subsequent normative clauses furnish the material necessary to build extensions to existing enterprise security to support the rigorous integrity

1136

and availability requirements needed by IACS.

1137

5.7.1

1138

5.7.1.1

1139 1140

Security measures shall not adversely affect essential functions of a high availability IACS unless supported by a risk assessment.

1141 1142

NOTE: Refer to ISA ‑62443-2-1 regarding the documentation requirements associated with the risk assessment required to support instances where security measures may affect essential functions.

1143

5.7.1.2

1144 1145

When reading, specifying and implementing the normative requirements in this standard, implementation of security measures should not cause loss of protection, loss of control, loss

Common Constraints

GEN 1.0 – Support of Essential Functions Requirement

Rationale

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 30 –

ISA99, WG03

1146 1147 1148 1149

of view or loss of other essential functions. After a risk analysis, some facilities may determine certain types of security measures may halt continuous operations, but security measures shall not result in loss of protection that could result in health, safety and environmental (HSE) consequences. Specifically;

1150 1151

– Access Controls including:

(IAC and UC ) shall not prevent the operation of e ssential functions,

1152



1153 1154

– Verifying and recording operator a ctions to enforce non-repudiation shall not significant delay to system response time.

1155 1156

– For high availability control systems, the interrupt essential functions.

1157 1158



Identification and authentication shall authorization enforcement.



Incorrectly time stamped audit records shall not adversely affect essential functions.

1159

Accounts used for essential functions shall not be locked out, even temporarily. add

failure of the certificate authority s hall not

not prevent the initiation of the SIF. Similarly for

1160 1161



Essential functions of an IACS shall be maintained i f zone boundary protection fail-close and/or island mode.

goes into

1162 1163



A denial of service (DoS) event on the control system or safety instr umented system (SIS) network shall not prevent the SIF from acting.

1164

5.7.2

1165

5.7.2.1

1166

As used in th is doc um ent , t he y s ha ll adh ere to the gu ide lin es des cribe d in ISA ‑ 62443-3-2.

1167

5.7.2.2

1168

In this standard, normative language may state that the control system shall provide the

1169 1170 1171 1172 1173 1174

capability to support some specific security requirement. The control system shall provide the capability, but it might be performed by an external component. In such a case, the control system shall provide an ‘interface’ to that external component. Some examples of compensating countermeasures include user identification (including centralized versus distributed), password strength enforcement, signature validity checking, security event correlation and device decommissioning (information persistence).

1175 1176 1177

NOTE 1 The control system security requirements detailed in this document pertain to all technical functions relevant to a control system including tools and app lications. Howev er, as noted here, some of these functions can be handled by an external resource.

1178 1179 1180 1181 1182 1183

NOTE 2 In some high resource availability applications (high SL-T(RA,control system)), compensating countermeasures external to the control system (such as additional physical security measures and/or enhanced personnel background checks) will be needed. In these cases, it may be possible to see a normally high resource availability SL control syste m at a lower IAC SL 1 or 2 rating, depending upon the compensating countermeasur es. Lockout or loss of control due to security measures is increased, not decreased for very high availabili ty SL control system. Thus higher SLs are not always “better”, even where cost is not a significant factor.

1184

6

1185

6.1

1186 1187 1188 1189 1190

The analysis of a complex system often leads to the breakdown of its elements into three broad categories; “people ”, “processes ”, and “technology ”. This has also been referred to as the people-process-technology triad or triangle. Although this approach has been applied to many types of business and technical processes its application to cyber security can be summarized in the following figure.

GEN 2.0 – Compensating countermeasures Requirement

Rationale

Security Elements Introduction

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 31 –

P

c ro

s s e

T e ch

ISA-62443-1-1, D5E4, August 2015

n

Security

o

lo

g

y

People 1191 1192

Figure 2 – Security Elements Grouping

1193 1194 1195 1196 1197

Strong processes can often help to overcome potential vulnerabilities in a security product, while poor implementation can render good technologies ineffective. Often, human weaknesses can diminish the effectiveness of technology. A prime example is the IACS devices that have unnecessary Internet and networking services running simply because users are unaware that these services are running by default and could contain vulnerabilities.

1198

6.2

1199 1200 1201 1202 1203

People in the context of IACS cyber security includes the management, staff, contractors, and other personnel who develop, follow, implement, enforce, and manage all components of the IACS cyber security program. It is important that all stakeholders and participants positively support and promote security, they understand their roles and responsibilities, and there are sufficient resources in place.

1204

The following topic areas fall under people:

1205 1206 1207 1208 1209 1210



1211 1212 1213 1214



Intent, Buy-In, Support - Ensure that all personnel have the intent and motivation to uphold cyber security policies, practices, and ensure continual improvement. People could be defiant or entirely supportive of the security program and is measured as a scale of individual participation.

1215 1216 1217



Resourcing - Having the appropriate staffing levels and time commitment to perform the tasks associated with the IACS Security Management System (e.g. log reviews, patching, risk assessment).

1218 1219 1220 1221



Roles & Responsibilities - D efine who owns the process, who supports the process, what are their roles, are they committed to improving the program and working together. There is a commonly used method for assigning those Responsible, Accountable, Consulted, and Informed (RACI) for each task of the process.

1222 1223 1224 1225

– Training and C apability - Ensure that existing personnel are adequately qualified to perform the duties associated with IACS security. As well, ensure that new capabilities are developed where they may not have existed in the organization before (e.g. risk analysis, security intelligence, vulnerability management).

1226 1227 1228

– -Awareness and I nfluenced Decision Making - Ensure that personnel have sufficient awareness and understanding of security policies and security processes as it will influence their decision making and voluntary use of these processes.

1229 1230 1231

A measurem ent of suc cess for effec ti vel y add re ssing these iss ues is a culture of sec urit y within the organization with people motivated and active promoting adherence with security requirements.

People

Relationships - Make a concerted effort to break down the traditional relationship barriers between the Control and IT groups from the technical all the way up to the management levels of the organization. The goal is to have cooperative relationships across the different functional areas of the company, and organizational levels. This also applies to the relationship between the Asset Owner and the Vendor/Integrator responsible for installing and maintaining the IACS.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 32 –

ISA99, WG03

1232 1233 1234

At th is tim e, guidanc e on address ing social and organ iza tional behaviors wit hi n an organization are not part of the ISA ‑ 62443 series of documents and may be reconsidered in the future.

1235

6.3

1236 1237 1238 1239 1240

Processes in the context of IACS cyber security are the policies, procedures, forms, business processes, and other documentation associated with the IACS Security Management System. The objective is to establish a business process and task to be completed in relation to the IACS Security Management System such change control, access management, patching, inventory management, security testing, etc.

1241 1242

Processes can be implemented in several ways, but are built upon smaller components of documentation.

1243 1244 1245

– Policy - A policy is a formal, b rief, and high-level sta tement or plan that embraces an organization's general beliefs, goals, objectives, and acceptable procedures for a specified subject area.

1246 1247 1248 1249 1250 1251 1252

– Standard, Procedures - A standard is a formal document that establishes mandatory requirements, engineering, technical criteria, methods, etc. A standard is meant to convey a mandatory action or rule and is written in conjunction with a policy. A process or procedure document may also be called a standard, which typically describes the act of taking something through an established and usually routine set of procedures or steps to convert it from one form to another, such as processing paperwork to grant physical or cyber access, or converting computer data from one form to another.

1253 1254 1255 1256



1257 1258 1259 1260

In the context of the ISA ‑ 62443 series, the specific structure and content of policies, standards, and guidelines are left to the IACS asset owner. However, the series organizes the subject areas associated with IACS processes in the following clauses, categories and domains:

1261

– Security Policy

1262

– Organization of Security

1263

– Asset Management

1264

– Human Resources Security

1265

– Physical and Environmental Security

1266

– Communications and Operations Management

1267

– Access Control

1268



1269

– Incident Management

1270

– Business Continuity Management

1271



1272 1273 1274 1275

For a traditional information system, requirements and detail for the clauses above can be found in ISO/IEC 27002 Code of Practice for Information Security Management. For an IACS Security Management System, the unique requirements and enhancements can be found in ISA ‑ 62443-2-1 (Requirements for an IACS Security Management System).

1276

6.4

1277 1278 1279 1280

Technology in the context of IACS cyber security are all the technical security controls in place to uphold its availability, integrity, and confidentiality. This would include traditional solutions for authentication, access control, encryption, as those technical measures are applied to reduce the security risks to the IACS. The objective of technology relative to IACS

Processes

Guideline - G uidelines are not required as part of a policy framework; however, they can play an important role in conveying best practice information to the user community. Guidelines are meant to “guide” users to adopt behaviors which increase the security posture of a network, but are not yet required (or in some cases, my never be required).

Systems acquisition, development and maintenance

Compliance

Technology

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 33 –

ISA-62443-1-1, D5E4, August 2015

1281 1282

is to ensure that security risks are reduced and security-related business processes could be automated where feasible.

1283 1284

In the context of the ISA ‑ 62443 series, the organization of the technical security controls are grouped in to the following categories:

1285



1286

– Use Control (UC)

1287

– System Integrity (SI)

1288

– Data Confidentiality (DC)

1289

– Restrict Data Flow (RDF)

1290



1291

– Resource Availability (RA)

1292 1293 1294 1295 1296

For more information on the seven (7) subjects above, refer to the clause on Foundational Requirements. Additional detail is provided in ISA ‑ 62443-3-3 (System Security Requirements and Security Levels). These foundational requirements are expressed in terms of IACS, and are robust enough categories to allow any security control or setting (e.g., firewall rules, running services) to have an appropriate category.

1297

6.5

1298 1299

Anti vir us soft war e is a good exa mp le of ho w people-p roces s- technology all have ro les in its effectiveness.

1300 1301 1302 1303 1304

Antivirus Technology – Once deployed, it is important that antivirus software is correctly configured to fulfill its expected responsibility to deter and prevent malicious code. Antivirus software should also be regularly updated to ensure it has the latest detection signatures. Lastly, antivirus software technology on its own is not a panacea and other technical security controls are also recommended.

1305 1306 1307 1308

Antivirus Processes – A policy must exist to require the use and maintenance of antivirus software, as well as procedures for its correct deployment, operations and maintenance. A failure in a business process would be that a malicious code detection goes unnoticed as there are no requirements to monitor alerts or respond to these incidents.

1309 1310 1311 1312 1313

Antivirus People (Personnel) – Trained individuals must be assigned the responsibility of managing the antivirus technologies and accountable for its correct operation. If staff are insufficient trained it leads to configuration errors, if there are insufficient staff this leads to incomplete system maintenance, and if accountability is not clearly communicated it leads to overall disregard and disrepair of this technology investment.

1314 1315 1316

The antivirus example helps illustrate how the people-process-technology triad applies to cyber security controls. If any part of the triad is neglected it will lead to poor performance and/or failure of the IACS security program.

1317 1318

Consider the roles of people-process-technology similar to a table with three legs. If attention and resources is lacking to any of them, the table will fall over similar to the challenges faced

1319

by an IACS security program.

Identification, Authentication and Access Control (AC)

Timely Response to Event (TRE)

Use Cases

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 34 –

e P

le p o

ISA99, WG03

Pr oc es s

rity cu y Se log

o chn Te

1320 1321 1322 1323 1324 1325 1326 1327 1328 1329

Figure 3 – Three-Legged Table Change control and configuration management is particularly important to assuring the security integrity, trust and confidence of the IACS. The seemingly subtle configuration changes within the control systems components could be excluded from change control processes because they are quick to perform and are assumed to have limited, controllable effects. However, these same changes can have drastic effects on the operability, reliability, and vulnerabilities associated with the IACS. Using the people-process-technology triad as a methodology to resolve this problem, the following strategies and solutions could be applied. Table 1 – Elements Applied to Change Control and Configuration Management People

Processes

Technology

It is recommended that this

subject is started first to have th

e greatest success.

-

Obtain Senior Management support that all IA CS changes must be authorized and th e adoption of security risk assessment into the change control process is required.

-

Identify those individuals in the or ganization who are accountable for ensuring their

-

business unit adheres to the change control process. Identify those responsib le in the o rganization for supporting the change control process and their respective roles.

-

Communicate to and provide training to all participants of the change control process.

This subject is started once strategies for

“people ” are in progress.

-

Document the appropriate policy that all staff and contractors must follow change control standards and procedures.

-

Identify and update a ll exis ting cha nge c ontrol processes to in clude review of all IACS changes, and evaluation of its security risks.

-

Develop training programs and sessions on the new processes and procedures .

-

Monitor and audit the success the this new program and adjust as needed.

Technology may be considered to improve productivity, efficiency, and process consistency.

-

Develop technical requirements for the submission of change requests, evaluation, approval, and evidence retention.

-

Migrate proven change control procedure s and forms into the technology platform. Verify consistency with paper-based methods.

-

Implement technology to identify and track configuration changes of all IACS components, hardware , and software.

1330 1331 1332 1333 1334

The example above is not a detailed plan for improving change control and configuration management processes, but it effectively summarizes the importance of the people-processtechnology triad. In reality, the three aspects people-process-technology must be addressed simultaneously in order to have the greatest success.

1335 1336

In the following sections each of the principles of people, process and technology are further defined and their subjects identified.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 35 –

ISA-62443-1-1, D5E4, August 2015

1337

6.6

1338 1339 1340

Now that the concepts of people, processes, and technology are cl early defined; they can now be visualized with their respective subject areas. The core and foundational principle of the IACS Security Management System is the people-process-technology triad.

Summary

s e s u la

Or Se ga cur ni Ph Hu As zation of ity Polic mu ysi y s m Se et ca nic an cu M l Sy a a R a tion rity nd ste es na ou En ge sa ms rce me vir nd acq o s n Op nm t Se uis era en cu itio tal rity tio n, ns Se de cu Ma ve rity lop na ge Ac me me s ces nt Bu nt s an sC sin dm e Inc on ess ain tro ide c l Co ten nt o nti Ma an r nu c na e P ity ge Ma me na nt ge me Co nt mp lian ce C

Au

Com

n Ide

tific

Us

T e

ation,

eC

( rol ont

st Sy

ch n

Security

n the

e

ta Da

s e ti lii ib s n o p s e R & s le o R

s p i h s n io t a l e R

tr o p p u S , n Iy u B t, n e t n I

b a p a C d n a g n i n i ra T

Co

F ou nd at io na l

e nfid Co

Re

R

eq ui re m ents

nti

ct D stri e Tim

C) y (D alit

ata

Flo

e ly R

Re y t lii

e ss

I) y (S grit

People

g n i rc u o s e R

tio

A cc

)

) UC

nte mI

o lo g y

tica

nd na

C l (A ntro

RD w(

sp o

so u

rc

n se

v eA

F)

to E

aila

ve n

ty bili

) RE t (T

) (RA

s s e n re a w A d n a s n io is c e D

Not part of ISA-62443 series of documents

1341 1342

Figure 4 – Implementation of People, Process, and Technology

1343 1344 1345 1346 1347

‑ 62443 The technical requirements associated with IACS security are prescribed by the ISA standards commensurate with the Security Level (SL) assigned to each zone and con duit. The Foundation Requirements defined in ISA ‑ 62443-1-1 are the categories used to organize these technical security controls, and set the foundation for other ISA ‑ 62443 normative requirements.

1348 1349 1350

The policy and procedure (process) requirements build off of ISO/IEC 27002 with specific requirements unique to IACS. The clauses in ISA ‑ 62443-2-1 are the categories used to organize security processes.

1351 1352 1353 1354 1355

The personnel and resource (people) requirements associated with an IACS Security Management System are outside the scope of ISA ‑ 62443. Although it is considered extremely important, the outputs of ISA ‑ 62443 shall continue to be focused on technical and process requirements. Readers are advised to research and study topics such as organizational behavior, instituting change, and other business sociology and leadership materials.

1356 1357 1358

Each of these essential elements are reflected in a description of cyber security related concepts. These concepts in turn are broken into two groups. The first group includes the concepts that are applicable to virtually any cyber security response, while the second group

1359 1360

includes concepts that are specific or unique to the industrial automation and control systems environment. Each of these groups are described in subsequent clauses.

1361

7

1362

7.1

1363 1364 1365 1366

The People element of a cybersecurity management system shall be addressed through the definition and consistent application of a set of common role descriptions. These descriptions shall define the specific accountability and responsibilities of each role, as well as the relationships and dependencies between roles.

1367

As a minimum the roles described s hall inc lude the follo win g:

Principal Roles General

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 36 –

ISA99, WG03

1368 1369 1370

Asset Owner – This is the person or organization that has primary accountability for the IACS and its security. Responsibilities include the identification of the consequence component of risk, and the consistent operation of the cybersecurity management system.

1371 1372 1373 1374

Asset Operator – This is the person or organization that is accountable for the operation of the system under consideration. This may or may not be the same entity as the Asset Owner. For example, the Asset Owner may be different in situations involving some sorts of joint ventures or similar business structures.

1375 1376

System Integrator – It is common for an IACS to be designed and configured by an independent or external system integrator, according to specifications and requirements

1377

provided by the asset owner.

1378 1379

Product Supplier – The principal responsibility of the product supplier is to design and provide the specific components that are used to assemble the IACS.

1380 1381

Service Provider – Ensuring the security of an IACS also requires services throughout the life cycle, including regular maintenance and system updates.

1382 1383 1384

Compliance Authority – Organizations in this role include government agencies and regulators with the legal authority to perform audits to verify compliance with governing laws and regulations.

1385 1386

More details about the contributions of each of these r Life Cycle fundamental concept.

1387

8

1388 1389

In order to fully articulate the systems and components the ISA ‑ 62443 standards address, the range of coverage may be described from several perspectives, including:

IACS Definition

1390

1) range of functionality included

1391

2) systems and interfaces

1392

3) criteria for sele cting included activities

1393

4) criteria for selecting included assets

1394

oles is provided in the description of the

5) consequence based criteria

1395

Each of these is described in the following paragraphs.

1396

8.1

1397 1398 1399

The scope of IACS security can be described in terms of the range of functionality within an organization’s information and automation systems. This functionality is typically described in terms of one or more models.

1400 1401 1402 1403

This standard is focused primarily on industrial automation and control, as described in a reference model (see page 38). Industrial automation and control includes the supervisory control components typically found in process industries, as well as SCADA (supervisory control and data acquisition) systems that are commonly used by organizations that operate in

1404

critical infrastructure industries. These include:

Functionality Included

1405

a) electricity transmission and distribution

1406

b) gas and water distribution networks

1407

c) oil and gas production operations

1408 1409 1410

d) gas and liquid transmission pipelines This is not an exclusive list. SCADA systems may also be found in other critical and noncritical infrastructure industries.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 37 –

ISA-62443-1-1, D5E4, August 2015

1411 1412 1413

While business planning and logistics s ystems are not explicitly addressed within the scope of this standard, the integrity of data exchanged between business and industrial systems is considered.

1414

8.2

1415 1416 1417 1418

It is also possible to describe the IACS in terms of connectivity to associated systems. In encompassing all industrial automation and control systems, this standard covers systems that can affect or influence the safe, secure, and reliable operation of industrial processes. They include, but are not limited to:

Systems and Interfaces

1419 1420 1421 1422 1423 1424 1425

a) Industrial control systems and their associated communications networks, including distributed control systems (DCS’s), programmable logic controllers (PLC’s), remote terminal units (RTU’s), intelligent electronic devices, SCADA systems, networked electronic sensing and control, metering and custody transfer systems, and monitoring and diagnostic systems. In this context, industrial control systems include basic process control system and safety-instrumented system (SIS) functions, whether they are physically separate or integrated.

1426 1427 1428 1429 1430

b) Associated systems at level 3 or below of the Reference Model. Examples include advanced or multivariable control, online optimizers, dedicated equipment monitors, graphical interfaces, process historians, manufacturing execution systems, pipeline leak detection systems, work management, outage m anagement, and electricity energy management systems.

1431 1432 1433

c) Associated internal, human, network, software, machine or device interfaces used provide control, safety, manufacturing, or remote operations functionality to continuous, batch, discrete, and other processes.

to

1434

8.3

1435 1436 1437 1438

ANSI/I SA-95.00.0 3 [5] def ine s a set of crit eria for definin g activit ies ass ociat ed wit h manufacturing operations. A similar list has been developed for determining the scope of this standard. A system should be considered to be within the range of coverage of these standards if the activity it performs is necessary for any of the following:

Activity-Based Criteria

1439

a) predictable o peration of the process

1440

b) process or personnel safety

1441

c) process reliability or availability

1442

d) process efficiency

1443

e) process operability

1444

f)

1445

g) environmental protection

1446

h) compliance with relevant re gulations

1447

i)

product quality

product sales or custody transfer affecting or influencing industrial processes.

1448

8.4

Asset-Based Criteria

1449

The coverage of this standard includes those systems in assets that meet any of the following

1450 1451

criteria, or whose security is essential to the protection of other assets that meet these criteria:

1452 1453

a) The asset is necessary to process.

maintain the economic value of

1454 1455

b) The asset performs a process.

1456

c) The asset represents intellectual

1457 1458

d) The asset is necessary to operate and maintain security for a manufacturing or operating process.

function necessary to operation

a manufacturing or operating

of a manufacturing or o perating

property of a manufacturing or operating pro cess.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 38 –

ISA99, WG03

1459 1460

e) The asset is necessary t o protect personnel, contractors, and visitors involv manufacturing or operating process.

1461

f)

1462 1463

g) The asset is necessary to protect the operating process.

1464 1465

h) The asset is a legal requirement, especially operating process.

1466

i)

The asset is needed for disaster recovery.

1467

j)

The ass et is needed fo r log gi ng sec urit y e ven ts.

ed in a

The asset is necessary to protect the environment. public from events caused by a manufacturing or for security purposes of a manufacturing or

1468 1469 1470 1471

This range of coverage includes systems whose compromise could result in the endangerment of public or employee health or safety, loss of public confidence, violation of regulatory requirements, loss or invalidation of proprietary or confidential information, environmental contamination, and/or economic loss or impact on an entity or on local or national security.

1472

8.5

1473 1474 1475 1476 1477 1478

During all phases of the system’s life cycle, cybersecurity risk assessments shall include a determination of where and what could go wrong to disrupt IACS operations, what is the likelihood that a cyber-attack could initiate such a disruption, and what are the consequences that could result. The output from this determination shall include sufficient information to help the ordinary user (not necessarily security-conscious ones) to identify and determine the relevant security properties.

1479 1480 1481 1482 1483 1484

The method of determination shall include a decom position of a system under consideration in accordance with the specifications in ISA ‑ 62443-3-2 and make visible the interaction between individual components. Functional relationships and the models used to translate the security strength of lower level components into aggregated measures shall be delineated to the degree necessary to determine the response action in accordance with the specifications in ISA ‑ 62443-1-3.

1485

9

1486

9.1

1487 1488 1489

A set of mo de ls sh all be deve lop ed as th e basis for id ent ifyin g th e sec urit y needs and important characteristics of the environment at a level of detail necessary to address security issues with a common understanding of the framework and vocabulary.

1490

Specific models that shall be used include:

Consequence-Based

Criteria

Models General

1491 1492

a) a reference model that provides the overall conceptual basis for the more detailed models that follow.

1493 1494 1495 1496

b) a reference architecture that describes the configuration of assets. A reference architecture can be unique for each enterprise or subset of the enterprise. It is unique for each situation depending on the scope of the industrial automation and control system under review.

1497 1498 1499

c) a zone model that groups reference architecture components according to defined characteristics. This provides a context for the definition of policies, procedures, and guidelines, which in turn are applied to the assets.

1500 1501

Al l of th is inf orm ation is used to de vel op a det ailed program for ma naging th e sec urity of an industrial automation and control system.

1502

Each of these models is described in more detail in the following pages.

1503

9.2

1504 1505 1506

A ref erence mo del est ab lis hes a fram e of ref erenc e for the mo re det ailed inf orm ati on that follows. The term “reference model” became popular with the success of the ISO “Seven Layer” model for Open Systems Interconnection (OSI).

Reference Model

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03 1507 1508 1509 1510 1511

– 39 –

ISA-62443-1-1, D5E4, August 2015

A refere nce mo del des cribe s a generic view of an int egr ated ma nufac turing or pro duction system, expressed as a series of logical levels. The reference model used by the ISA ‑ 62443 series of standards appears in figure 5. This model is derived from the general model used in ANSI/I SA-95.00.0 1-2000, Enterp rise -C ontro l Sy ste m Integration Part 1: Mode ls and Terminology [4].

Level 4

Enterprise Systems (Engineering, Business Planning & Logistics)

Operations / Systems Management

Level 3

Supervisory Control

Site Monitoring & Local Display

Level 2

Industrial Automation and Control Systems Basic Control

Level 1 Safety and Protection

Level 0

Process (Equipment Under Control)

1512 1513

Figure 5 – Reference Model

1514 1515 1516

Detailed descriptions of each of the levels in this model are provided in ANSI/ISA-95.00.012000, Enterprise-Control System Integration Part 1: Models and Terminology, and summarized in the following paragraphs.

1517

9.2.1

1518 1519 1520 1521 1522 1523

This level (also described as “Business Planning and Logistics”) is defined as including the functions involved in the business-related activities needed to manage a manufacturing organization. Functions include enterprise or regional financial systems and other enterprise infrastructure components such as production scheduling, operational management, and maintenance management for an individual plant or site in an enterprise. For the purposes of this standard, engineering systems are also considered to be in this level.

1524

9.2.2

1525 1526 1527

This level includes the functions involved in managing the work flows to produce the desired end products. Examples include dispatching production, detailed production scheduling, reliability assurance, and site-wide control optimization.

1528

9.2.3

1529 1530 1531

This level includes the functions involved in monitoring and controlling the physical process. There are typically multiple production areas in a plant such as distillation, conversion, blending in a refinery or the turbine deck, and coal processing f acilities in a utility power plant.

1532

9.2.4

1533 1534

This level includes the functions involved in sensing and manipulating the physical process. Process monitoring equipment reads data from sensors, executes algorithms if necessary,

Level 4 – Enterprise Business Systems

Level 3 - Operations Management

Level 2 – Supervisory Control

Level 1 – Local or Basic Control

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 40 –

ISA99, WG03

1535 1536 1537 1538 1539 1540

and maintains process history. Examples of process monitoring systems include tank gauging systems, continuous emission monitors, rotating equipment monitoring systems, and temperature indicating systems. Process control equipment is similar. It reads data from sensors, executes a control algorithm, and sends an output to a final element (e.g., control valves or damper drives). Level 1 controllers are directly connected to the sensors and actuators of the process.

1541 1542

Level 1 includes continuous control, sequence control, batch control, and discrete control. Many modern controllers include all types of control in a single device.

1543

Also inc lud ed in Le vel 1 are safety and protection system s 2 that monitor the process and

1544 1545 1546

automatically return the process to a safe state if it exceeds safe limits. This category also includes systems that monitor the process and alert an operator of impending unsafe conditions.

1547 1548 1549 1550 1551

Safety and protection systems have traditionally been implemented using physically separate controllers, but more recently it has become possible to implement them using a method known as “logical separation,” within a common infrastructure. The depiction shown in this reference model was chosen to emphasize the need for this separation (logical or physical) to ensure the integrity of the safety functions.

1552

Level 1 equipment includes, but is not

1553

d) DCS controllers

1554

e) PLCs

1555

f)

limited to:

RTUs.

1556 1557 1558

Safety and protection systems often have additional safety requirements that may not be consistent or relevant to cyber security requirements. These systems include the safety systems in use in chemical and petrochemical plants as identified in the ANSI/ISA -84 series of

1559 1560

standards, nuclear plant safety or safety-related systems as identified in the ANSI/ISA-67 series, and protective functions as identified in IEEE Power Engineering Society standards.

1561

9.2.5

1562 1563 1564 1565 1566

This level is the actual physical process. The process includes a number of different types of production facilities in all sectors including, but not limited to, discrete parts manufacturing, hydrocarbon processing, product distribution, pharmaceuticals, pulp and paper, and electric power. Level 0 includes the sensors and actuators directly connected to the process and process equipment.

1567

9.3

1568 1569 1570 1571

The reference architecture model shall be used to describe the various operational components and how they are connected. The details are specific to each individual system under consideration. Each organization shall create one or more physical architecture mode depending on the business functions performed, as well as the functions under review.

1572 1573

It would be common for an organization to have a single generic model that has been generalized to cover all operating facilities. An example of a simplified reference architecture

1574

model for a manufacturing function is shown in Figure 6.

Level 0 – Process

Reference Architecture Model

————————— 2 These systems are referred to as

“safety instrumented systems

” in standards such as the

ANSI/ISA-84 series.

ls

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 41 –

ISA-62443-1-1, D5E4, August 2015

Enterprise Laptop computer

Workstation

Mainframe Server

Plant A

Plant B

Plant C

Router Laptop computer Workstation

File/Print App. Server Server

Router Laptop computer Workstation

Data Server

File/Print Server

Plant A Control System

App. Server

Data Server

Controller

I/O

1575

Maint. Server

Data Server

Data Server

Controller

I/O

1576

File/Print Server

App. Server

Data Server

Plant C Control System Firewall

App. Server

Controller

Router Laptop computer Workstation

Plant B Control System Firewall

App. Server

Server

I/O

Maint. Server

Controller

I/O

Firewall

App. Server

Data Server

Controller

I/O

Maint. Server

Controller

I/O

Figure 6 – Physical Architecture Model Example

1577

9.4

1578 1579

A zon e mo del shal l be develop ed from the ph ysical arc hit ect ure model. It shall be used to describe the logical groupings of assets within an enterprise or a subset of the enterprise.

Zone Model

1580 1581 1582 1583 1584 1585 1586

The assets shall be grouped into entities (e.g., business, facility, site, or IACS) that can then be analyzed for security policies and hence requirements. The model provide the context for assessing common threats, vulnerabilities, and the corresponding countermeasures needed attain the level of security required to protect t he grouped assets. After grouping assets in t manner, a security policy shall be defined for all assets that are members of the zone. This analysis shall be used to determine the appropriate protection required based on the activities performed in the zone.

1587

10 General Concepts

1588 1589 1590

There are several general concepts that are important in the field of cyber security, irrespective of the scope of application. The purpose of this clause is to provide a n informative overview of those concepts.

1591

10.1

1592 1593

The security context forms the basis for the interpretation of terminology and concepts and shows how the various elements of security relate to each other. The term security is

1594 1595 1596 1597

considered here to mean the prevention illegal or unwanted penetration or interference with the proper and intended operationof of an industrial automation andof control system. Electronic security includes computer, network, or other programmable components of the system.

1598 1599 1600 1601

The context of security is based on the concepts of threats, risks, and countermeasures, as well as the relationships between them. The relationship between these concepts can be shown in a simple model. One such model is described in the international standard ISO/IEC 15408-1 (Common Criteria) [15]. It is reproduced in Figure 7.

Security Context

to his

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 42 –

ISA99, WG03

value Owners

wish to minimize

impose Countermeasures

To reduce

Threat Agents

Risk

to that increase Threats

Assets

to

give rise to wish to abuse and/or may damage

1602 1603 1604 1605 1606

Figure 7 – Context Element Relationships A different vie w of the re lations hip is sh own in Figur e 8, which show s how an ex panded set of concepts are related within the two interconnected processes of information security assurance and threat-risk assessment. Information Security Assurance

Assurance Techniques

Evaluation

produce

Threat-Risk Assessment

gives evidence of Assurance

Owners require

Threats Confidence

using Vulnerabilities

in

require Countermeasures

to minimize Risk

to Assets

1607 1608

Figure 8 – Context Model

1609

10.2

1610 1611 1612 1613 1614

Information security has traditionally focused on achieving three objectives, confidentiality, integrity, and availability, which are often abbreviated by th e acronym “CIA.” An information technology security strategy for typical “back office” or business systems may place the primary focus on confidentiality and the necessary access controls needed to achieve it. Integrity might fall to the second priority, with availability as the lowest.

Security Objectives

1615 1616 1617 1618 1619 1620 1621

In the industrial automation and control systems environment, the general priority of these objectives is often different. Security in these systems is primarily concerned with maintaining the availability of all system components. There are inherent risks associated with industrial machinery that is controlled, monitored, or otherwise affected by industrial automation and control systems. Therefore, integrity is often second in importance. Usually confidentiality is of lesser importance, because often the data is raw in form and must be analyzed within context to have any value.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 43 –

ISA-62443-1-1, D5E4, August 2015

1622 1623 1624

The facet of time responsiveness is significant. Control systems can have requirements of system responsiveness in the 1 millisecond range, whereas traditional business systems are able to successfully operate with single or multiple second response times.

1625

10.3

1626 1627 1628 1629 1630

The principle of least privilege means giving a user or application only those privileges which are essential to complete the necessary tasks. When applied to users, the terms least user access or least-privileged user account (LUA) are also used, referring to the concept that all user accounts at all times should run with as few privileges as possible, and also launch applications with as few privileges as possible.

1631

10.4

1632 1633 1634 1635

It is typically not possible to achieve the security objectives through the use of a single countermeasure or technique. A superior approach is to use the concept of defense in depth, which involves applying multiple countermeasures in a layered or stepwise manner. For example, intrusion detection systems can be used to signal the penetration of a firewall.

1636

10.5

1637 1638 1639 1640

Within the threat-risk assessment process, assets are subject to risks. These risks are in turn minimized through the use of countermeasures, which are applied to address vulnerabilities that are used or exploited by various threats. Each of these elements is described in more detail in this clause.

1641

10.6

1642

10.6.1

1643 1644 1645

Security policies enable an organization to follow a consistent program for maintaining an acceptable level of security. Policies are defined at different levels in an organization, ranging from governance or management policies established at the enterprise level to operation

1646 1647

policies defining the details of security administration. Policies at the most specific level are the organization's standard against which security audits can measure compliance.

1648 1649 1650 1651 1652 1653 1654

A security po lic y is a for ma l, brief , and high -l eve l statem ent or pl an that embraces an organization’s general beliefs, goals, objectives, and acceptable procedures that specify or regulate how an organization protects sensitive and critical system resources. Policies unambiguously state what is mandatory. Because policies are mandatory and unambiguous, they make audits possible. The organization's security policies also take into account legal, regulatory, and contractual obligations. They are the measuring stick against which audits test the actual practices of the organization.

1655 1656 1657 1658 1659 1660 1661 1662

Complementing policies are standards and procedures. A standard is a formal document that establishes mandatory requirements, engineering, technical criteria, methods, etc. A standard is meant to convey a mandatory action or rule and is written in conjunction with a policy. A process or procedure document may also be called a standard, which typically describes the act of taking something through an established and usually routine set of procedures or steps to convert it from one form to another, such as processing paperwork to grant physical or cyber access, or converting computer data from one form to another. Security procedures define in detail the sequence of steps necessary to provide a certain security measure.

1663 1664 1665 1666 1667 1668 1669 1670 1671

Contrasting with policies, standards and procedures are guidelines. Guidelines are not mandatory. They are intended to describe a way to do something that is desirable but not mandatory and are not a required element of a policy framework; however, t hey can play an important role in conveying best practice information to the user community. Guidelines are meant to “guide” users to adopt behaviors which increase the security posture of a network, but are not yet required (or in some cases, my never be required). Because guidelines are not mandatory and may be ambiguous, practices cannot be audited against guidelines. Guidelines are sometimes written by a group that does not have the authority to require them to be followed. Guidelines are inappropriate to describe practices that are mandatory.

1672 1673

Because the policies, standards and procedures for different parts of an organization are often different, it is important that they be adequately coordinated. Specifically, the security

Least Privilege

Defens e in Depth

Threat-Risk Assessment

Policies and Procedures General

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 44 –

ISA99, WG03

1674 1675 1676

policy for IACS must be coordinated with similar policies for general purpose IT security. The security program will work more successfully if there are good working relationships among the parties, and a well-coordinated set of policies can support good relationships.

1677 1678 1679 1680 1681 1682 1683

Some consistency to the structure of the various policies, standards and procedures increases the coherence of the overall set of policies and procedures. Each policy or procedure document has a short but precise statement of its purpose. It also has a statement of scope that defines where the document applies. It has a description of the risks that it is intended to reduce and of the key principles of the document. These common items guide the reader by providing more information about the intention of the policy or procedure. They also describe the intent of the document to provide guidance, which is useful when the document needs to

1684

be revised.

1685 1686 1687 1688 1689

Different phases in a system’s life cycle have different profiles of security issues. Security policies and procedures may address only certain life cycle phases. Some policies and procedures may specify that they only pertain to certain phases. All of the security concerns from all of the various phases are addressed in corresponding places in the set of security policies and procedures.

1690 1691 1692 1693 1694 1695 1696

Security policies, standards and procedures contain instructions on how the organization will measure compliance and update the policies. Organizations often recognize that policies need to be updated when performing or evaluating audits. Audits may identify ambiguities in policies and procedures as well as parts of policies and procedures that do not make the required process or outcome clear. Audits can identify issues that should be added to policies and procedures. Audits may also identify requirements that should be reevaluated and adjusted or possibly retracted.

1697 1698 1699

Policies, standards and procedures should allow for unforeseen circumstances that make it infeasible to follow them. Policies should also state how to document and approve exceptions to policies and procedures. Documenting approved exceptions leads to a clearer state of

1700

security than leaving imprecision and ambiguity in the policies and procedures.

1701 1702 1703 1704 1705 1706 1707 1708

In addition, organizations should be unambiguous about what is a requirement versus what is optional advice in a policy or standard. Precise use of words like “shall,” “must,” “may,” and “is” removes the ambiguity. Policy statements can define these words in their introduction sections to be more precise. “Shall” and “must” are used for requirements. “May” is used for advice that is optional, and therefore is not used in the mainstream of policies and procedures. It can be appropriate to provide options for addressing a requirement. Phrases like “when possible” or “unless necessary” introduce ambig uity unless the statement also describes how to determine whether the case is possible or necessary.

1709 1710 1711 1712 1713

Policies, standards and procedures identify who is resp onsible for what. Is the process control staff responsible for the control network? Is it responsible for a “demilitarized zone” (DMZ) between the control network and the enterprise network? If an enterprise information systems department is responsible for conditions that require the process control staff to perform certain operations, then these operations should be described.

1714 1715

For an organization that is just starting to create its security program, policies and standards are a good place to begin. Initially, they can be written to cover the set of security practices

1716 1717 1718

that tightened the organization is equipped tocapability handle ingrows. the near Over they without can bethe revised and as the organization's Theyterm. can be puttime in place lead time of procuring and installing systems and devices.

1719

10.6.2

1720 1721

The policy at the enterprise level mandates the security program and sets the direction. It states the organization's overall security objectives.

1722 1723 1724 1725

The policy statement of top management should be circumspect enough to remain pertinent and accurate through changes in the structure of the organization, changes in system and security technology, and changes in the kinds of security threats. By being circumspect, the policy can be stable and will need to be rewritten only when the organization's basic position

Enter prise Level

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 45 –

ISA-62443-1-1, D5E4, August 2015

1726 1727

on security changes. However, the policy statement is also unambiguous; it clearly identifies what is required.

1728 1729 1730 1731 1732 1733

The enterprise level policy identifies areas of responsibility and assigns accountability for those areas. The policy can define the relationship between the enterprise IT department and plant operations and identify their different responsibilities. The policy can differentiate security objectives of the control system from those of the enterprise network. For example, maintaining confidentiality may be a top consideration of security for the enterprise network, whereas maintaining continuous operation may be a top consideration for the control system.

1734

In addition, the policy identifies particular standards and regulations that apply to the

1735 1736

organization. It may identify training as an important component of the security program. The policy may also indicate the consequences for policy violations.

1737 1738

Management should communicate the policy throughout the organization so that all employees understand it.

1739

10.6.3

1740 1741 1742 1743 1744

Operational policies, standards and procedures are developed at lower levels of the organization to specify how the enterprise level policy is implemented in a specific set of circumstances. Security standards and procedures put the policy into effect. They define what the organization will do to achieve the objectives and to meet the requirements of the policy. The procedures establish processes that will address all the concerns of the policy.

1745 1746

The standards and procedures address all components needed in a security program, including:

Operat ional Level

1747

a) system design

1748

b) procurement

1749 1750

c) installation d) process operation

1751

e) system maintenance

1752

f)

1753

g) audit

1754

personnel

h) training

1755 1756

The standards and procedures identify specific activities, who is accountable for their performance, and when activities will be performed.

1757 1758 1759

The written procedures describe the process by which they will be changed when the situation changes. Each policy, standard or procedure has an identified owner responsible for recognizing when updates are needed and for ensuring they are made.

1760 1761 1762 1763 1764 1765

The effectiveness of policies, standards and procedures should be measured to check whether they serve their intended purpose. The cost to the organization should also be measured, so the organization can determine whether the balance of risk redu ction aligns with the cost to implement the policies. If the balance is unacceptable, the policy and procedures may have to be adjusted. Procedures also have to be updated to reflect changes in technology.

1766 1767

Procedures are able to support audits. A security audit compares the observed actions of the organization against the written procedures.

1768

10.7

1769 1770 1771

There are several topics that policies and procedures can cover. Every organization is different and should determine the appropriate policies and procedures that are applicable for its industrial automation and control systems. Possible topics include:

Topics Covered by Policies and Procedures

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 46 –

ISA99, WG03

1772 1773 1774 1775 1776 1777 1778 1779

Risk Management – Risk management is vital to developing a cost-effective security program that provides a uniform layer of adequate security, but that does not require equipment or procedures that are too costly and significantly beyond the range of adequate security. However, risk management is complex and needs to be tailored to the organization. The policy on risk management defines how an acceptable level of risk is determined and how to control the risk. This level varies depending upon the goals and circumstances for a particular organization. The process for determining risk level should be repeated periodically in order to accommodate changes to the environment.

1780 1781

Access Manag em ent – Security is improved in a system by restricting access to only those users who need and are trusted with the access. Access management policy identifies

1782 1783 1784 1785 1786 1787

different roles of users and what kind of access each role needs to each class of asset (physical or logical). It specifies the responsibilities of employees to protect the assets and of administrators to maintain access management procedures. Authorization for these access privileges should have well-documented approval by management and be periodically reviewed. Access management may be as important or even more important to system integrity and availability as the need to protect data confidentiality.

1788 1789 1790 1791

Av ail ab ili ty and Co ntinu it y Pl ann ing – Policies in this area provide the necessary framework and requirements expectations for backup and recovery, as well as business continuity and disaster recovery planning. They also define archiving characteristics (e.g., how long must data be retained).

1792 1793 1794 1795 1796 1797 1798

Physical Security – The security of the control system depends upon the physical security of the space that contains the control system. The plant site may already have a physical security policy before the security policy is written for the control system. However, policies related to systems’ physical access may differ from those involving non -systems assets. For instance, all oil refinery personnel may have general access to almost all facilities within the plant fences, but IT infrastructure rooms may need to have access limited to only IT-related personnel – if for no other reason than to prevent accidental damage. The control system

1799 1800 1801 1802 1803

security policy should include a reference to the physical security policy and state its dependency. The security policy for the control system must contain enough specifics on physical security to make any specific application of the site physical security policy to the control system. For example, some equipment must be in locked cabinets, and the keys must be kept in a restricted place.

1804 1805

Arch itect ure – Policies and procedures describe secure configurations of control systems including such issues as:

1806

a) recommended network designs

1807

b) recommended firewall configuration

1808

c) user authorization and authentication

1809

d) interconnecting different process control networks

1810

e) use of wireless communications

1811

f)

1812

g) patch management (including authentication)

1813 1814 1815

h) anti-virus management i) system hardening in terms of closing softwa re ports, disabling or avoiding unused or dangerous services, and disabling the use of removable storage devices

1816

j)

1817

k) appropriate use of e-mail.

1818 1819 1820 1821 1822

domains and trust relationships

acc ess to exter nal netwo rks (i. e., the inter net)

Portable Devices – Portable devices pose all the security risks of stationary equipment, but their mobility makes it less likely that they will be covered by the normal security procedures from installation to audit. Their portability provides additional opportu nities for corruption while outside physical security zones or for interception of information while connecting to secure zones. Thus, a special policy is often needed to cover portable devices. The policy should

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 47 –

ISA-62443-1-1, D5E4, August 2015

1823 1824

require the same security protection as a stationary device, but the technical and administrative mechanisms that provide this protection may differ.

1825 1826 1827 1828 1829 1830 1831 1832

Wireless Devices and Sensors – Control equipment using radio frequency transmission in place of wires has been widely used in certain control system applications for many years. As costs decrease and new standards emerge, potential applications in automation and control systems continue to expand, in part due to lower installation costs. A key difference between wired and wireless devices is that in the latter case signals are not confined within a physical security boundary, making them more prone to interception and corruption. Therefore, a security policy specific to wireless devices is appropriate for organizations that currently use or may in the future deploy wireless devices or sensors in their operations. The policy may

1833 1834

specify which applications can use wireless devices, what protection and administrative methods are required, and how wired and wireless networks are interconnected.

1835 1836 1837 1838 1839

Remote Access – Remote access bypasses the local physical security controls of the boundaries of the system. It extends access to the trusted zone to a completely different geographic location and includes a computer that may not have undergone the security checks of the computers that are physically in the area of the trusted zone. Different mechanisms are required to provide the same level of security as the trusted zone.

1840 1841 1842 1843 1844

Personnel – Personnel issues are likely to be defined in the enterprise personnel and IT security policies. The control system security policy provides specifics, whereas the more general policies do not include control system aspects. For example, the control system security policies coordinate control system access roles with personnel screening and monitoring practices.

1845 1846 1847 1848

Subcontractor Policy – Security issues include work that may involve subcontractors in roles such as supplier, integrator, maintenance service provider, or consultant. A security policy that covers subcontractors addresses the interactions with the subcontractor that could open vulnerabilities. The policy identifies the responsibilities of the different parties. It addresses

1849 1850 1851

the changing responsibilities as projects progress through their phases and as materials and systems are delivered. The policy may require certain terms to be written into contracts with subcontractors.

1852 1853 1854 1855

Without proper management of contract programmers, application integrity may be compromised or programming code may not be maintainable. It is important to find wellqualified contract programmers who will follow your programming and documentation standards and perform adequate testing, as well as being trustworthy and timely.

1856 1857 1858 1859 1860

Audi tin g – The security of the system is audited regularly to measure the degree of compliance with the security policies and practices. The security policy addresses the need for audits and specifies the responsibility, the regularity, and the requirement for corrective action. A comprehensive auditing process may address aspects other than security, such as process efficiency and effectiveness, and regulatory compliance.

1861 1862 1863 1864

Security Policy Updating – The security policy is monitored to determine changes needed in the policies themselves. Monitoring security policy is a part of each policy and procedure document, and the enterprise security policy sets forth the overall approach. Each operational policy and procedure document contains a statement of when and by whom the policy or

1865

procedure itself is to be reviewed and updated.

1866 1867 1868

Training – Training programs should be in place for new hires, operations, maintenance, upgrades and succession planning. Training programs should be well documented, structured, and updated at regular intervals to incorporate changes in the operating environment.

1869

10.8

1870

10.8.1

1871 1872 1873 1874

Understanding key management first requires a n insight into the life cycle for the keys that are part of a key management schema. Fundamentally, a key is a piece of auxiliary information that changes the detailed operation of an encryption algorithm. A key should be selected before using an encryption algorithm to encrypt an IACS message or piece of information.

Key Management Introduction

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 48 –

ISA99, WG03

1875 1876

Without knowledge of the key, it should be difficult, if not impossible, to decrypt the resulting ciphertext into human or machine readable plaintext.

1877 1878 1879 1880 1881

A lif e cycle ma y begin wit h a cr ypt ope ri od for the ke ys which des cribes the lif e st age s (k ey states) from creation to revocation and disposal. IACS operations run 24/7 which depends on continuous availability of critical communication resources. For this reason, special attention needs to be given to the requirements for timely disposition of keys described by the system triggers shown in Figure 9.

1882

1883 1884

Figure 9 – Key management life cycle

1885

10.8.2

1886 1887 1888 1889 1890 1891 1892 1893 1894 1895

Generation and distribution of keys that maintain the secret value afforded the key is prov in a timely manner to support 24/7 P&C operations. A key management schema or system is only effective if something (usually the key but could be an encryption algorithm) is secret. How to maintain the secret across widely geographically dispersed IACS operational entities and unknown entities becomes the challenge for a key management design. So, generating a key for which that key may have a wide breath of use or a very narrow use leads to defining an effective distribution channel. The channel can be a physical channel such as a courier or equivalent, the channel can be an electronic channel such as the Internet which should not be trusted. The means used to distribute the keys is largely determined by the timeliness requirements imposed by critical IACS operations that require high security.

Generation and distribution of keys

1896 1897

Except in simple IACS operations where key components remain fixed for all time, cryptoperiods are needed for keys, and these keys need to be updated periodically. The time

ided

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 49 –

ISA-62443-1-1, D5E4, August 2015

1898 1899

frame for a key to be used varies. The cryptoperiod of a key is the time period during which the key is valid for use by legitimate human and non-human entities. Cryptoperiods serve to:

1900



Limit t he information (related to a specifi c key) available for cryptanalysis ;

1901



Limit e xposure in the case of compromise of a single key ;

1902



Limit t he use of a particular technology to its estimated effectiv e lifeti me; and

1903 1904

– Limit the time available for computationally intensive cryptanalytic applications where long-term key protection is not required).

1905

10.8.3

1906 1907 1908 1909 1910 1911

IACS operation requires secure management of the keying material in all key state phases shown in Figure 9: pre-operational, operational, post-operational, and destruction. Furthermore, the key management s ystem should provide a secure method to account for how the keys are maintained. Backup key management and key recovery becomes extremely important to maintain 24/7 operations when the primary key management system fails or is disconnected.

1912

11 Fundamental Concepts

1913 1914

There are several fundamental concepts that are essential to the formulation and execution of an Industrial Automation and Control Systems security program.

attacks (in IACS

Key Stat e Phas es

1915 1916 1917 1918

k) Security Life Cycle – This life cycle is focused on the security level of a portion of the system over time. A change to a physical asset may trigger a set of security level activities, or a change in security vulnerabilities or an asset may trigger a change in the physical asset.

1919 1920

l)

1921 1922

Security Program Maturity – A mature security program integrates all aspects of cyber security, incorporating desktop and business computing systems with industrial automation andand control systems. The development of a program shall recognize that there are steps milestones in achieving this maturity

1923 1924 1925

m) Zone and Conduits – Segmenting or dividing a system under consideration for the purpose of assigning security levels and associated measures is an essential step in the development of the program.

1926 1927

n) Security Levels – Assets that make up the system under consideration shall be assigned desired security levels using the mechanism defined in ISA ‑ 62443-3-2.

1928 1929

o) Foundational Requirements – The full scope of detailed technical and program requirements shall be derived from a small set of foundational requirements.

1930 1931 1932

p) Safety and Security – In an IACS context the subjects of Security and Safety are closely linked. A failure to secure an IACS can in turn result in a potentially unsafe System under Control.

1933 1934

Each of these concepts is introduced in subsequent clauses and addressed in more detail in one or more standards in the ISA ‑ 62443 series.

1935

11.1

1936

11.1.1

1937 1938 1939 1940

This section explains the different security aspects in the relevant life cycles of an IACS and outlines which parts of the ISA ‑ 62443 series provide guidance for the security aspects of the respective life cycle. The entities of these relevant life cycles and the respective main responsible role are shown in table 2.

Security Life Cycle Introduction

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015 1941

1942 1943 1944 1945 1946

– 50 –

ISA99, WG03

Table 2 – Entities with relevant life cycles and the respective main responsible role Entity

Responsible role

Product used in the IACS

Product Supplier

Project integrating various products into a solution

System Integrator

Solution as operated, maintained and eventually decommissioned

Asset Owner

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

For each entity and the associated life cycle, the security aspects are defined and implemented in a security process model, often referred to as the Plan-Do-Check-Act (PDCA) cycle. For each of these PDCA cycles, a different role is mainly responsible to ensure that all the cyber security aspects are properly addressed. These PDCA cycles are shown in Error! Reference source not found..

1947 1948

Figure 10 – Security aspects in relevant life cycles

1949 1950 1951 1952

As als o shown in Error ! Ref erenc e source not fo un d., the re are a num ber interdependencies between these PDCA cycles. While Error! Reference source not found. shows a role centric view on the security aspects in IACS environments, Error! Reference source not found. shows a life cycle centric view.

1953 1954 1955 1956 1957 1958 1959 1960

The product life cycle must address the security aspects of the product. Product development is usually done independent of any specific project – instead products are developed for a perceived market. Therefore the product PDCA cycle is fairly decoupled from the others. However, past and current project requirements and feedback from the installed base are a source for market requirements. After a product is released into the market, it needs to be maintained. At the same time, the product PDCA cycle needs to continuously support projects and the installed base throughout the life cycle of the product with product security documentation and operational guidelines. Eventually the product will be taken off the market.

1961 1962 1963 1964

The IACS life cycle addresses the security aspects of the project in which an automation solution is designed and commissioned as well as the continuous operation and maintenance of the solution and its eventual decommissioning. Integration projects are dependent on information from the various product suppliers feeding into the project and in return provide

of

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 51 –

ISA-62443-1-1, D5E4, August 2015

1965 1966 1967 1968 1969 1970

requirements and feedback for consideration in future updates and new products. At the same time, based on the project requirements and in particular the security targets specified by the asset owner, the design of the automation solution done in the integration project largely determines how the IACS will be operated. Therefore the integration project’s PDCA cycle must supply appropriate information in particular the solution security documentation to the operations PDCA cycle.

1971 1972 1973 1974

Asset owner s’ operations team s pro vid e requ irem ent s bot h to int egr atio n proj ect s as wel l as to product suppliers. In return they depend on initial documentation and continuous support throughout the solution’s lifecycle. Hence it is obvious that the life cycle of the integration project and the operations are tightly intertwined. In fact, usually the integration project

1975

activity is not started unless the eventual asset owner issued a request for bids.

1976 1977

Figure 11 – Interdependencies in product and IACS lifecycles

1978 1979 1980

The following subsections provide more detail on the PDCA cycles shown in Error! Reference source not found. and the corresponding security aspects and explain how the different parts of the ISA ‑ 62443 series correlate to them.

1981

11.1.2

1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994

Alth oug h som e products are sp eci fi call y developed for a gi ven proje ct , in general the aim of the product supplier is to offer components and systems with a reasonable level of confidence that they are free from vulnerabilities and meet the required security requirements of their intended target markets. It is recommended to conduct several PDCA cycles during the product development cycle. The first cycle should take place in the specification phase and should be focused on the expected threats coming from the operating environment of the product. In the design phase PDCA cycles should be applied to product architecture and data flow aspects. During commercialization and maintenance the product supplier has to take care of vulnerability handling and to issue security patches and updates as necessary. Finally in the phase out early announcement of the termination of support and security updates is important. Beside the security relevant technical documentation the product supplier should also document the security recommendations for integration and operation of the product as well as the description of the continuous support during the whole life cycle.

1995 1996 1997

On one side the product supplier’s organization should establish a product development process ensuring that all measures to avoid the creation of vulnerabilities are addressed. In ISA ‑ 62443-4-1 the product supplier will find process requirements which help him to

Produ ct life cycle

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 52 –

ISA99, WG03

1998 1999 2000 2001 2002 2003 2004 2005 2006 2007

systematically address the security issues from specification phase throughout design, implementation, verification and validation and release until phase out. The purpose of this part is to improve the quality of product development process and to include security specific measures in the organizational as well in the technical area. On the other side ISA ‑ 62443-3-3 and ISA ‑ 62443-4-2 specify security capabilities which should be fulfilled by the control system or components of the control system to support a defense in depth strategy when deploying an automation solution. A product supplier may choose to integrate a given set of functionalities depending on the security level expected in the target industries of the product. To achieve the required security level of the automation solution additional compensating countermeasures may be necessary.

2008 2009 2010

‑ TR62443-2-3 for the patch management In addition product suppliers should consider ISA process. ISA ‑ TR62443-3-1 provides assessments of current cyber security tools, mitigation counter-measures, and technologies that may be applied to products and solutions.

2011

11.1.3

2012

11.1.3.1

2013 2014 2015 2016 2017 2018 2019 2020

Usually the functional and design specification is a first phase of a new project. In some cases the specification uses some material from previous projects that might be applicable or reusable, e.g. a set of user needs. Based on that, the asset owner then begins work on identifying the relevant security targets and the corresponding risks. This part is also known as a high level risk assessment. Hence the risk identification as part of the overall system specification takes into account lessons learned, existing checklists and brainstorming to identify known or new risks. Furthermore it includes also the determination of the currently assumed likelihood of risk occurring and impact.

2021 2022 2023

The asset owner describes the security related requirements for the construction and operation of the plant (target security level, SL ‑ T) in the form of the tender requirements specification of the potential integrators The asset owner also describes which strategic or

2024 2025 2026 2027 2028 2029 2030 2031

company internal requirements have to be considered (e.g., security policies, physical constrains) during the overall project. System integrators responding to the tender create the functional specifications of the automation solution as part of their offer based on the tender specification and mainly the external technical documentation of all the eligible solutions/ components from one or more product suppliers. The asset owner has to check this functional specification to ensure, that all requirements will be addressed by the automation solution. If the functional specification is accepted by the asset owner, a contract will be negotiated and the collaborative project will be started.

2032 2033 2034 2035 2036 2037

ISA ‑ 62443-2-1 defines the requirements for an industrial automation and control system (IACS) security management system (IACS -SMS) and provides guidance on how to develop it. Specifically for the patch management aspect of an IACS-SMS, ISA ‑ TR62443-2-3 provides detailed guidance. Finally, ISA ‑ 62443-3-2 establishes requirements for defining the zones and conduits of the system under consideration, assessing risk, establishing a target security level (SL-T), providing informal guidance on how to verify these requirements.

2038

11.1.3.2

2039 2040 2041 2042

The integration and commissioning phase is an iterative process of the system integrator, mainly used for designing and implementing the appropriate secure automation solution requested by the asset owner (and its security targets). The solution of the system integrator is characterized by:

IACS Life Cycl e Specification Phase

Integration and Commissioning Phase

2043



using the zone and conduit model to design a secure auto mation infrastructure,

2044 2045 2046



selecting and integ rating products from the product suppli er( s) according their security capabilities (taking into account the product security documentation/ guidelines/ support),

2047 2048

– configuration and parameterization dedicated security capabilities),

2049 2050



of all products

(not limited to

products with

providing evidence during the commissioning, and in the final application of the asset owner, that the final integrated solution fulfils all requirements appropriately,

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03 2051 2052

– 53 –

ISA-62443-1-1, D5E4, August 2015

– supporting the final integrated solution along the asset owners life cycle (operation, maintenance, decommissioning),

2053 2054 2055

In the end of the integration and commissioning phase the system integrator must ensure that all the measures implemented for the achieved Security Level (SL-A) are efficient, suitable and match the target Security Level (SL-T).

2056 2057

As par t of the re su lt of the project th e system int egr ator shou ld provide th e ass et owner with external technical documentation and support such that the asset owner will then:

2058 2059



be able to operate, maintain and decommission the automation solution its specification,

2060 2061



be able to find all IT security-relevant information necessary solution,

2062 2063

– be able to regularly check the implemented countermeasures and

2064



be able to adapt the implemented countermeasures when the

securely wit hin

for future cha nges of the for their effectiveness, threat situation changes

2065 2066 2067

Furthermore the documentation should also provide information concerning the operating and maintenance of the overall automation solution which is also a basis for the training the asset owners personnel.

2068 2069 2070 2071 2072 2073 2074

ISA ‑ 62443-2-4 specifies capabilities for IACS Solution Suppliers, especially system integration service providers. ISA ‑ 62443-3-2 provides requirements how to determine the achieved security level (SL-A) of the overall solution and to validate that it matches the previously defined security target level (SL-T). ISA ‑ 62443-1-3 defines system cyber security conformance metrics for an industrial automation and control system (IACS). Finally, ISA ‑ TR62443-3-1 provides an overview of security technologies and their appropriate use in IACS environments.

2075 2076 2077 2078 2079

11.1.3.3 Operations & Maintenance Phase It is one of his major responsibilities of the owner or operator of an IACS to ensure during the operation and maintenance phase the security capabilities of the IACS will be kept on the achieved and approved security levels in all of its zones and conduits. He has to keep the risk of security breaches and associated consequences a t an acceptable level.

2080 2081

In general the security properties of each IACS will change over time due to the following changes in the primary or in itial security milieu. Those changes can be the following:

2082 2083



The confidence in the security capabilities discovered vulnerabilities.

of the ICAS components is reduced due to

2084 2085



The security requirements of t he IACS are changed e.g. due to changes of the threat situation.

2086 2087



Technical, organizational and/o r operational changes i mpa cting the secure operation of the IACS.

2088 2089

The security properties relevant to the IACS must be audited and/or tested at regular intervals or whenever a new vulnerability is discovered to ensure that SL(Achieved) matches

2090 2091 2092

SL(Target). The product supplier and the system integrator have to inform the asset owner or operator whenever they have discovered any change in the security capabilities of their products or systems leading to a de gradation of their associated security capabilities.

2093 2094 2095 2096 2097 2098 2099 2100

The central document in the standardization series ISA ‑ 62443 describing the process of operating and maintaining the achieved security capabilities is the part ISA ‑ 62443-2-1: Industrial automation and control system security management system. That document describes among other topics also the maintenance and improvement steps of a cyber security management system (CSMS) following the outline of the ISO standard 27001 and 27002. The asset owner should continuously monitor, review and audit the selected security controls and measures and their effectiveness. It should implement decided upon improvements and adjustments and communicate those actions to all involved parties.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 54 –

ISA99, WG03

2101 2102 2103 2104 2105 2106 2107 2108

Further attention should be given the technical report on patch management (ISA ‑ TR62443-23), one of the important tasks to keep the level of security (SL achieved) of implemented SW applications to its srcinally implemented level. The asset owner should specifically monitor and assess maintenance provider’s development in respect to the defined maturity levels during his involvement with the IACS (see ISA ‑ 62443-2-4), possibly involving IACS service providers. Re-assessing previous risk assessments can have an impact on the design of the security zones and conduits (ISA ‑ 62443-3-2) and the choice of mitigation measures to meet ‑ 62443-3-3). the selected technical or organizational setup of an IACS the system (ISA

2109

11.1.3.4

2110 2111 2112 2113 2114 2115 2116 2117 2118 2119 2120 2121 2122 2123

When decommissioning an of automation solution enviro or parts thereof, there the is a risk owner’s of compromising the security the surrounding nment (e.g. asset organization) or the remaining automation solution. Decommissioning may range from discontinuing the entire automation solution (with or without replacement) to removal of individual assets (with or without replacement). The risk of security compromise stems from the potential disclosure of data or information which may be left on the assets in a format that may be useful for an attacker (e.g. encryption keys, authentication credentials, architecture information). It is the responsibility of the asset owner to ensure to an appropriate level that such information is removed or otherwise rendered useless during the decommissioning. To live up to this responsibility, the asset owner depends on documentation from the system integrator and the product suppliers on where such information may be located and how to properly remove it or render it unusable otherwise. ISA ‑ 62443-2-1 has requirements and guidance on security aspects of decommissioning such as disposal or reuse of information, media as well as equipment.

2124

11.2

2125 2126 2127

Driven by increasing cyber security risks, many organizations have taken a proactive approach towards addressing the security risks of their information technology systems and networks. They are beginning to realize that addressing cyber security is a continuous activity

2128

or process and not a project with an identified start and stop.

2129 2130 2131 2132 2133

Historically organizations providing and supporting business information systems and industrial automation and control systems operated in two mutually exclusive areas. The expertise and requirements of each organization were not understood or appreciated by the other. Issues arose as organizations tried to employ common IT security practice s to industrial automation and control systems.

2134 2135 2136 2137 2138 2139 2140 2141

In some cases, the security practices were in opposition to normal production practices designed to maximize safety and continuity of production. Because today’s open information technologies are used extensively in industrial automation and control systems, additional knowledge is required to safely employ these technologies. The IT and manufacturing or production organizations should work together and bring their knowledge and skills together to tackle security issues. In industries with a high potential for health, safety, and environmental incidents, it is important to involve Process Safety Management (PSM) and physical security personnel as well.

2142 2143

The goal is a “mature” security program that integrates all aspects of cyber security, incorporating desktop and business computing systems with industrial automation and control

2144 2145 2146

systems. Many organizations have fairly detailed and complete cyber security programs for their business computer systems, but cyber security management practices are not as fully developed for IACS.

2147 2148 2149 2150 2151

A com mo n mista ke is to add ress cyber secur it y as a proje ct wit h a start and end date. When this occurs, the security level often declines over time. Cyber security risks constantly change as new threats and vulnerabilities surface along with ever-changing technology implementations. A different approach is needed to sustain the security gains and hold risk to an acceptable level.

2152 2153 2154

The recommendation is to develop and implement an organization-wide cyber security management system (CSMS) that includes provisions to reassess risk and take corrective actions to eliminate the tendency for security levels to decline over time. An in-depth

Decommissioning Phase

Maturity Levels

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 55 –

ISA-62443-1-1, D5E4, August 2015

2155 2156

description of the key components of a cyber security management system is provided in the second standard in this series. [1]

2157 2158 2159 2160 2161 2162 2163 2164

Every organization’s journey to implement a cyber security management system will be different based on the organization’s objectives and tolerance for risk. Integrating cyber security into an organization’s standard practices is a cultural change that takes time and resources. As the figures suggest, it cannot be achieved in one step. It is an evolutionary process that standardizes on the approach to cyber security. The security practices to be implemented must be proportionate to the risk level and will vary from one organization to another, and may even be different for various operations within the same organization based on global needs and requirements. Individual policies and procedures may also be different

2165 2166 2167

for each class of system within an organization because the level of risk and security requirements may be different. A cyber security management system establishes the overall program that accommodates these differences.

2168 2169

Education and awareness are critical for successfully addressing IACS cyber security risks as noted above. There are several options to consider:

2170 2171

a) Training the IACS personnel to understand the current information technology and cyber security issues.

2172 2173

b) Training IT personnel to u nderstand IACS technologies, along Management processes and methods.

2174 2175

c) Developing practices that join the s security collaboratively.

2176 2177 2178

kill sets of all the organizations to d

eal with cyber

For the cyber security program to be successful, it is necessary to assemble the right mix of people on both the mitigation projects and the overall CSMS program development. Contributing groups include:

2179

– IT and Telecom support

2180

– IT security

2181



2182

– Operations and Maintenance

2183

– IACS Support

2184

with the Process Safety

Suppliers

– Process Safety

2185

11.2.1

2186 2187

It is possible to describe the relative maturity of a cyber security program in terms of a life cycle that consists of several phases. Each of these phases consists of one or more steps.

Matur ity Phase s

2188 2189 2190 2191 2192 2193

Portions of the industrial automation and control system, or control zones within a control system can be at different phases of maturity. There are several reasons for this situation, including budgetary constraints, vulnerability and threat assessments, schedules placed against risk analysis results, automation upgrades, plans for dissolution or replacement, plans to sell a segment of the facility or business, or availability of other resources to upgrade the security systems to a more mature phase.

2194 2195 2196

Organizations can achieve a more detailed evaluation of security maturity by assessing achievements within portions of the industrial automation and control system in terms of the phases and steps shown in the following table.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015 2197

– 56 –

ISA99, WG03

Table 3 – Security Maturity Phases Phase

Concept

Step

Identification Concept

Functional Analysis

Definition

Implementation

Functional Design Detailed Design Construction

Operations

Operations Compliance Monitoring

Recycle and Disposal

Disposal Dissolution

2198 2199

The tables that follow provide general descriptions for each of the phases and steps in the maturity life cycle.

2200

Table 4 – Concept Phase Step

Identification

Concept

Description



Recognize need for protection of property, assets, services, or personnel



Start developing the security program



Continue developing the security program



Document assets, services, and personnel needing some level of protection

 Document enterprise potential internal and external threats to the

2201



Establish security mission, visions, and values



Develop security policies for industrial automation and control systems and equipment, information systems and personnel

Table 5 – Functional Analysis Phase Step

Definition

Description



Continue developing the security program



Establish security functional requirements for industrial automation and control systems and equipment, production systems , information systems, and personnel



Perform vulnerability assessment of facilities and associated services against the list of potential threats



Discover and determine legal requirements for industrial automation and control systems



Perform a risk analysis of potential vulnerabilities and threats



Categorize risks, potential impacts to the enterprise, and



potential mitigations Segment security work into controllable tasks and modules for development of functional designs



Establish network functional definitions for security portions of industrial automation and control systems

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 57 –

2202

ISA-62443-1-1, D5E4, August 2015

Table 6 – Implementation Phase Step

Functional Design

Description



Development of the security program is completed in this phase



Define functional security requirements for enterprise zones, plant zones, and control zones. Potential activities and events are defined and documented to perform the functional requirements and implement plans for a secured enterprise.



Define functional security organization and structure



Define functions required in the implementation plan



Define portals and publish security zones, borders, and access control Complete and issue security policies, and procedures

 Detailed Design

Construction



Design physical and logical systems to perform the functional requirements previously defined for security



Conduct training programs



The implementation plan is fully developed



Initiate asset management and change management programs



Design borders and access control portals for protected zones



Implementation plan is executed. Physical security equipment, logical applications, configurations, personnel procedures are installed to complete the secured zones and borders within the enterprise.



Access control portal attributes are activated and maintained



Training programs are completed



Asset management and change management programs are functional and operating



Security system turnover packages are completed and ready for acceptance by operations and maintenance personnel

2203

Table 7 – Operations Phase Step

Operations

Compliance Monitoring

2204

Description



Security equipment, services, applications and configurations are completed and accepted by operations and maintenance



Personnel are trained, and continued training is provided on security matters



Maintenance monitors security portions of enterprise, plant, or control zones and keeps them functioning properly



Asset management and change management is operational and maintained

 Internal audits  Risk reviews  External audits

Table 8 – Recycle and Disposal Phase Step

Disposal

Description



Obsolete security systems are properly disassembled and disposed of



Security borders are updated or recreated for zone protection



Access control portals are created, redefined, reconfigured, or closed



Personnel are briefed about changes in the security systems and items along with the impact to associated security sys tems

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015 Dissolution

– 58 –

ISA99, WG03



Intellectual property is properly collected, documented, and securely archived or destroyed



Access control portals and respective links are closed



Personnel are briefed about dissolution of the security systems and items along with the impact to remaining security system s

2205 2206

11.3

2207

11.3.1

Zones and Conduits

2208 2209 2210 2211 2212 2213

Every situation has a different acceptable level of security. For large or complex systems it may not be practical or necessary to apply the same level of security to all components. Differences can be addressed by using the concept of a security zone, defined as a logical or physical grouping of physical, informational, and application assets sharing common security requirements. This concept can be applied in an exclusive manner where some systems are included in the security zone and all others are outside the zone.

2214 2215 2216

A cond uit is a part icu la r typ e of sec urity zon e that groups comm uni cati ons that can be logically organized into a grouping of information flows within and also external to a zone. Channels are the specific communication links established within a communication conduit.

2217

11.3.2

2218 2219 2220 2221 2222

A security zon e has a border, whi ch is the boundary between inc luded and excluded components. The concept of a zone also implies the need to access the assets in a zone from both within and without. This defines the communication and access required to allow information and people to move within and between the security zones. Zones may be considered to be trusted or untrusted.

2223

Security zones can be defined in physical terms (i.e., a physical zone), in logical terms (i.e.,

2224 2225 2226 2227 2228

virtual zone), or in some combination. Physical zones are defined by grouping assets by physical location. In this type of zone it is easy to determine which assets are within each zone. Virtual zones are defined by grouping assets, or parts of physical assets, into security zones based on functionality or other characteristics, rather than the actual location of the assets.

2229 2230 2231

There can also be zones within zones that provide layered security, giving defense in depth and addressing multiple levels of security requirements. Defense in depth can also be accomplished by assigning different properties to security zones.

2232

11.3.2.1

2233



2234

11.3.2.2

2235



2236

11.3.3

2237

Information must flow into, out of, and within a security zone. Even in a non-networked

2238 2239 2240 2241

system, some communication exists (e.g., intermittent connection of programming devices to create and maintain the systems). To cover the security aspects of communication and to provide a construct to encompass the unique requirements of communications, this standard is defining a special type of security zone: a communications conduit.

2242 2243 2244 2245

A co nduit can be a si ng le ser vic e (i .e., a sin gle Ethern et network ) or can be ma de up of multiple data carriers (multiple network cables and direct physical accesses). As with zones, it can be made of both physical and logical constructs. Conduits may connect entities within a zone or may connect different zones.

2246 2247 2248

As with zones , co ndu its ma y be either trust ed or untrusted. Conduit s th a t do not cross zon e boundaries are typically trusted by the communicating processes within the zone. Trusted conduits crossing zone boundaries must use an end-to-end secure process.

Introduction

Zones

Requirement

Rationale

Conduits

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 59 –

ISA-62443-1-1, D5E4, August 2015

2249 2250 2251

Untrusted conduits are those that are not at the same level of security as the zone endpoint. In this case the security of the communication becomes the responsibility of the individual channel. Further information on this scenario is available in the Annex.

2252

11.3.3.1

2253



2254

11.3.3.2

2255



2256 2257 2258 2259

11.3.4 Channels Channels inherit the security properties of the conduit used as the communication media (i.e., a channel within a secured conduit will maintain the security level of the secured conduit). Channels may be trusted or untrusted.

2260 2261 2262

Trusted channels are communication links that allow secure communication with other security zones. A trusted channel can be used to extend a virtual security zone to include entities outside the physical security zone.

2263 2264 2265 2266

Untrusted channels are communication paths that are not at the same level of security as the security zone under study. The communications to and from the reference zone (the zone that defines the communication as non-secure) must be validated before accepting the information.

2267

11.3.5

2268 2269 2270

When organizing a system into zones and conduits an organization must first assess the security requirements (security goals) and then determine the positioning of asset within the zone structure. The security requirements can be broken down into the following types:

2271 2272 2273 2274

Communications Access – For a group of assets within a security border to provide value, there must be links to assets outside the security zone. This access can be in many forms, including physical movement of assets (products) and people (employees and vendors) or electronic communication with entities outside the security zone.

2275 2276 2277 2278

Remote communication is the transfer of information to and from entities that are not in proximity to each other. For purposes of this document, remote access is defined as communication with assets that are outside the perimeter of the security zone being addressed.

2279 2280

Local access is usually considered communication between assets within a single security zone.

2281 2282 2283 2284 2285 2286

Physical Access and Proximity – Physical security zones are used to limit access to a particular area because all the systems in that area require the same level of trust of their human operators, maintainers, and developers. This does not preclude having a higher-level physical security zone embedded within a lower-level physical security zone or a higher-level communication access zone within a lower-level physical security zone. For physical zones, locks on doors or other physical means protect against unauthorized access. The boundary is

2287 2288

the wall or cabinet that restricts access. Physical zones should have physical boundaries commensurate with the level of security desired, and aligned with other asset security plans.

2289 2290 2291

One example of a physical security zone is a typical manufacturing plant. Authorized people are allowed into the plant by an authorizing agent (security guard or ID), and unauthorized people are restricted from entering by the same authorizing agent and by fences.

2292 2293 2294 2295

Assets that are withi n the secur it y bor der are thos e th at mu st be protected to a gi ven securi ty level, or policy. All devices that are within the border must share the same minimum level of security requirements. In other terms, they must be protected to meet the same security policy. Protection mechanisms can differ depending on the asset being protected.

Requirement

Rationale

Determining Requirements

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 60 –

ISA99, WG03

2296 2297 2298

Assets that are outside the security zon e are by defi nition at a les ser or dif fer ent sec urit y level. They are not protected to the same security level, and by definition cannot be trusted to the same security level or policy.

2299

11.3.5.1

2300



2301

11.3.5.2

2302



2303 2304 2305 2306 2307 2308

11.3.6 Defini ng Zone s In building a security program, zones are one of the most important tools for program success, and proper definition of the zones is the most important aspect of the process. When defining the zones, organizations must be sure to use both the reference architecture and the asset model to develop the proper security zones and security levels to meet the security goals established in the industrial automation and control systems security policy.

2309 2310 2311 2312 2313 2314 2315 2316

When different level activities are performed within one physical device, an organization can either map the physical device to the more stringent security requirements, or create a separate zone with a separate zone security policy that is a blended policy between the two zones. A typical example of this occurs in process historian servers. To be effective, the server needs access to the critical control devices that are the source of the data to be collected. However, to meet the business need of presenting that data to supervisors and process optimization teams, a more liberal access to the device is required than typical control system security requirements allow.

2317 2318 2319

If multiple applications involving different levels of activities are running on a single physical device, a logical zone boundary can also be created. In this case, access to a particular application is restricted to persons having privileges for that level of application. An example

2320 2321 2322

is a single machine running an OPC server and OPC client-based analysis tools. Access to the OPC server is restricted to persons having higher level privileges while access to spreadsheets using OPC client plug-in is available to all employees.

2323

11.3.6.1

2324



2325

11.3.6.2

2326



2327

11.3.7

2328 2329 2330 2331

Zones can be a grouping of independent assets, a grouping of subzones, or a combination of both independent assets and assets that are also grouped into subzones contained within the major zone. Zones have the characteristic of inheritance, which means a child zone (or subzone) must meet all the requirements of the parent zone.

2332

11.3.7.1

2333 2334

Each zone has a set of characteristics and security requirements that are its attributes. These take the form of:

Requirement

Rationale

Requirement

Rationale

Zone Ident ificat ion

Zone Characteristics

2335

a) Security attributes (security policie s and security levels)

2336

b) Asset Inventory

2337

c) Access Requirements and Controls

2338

d) Threats and Vulnerabilities

2339

e) Consequences of a Security Breach

2340

f)

2341

g) Change Management Process.

Authorized Technology

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 61 –

ISA-62443-1-1, D5E4, August 2015

2342

Each of these attributes is described in more detail in the following paragraphs.

2343

11.3.7.1.1

2344 2345

Each zone has a controlling document that describes the overall security goals and how to ensure the Target Security Level is met. This includes:

Security Attributes

2346

a) the zone scope

2347

b) the zone security level (Target security levels, SL- T)

2348

c) the organizational structure and responsibilities

2349 2350

d) the risks associated with the zone e) the security strategy to meet the required goals

2351

f)

2352

g) the types of activities that are pe rmitted within the zone

2353

h) the types of communication allowed

2354

i)

to enforce the security policy

the security policies to be enforced

access to the zone

documentation of the zone attributes.

2355 2356

Al l of the above are docu me nte d and com bin ed into the zon e security po lic y, which is use d to guide and measure the construction and maintenance of the assets contained within the zone.

2357

11.3.7.1.2

2358 2359 2360 2361 2362 2363

To maintain security within a zone, an organization must maintain a list of all of the assets (physical and logical). This list is used to assess risk and vulnerabilities and to determine and maintain the appropriate security measures required to meet the goals of the security policy. Inventory accuracy is a key factor in meeting the security goals set forth in the security policy. The list must be updated when assets within the zone change, or their electronic connections change, as well as when new assets are added to the zone to ensure that the security goals

2364

are met.

2365 2366

Physical assets and components are the physical devices contained within the zone. Some examples include:

Asset Inventory

2367 2368

a) computer hardware (e.g., workstations, disk drives, or tape backups)

2369

b) network equipment (e.g., routers, swit ches, hubs, firewalls, or physical cables)

2370 2371

c) communications links (e.g., buses, links, modems, and other network interfaces, antennas)

2372 2373

d) access authentication and authorization equipment (e.g., domain controllers, radius servers, readers, and scanners)

2374

e) development system hardware

2375

f)

2376

g) external system hardware

2377

h) spare parts inventories

2378

i)

monitoring and control devi ces (e.g., sensors, swi tches, and controllers)

2379

j)

ref erenc e manuals and infor mation.

2380

servers, instruments, controls, power supplies,

simulation and training system hardware

Logical assets include all the software and data used in the zone. Some examples are:

2381 2382

a) computer system software (e.g., applications, operating systems, communication interfaces, configuration tables, development tools, analysis tools, and utilities)

2383

b) patches and upgrades for operating

2384

c) databases

2385

d) data archives

2386

e) equipment configuration files

systems and application tool sets

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 62 –

ISA99, WG03

2387

f)

2388 2389 2390 2391

g) design basis documentation (e.g., functional requirements including information and assets, security classification and levels of protection, physical and software design, vulnerability assessment, security perimeter, benchmark tests, assembly, and installation documents)

copies of software and data maintained for backup and recovery purposes

2392 2393

h) supplier resources (e.g., product updates, patches, service packs, utilities, and validation tests).

2394

11.3.7.1.3

2395

By its nature, a zone implies that access is limited to a small set of all the possible entities

Access Requirements and Controls

2396 2397

that could have access. A security policy for a zone must then articulate the access required for the zone to meet its business objectives, and how this access is controlled.

2398

11.3.7.1.4

2399 2400 2401 2402 2403

Threats and corresponding vulnerabilities exist within a given zone. Organizations must identify and evaluate these threats and vulnerabilities to determine their risk of causing the assets within the zone to fail to meet their business objectives. The process of documenting the threats and vulnerabilities happens in the threat and vulnerability assessment that is part of the zone security policy.

2404 2405 2406 2407

Many possible countermeasures exist to reduce the risk of a threat exploiting a given vulnerability within a zone. The security policy should outline what types of countermeasures are appropriate to meet the Target Security Level for the zone, within the cost versus risk trade-off.

2408

11.3.7.1.5

2409 2410

As ind ust rial automa tio n and control sys tems evolve to me et changing business needs , the technology used to implement the changes needs to be controlled. Each of the technologies

2411 2412 2413

used in these systems brings withthe it azone set security of vulnerabilities andtocorresponding risks. minimize the risks to a given zone, policy needs have a dynamic list To of technologies allowed in the zone, as well as those not allowed.

2414

11.3.7.1.6

2415 2416 2417 2418 2419

A for ma l and acc urate process is requ ire d to mainta in the acc urac y of a gi ven zon e’s ass et inventory and how changes to the zone security policy are made. A formal process ensures that changes and additions to the zone do not compromise the security goals. In addition, a way to adapt to changing security threats and goals is required. Threats and vulnerabilities, with their associated risks, will change over time.

2420

11.3.8

2421 2422 2423 2424 2425 2426 2427 2428 2429 2430 2431 2432 2433

Conduits are security zones that apply to specific communications processes. As security zones they are a logical and/or physical grouping of assets (communication assets in this case). A security conduit protects the security of the channels that it contains in the same way that the physical conduit protects cables from physical damage. Conduits can be thought of as “pipes” that connect zones or that are used for communication within a zone. Internal (within the zone) and external (outside the zone) conduits enclose or protect the communications “channels” (conceptually cables) that provide the links between assets. Most often in an IACS environment the conduit is the same as the network. That is, the conduit is the wiring, routers, switches, and network management devices that make up the communications under study. Conduits can be groupings of dissimilar networking technologies, as well as the communications channels that can occur within a single computer. Conduits are used to analyze the communication threats and vulnerabilities that can exist in the communications within and between zones.

2434 2435 2436 2437

Conduits can be considered pipes that contain data and/or provide physical connections for communication between zones. A conduit can have subconduits to provide a one-to-one or one-to-many zone communication. Providing secure communication for the conduit can be accomplished by implementing the appropriate zone security policy.

Threat and Vulnerability Assessment

Authorized Technology

Change Management Process

Defini ng Condui ts

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 63 –

ISA-62443-1-1, D5E4, August 2015

2438

11.3.8.1

2439

Physically a conduit can be a cable that connects zones for communication purposes.

Conduits Characteristics

2440 2441 2442 2443

A co nduit is a typ e of zone th at cannot have su bzo nes; th at is, a conduit is not made up of subconduits. Conduits are defined by the list of all zones that share the given communication channels. Both physical devices and applications that use the channels contained in a conduit define the conduit end points.

2444 2445

Like a zone, each conduit has a set of characteristics and security requirements that are its attributes. These take the form of:

2446

a) Security attributes

2447

b) Asset Inventory

2448

c) Access Requirements and Controls

2449

d) Threats and Vulnerabilities

2450

e) Consequences of a Security Breach

2451

f)

2452

g) Change Management Process

2453

Authorized Technologies

h) Connected Zones.

2454

11.3.8.1.1

2455 2456

Each conduit has a controlling document that describes the overall security goals and ho ensure the Target Security Level is met. This document includes:

Security Attributes

2457

a) the conduit scope

2458

b) the conduit secu rity lev el (SL-T)

2459 2460

c) the organizational structure and responsibilitie d) the risks associated with the conduit

2461

e) the security strategy to meet the required goals

2462

f)

2463

g) the types of channels that are p ermitted within the conduit

2464

w to

s to en force the conduit security policy

the security policies to be enforced

h) documentation of the conduit a ttributes.

2465 2466 2467

Al l of the above are doc um ent ed and com bined into the co nduit security po lic y, whi ch is used to guide and measure the construction and maintenance of the assets contained within the conduit.

2468

11.3.8.1.2

2469

As wit h the zone inven tor y, an acc urate lis t of th e com mu nic ations ass ets is required.

2470

11.3.8.1.3

2471

By its nature, a conduit implies that access is restricted to a limited set of all the possible

2472 2473

entities that could have to access. A security for a conduit must articulate the access required for the conduit meet its businesspolicy objectives, and how thisthen access is controlled.

2474

11.3.8.1.4

2475 2476 2477 2478 2479

Threats and corresponding vulnerabilities exist for a given conduit. Organizations must identify and evaluate these threats and vulnerabilities to determine their risk of causing the assets within the conduit to fail to meet their business objectives. The process of documenting the threats and vulnerabilities happens in the threat and vulnerability assessment that is part of the conduit security policy.

2480 2481 2482

Many possible countermeasures exist to reduce the risk of a threat exploiting a given vulnerability within a conduit. The security policy should outline what types of countermeasures are appropriate within the cost versus risk trade-off.

Asset Inventory

Access Requirements and Controls

Threat and Vulnerability Assessment

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 64 –

ISA99, WG03

2483

11.3.8.1.5

2484 2485 2486 2487 2488

As ind ust rial automa tio n and control system s evo lve to me et ch ang ing busin ess ne eds , the technology used to implement the changes needs to be controlled. Each of the technologies used in these systems brings with it a set of vulnerabilities and corresponding risks. To minimize the risks to a given conduit, the conduit security policy needs to have a dynamic list of technologies allowed in the conduit.

Authorized Technology

2489

11.3.8.1.6

2490 2491

A fo rm al an d accur ate proce ss is re quired to ma intain the accuracy of a given cond uit ’s polic y and how changes are made. A formal process ensures that changes and additions to the

2492 2493 2494

conduit do not compromise the security goals. I n addition, a way to adapt to changing security threats and goals is required. Threats and vulnerabilities, with their associated risks, will change over time.

2495

11.3.8.1.7

2496

A c ondu it ma y a lso be de scr ibed in term s o f th e z on es to which it is co nnected .

2497

11.4

2498

11.4.1

2499 2500 2501 2502 2503 2504 2505 2506 2507

Safety systems have used the concept of safety integrity levels (SIL) for almost two decades. This allows the safety integrity capability of a component or the safety integrity level of a deployed system to be represented by a single number that defines a protection factor required to ensure the health and safety of people or the environment based on the probabil ity of failure of that component or system. The process to determine the required protection factor for a safety system, while complex, is manageable since the probability of a component or system failure due to random hardware failures can be measured in quantitative terms. The overall risk can be calculated based on the consequences that those failures could potentially have on Health, Safety and Environmental (HSE).

2508 2509 2510 2511 2512 2513 2514 2515 2516

Security systems have much broader application, a much broader set of consequences and a much broader set of possible circumstances leading up to a possible event. Security systems are still meant to protect HSE, but they are also meant to protect the industrial process itself, company-proprietary information, public confidence and national security among other things in situations where random hardware failures may not be or “are not” (refer to preceding comments and to § 5.2 the root cause. In some cases, it may be a well-meaning employee that makes a mistake, and in other cases it may be a devious attacker bent on causing an event and hiding the evidence. The increased complexity of security systems makes compressing the protection factor down to a single number much more difficult.

2517

11.4.2

2518 2519 2520 2521 2522 2523

Security levels provide a qualitative approach to addressing security for a zone. As a qualitative method, security level definition has applicability for comparing and managing the security of zones within an organization. As more data becomes available and the mathematical representations of risk, threats, and security incidents are developed, this concept will move to a quantitative approach for selection and verification of Security Levels (SL). It will have applicability to both end user companies, and vendors of IACS and security

2524 2525 2526

products. It will be used to selectsecurity IACS devices and countermeasures to beacross used industry within a zone and to identify and compare of zones in different organizations segments.

2527 2528 2529 2530 2531 2532 2533 2534

In the first phase of development, the ISA ‑ 62443 series of standards tends to use qualitative Security Levels, using terms such as “low”, “medium”, and “high”. The asset owner will be required to come up with their own definition of what those classifications mean for their particular application. The long-term goal is to move as many of the security levels and requirements to quantitative descriptions, requirements and metrics as possible to establish repeatable applications of the standard across multiple companies and industries. Achieving this goal will take time, since more exper ience in applying the standards and data on industrial security systems will need to be acquired to justify the quantitative approach.

Change Management of Process

Connected Zones

Security Levels Introduction

Definition

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 65 –

ISA-62443-1-1, D5E4, August 2015

2535 2536 2537

When mapping requirements to the different Security Levels, standard developers need some frame of reference describing what the different Security Levels mean and how they differ from each other. The goal is to propose such a frame of reference.

2538

11.4.3

2539 2540 2541

Security Levels have been broken down into three different types: target, achieved and capability. These types, while they all are related have to do with different aspects of the security life cycle.

Types of Security Levels

2542 2543 2544



Target Security Levels (SL-T) are the desired level of security for a particular system. This is usually determined by performing a risk assessment on a system and determining that it needs a particular level of security to ensure its correct operation.

2545 2546 2547 2548



Achieved Security Levels (SL-A) are the actual level of security for a particular system. These are measured after a system design is available or when a system is in place. They are used to establish that a security system is meeting the goals that were srcinally set out in the target Security Levels.

2549 2550 2551 2552

– Capability Security Levels (SL-C) are the security levels that component or systems can provide when properly configured. These levels state that a particular component or system or component is capable of meeting the target Security Levels natively without additional compensating controls when properly configured and integrated.

2553 2554 2555 2556 2557 2558 2559 2560

Each of these Security Levels is intended to be used in different phases of the security life cycle according the ISA ‑ 62443 series of standards. Starting with a target for a particular system, an organization would need to build a design that included the capabilities to achieve the desired result. In other words, the design team would first develop the target Security Level necessary for a particular system. They would then design the system to meet those targets, usually in an iterative process where after each iteration the achieved Security Levels of the proposed design are measured and compared to the target Security Levels. As part of that design process, the designers would select systems and components with the necessary

2561 2562 2563 2564

capability Security Levels to meet the target Security Level requirements – or where such systems and components are not a vailable, complement the available ones with compensating security controls. After the system went into operation, the actual Security Level would be measured as the achieved Security Level and compared to the target SAL.

2565

11.4.4

2566 2567 2568 2569 2570 2571 2572 2573 2574

When designing a new system (green field) or revising the security of an existing system (brown field), the first step is to break the system into different zones and define conduits connecting these zones where necessary. Details on how to accomplish this are given in ISA ‑ 62443-3-2. Once a zone model of the system is established each zone and conduit is assigned a target SAL, based on a risk analysis, which describes the desired security for the respective zone or conduit. During this initial zone and conduit analysis, it is not necessary to have completed a detailed system design. It is sufficient to describe the functionality that should be provided by assets in a zone and the connections between zones in order to meet the security objectives.

2575 2576 2577 2578 2579 2580 2581 2582 2583 2584 2585 2586 2587 2588 2589

Figure 12 and Figure 13 show high-level examples of systems broken down into zones connected by conduits. Figure 12 is a graphical representation of a control system for a chlorine truck loading station. The full use-case that accompanies this figure will be discussed in ISA-TR62443-1-4. It has five zones shown: the basic process control system (BPCS), the SIS, the control center, the plant DMZ, and the enterprise. The BPCS and the SIS both use PLCs to operate different aspects of the loading station with the SIS using a special functional safety PLC (FS-PLC) rated for use in safety systems. The two PLCs are connected via a nonroutable serial or Ethernet connection using a boundary protection device. Each of the PLCs is connected to a local switch with an engineering workstation for programming and HMI for operating. The BPCS and SIS zones also contain an instrument asset management system (IAMS) to measure and test the instruments. A control center containing multiple workstations and the BPCS are both connected to the plant DMZ. A plant DMZ can house a variety of components and systems, for example a data historian and a maintenance workstation as shown in the figure. The plant DMZ is shown connected to the enterprise systems, which contain the corporate wireless local area network (WLAN) and web server. Multiple domain

Using Security Levels

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015 2590 2591

– 66 –

ISA99, WG03

controllers and boundary protection devices are shown in the figure to indicate some of the countermeasures that may be applied to improve security.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

2592 2593 2594 2595 2596 2597 2598 2599

Figure 12 – High-level process-industry example showing zones and conduits Figure 13 is a graphical representation of a manufacturing plant. It has four zones defined: the enterprise network, the industrial/enterprise DMZ, and two industrial networks. The enterprise infrastructure has a wireless local area network (WLAN) and a connection to the Internet. Many companies use a DMZ between important parts of their systems to isolate the network traffic. In this particular example, each industrial network operates relatively independent of each other with its own PLC, field devices, and HMI.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 67 –

ISA-62443-1-1, D5E4, August 2015

2600 2601

Figure 13 – High-level manufacturing example showing zones and conduits

2602 2603

After de ter mi nin g th e ta rge t Secur it y Le vels , the sys tem can be design ed (gre en field) or redesigned (brown field) to try to meet those target Security Levels. The design process is

2604 2605 2606 2607 2608 2609

usually an iterativethe approach where the system is checked against theoftarget multiple ‑ 62443 times throughout process. Multiple parts ofdesign the ISA series standards contain guidance on different aspects of the programmatic and technical requirements that go into the design process. ISA ‑ 62443-2-1 provides guidance on the programmatic aspects of the design process while ISA ‑ 62443-3-3 and ISA ‑ 62443-4-2 define system-level and component-level technical security requirements and relate them to different capability Security Levels.

2610 2611 2612 2613 2614 2615 2616 2617

During the design process for a system, it is necessary to evaluate the security capabilities of different components and subsystems. Product suppliers will have to provide these as capability Security Levels for their components or systems by comparing product features and capabilities with the requirements defined in the ISA ‑ 62443 series for the different capability Security Levels. These capability Security Levels can be used to determine whether a given component or system is capable of meeting the target Security Level for the system. The product supplier or system integrator will also have to provide guidance on how to configure the component or subsystem to meet the claimed Security Levels.

2618 2619 2620

It is likely that in a particular design there will be some components or systems that cannot fully meet the target SAL. Where the capability Security Level of a component or system is lower than the target SAL, compensating controls need to be considered to meet the desired

2621 2622 2623 2624 2625

target Compensating controlschoosing may include changing the design of the component or systemSAL. to increase its capabilities, another component or system to meet the target Security Level or adding additional components or systems to meet the target SAL. After each iteration in the design process, the system design’s achieved Security Levels should be reevaluated to see how they compare to the target Security Levels for the system.

2626 2627 2628 2629 2630 2631 2632

Once the system design is approved and implemented, the system needs to be evaluated to prevent or mitigate deterioration of the system’s security level. It should be evaluated during or after system modifications and on a regular schedule. ISA ‑ 62443-2-1 and ISA ‑ 62443-2-2 provide guidance on the steps necessary to operate the security program and how to evaluate its effectiveness. After the achieved Security Levels have been determined, it will be necessary to evaluate whether the system is still meeting the srcinal target Security Levels (for example, using the system requirements from ISA ‑ 62443-3-3). If the system is not

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 68 –

ISA99, WG03

2633 2634

meeting those requirements, there may be multiple reasons including the lack of maintenance of the program or the need to redesign parts of the system.

2635 2636 2637

In essence, the control system security capabilities a re determined independent from a giv en use context, but are used in a given context in order to achieve the target SL of the respective system architecture, zones and/or conduits (see Figure refernce).

2638 2639 2640

Figure 14 – High-level manufacturing example showing zones and conduits 11.4.5

Security Level Vector

2642

11.4.6

Foundational Requirements

2643

Security Levels are based on the seven Foundational Requirements for security, as defined

2644 2645

on page Error! Bookmark not defined.. 1) Identification and authentication control (IAC),

2641

2646

2) Use control (UC),

2647

3) System integrity (SI),

2648

4) Data confidentiality (DC),

2649

5) Restricted data flow (RDF),

2650

6) Timely response to events (TRE), an d

2651

7) Resource availability (RA).

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 69 –

ISA-62443-1-1, D5E4, August 2015

2652 2653 2654 2655

Instead of compressing Security Levels down to a single number, it is possible to use a vector of Security Levels that uses the seven FRs above instead of a single protection factor. This vector of Security Levels allows definable separations between Security Levels for the different FRs using language.

2656 2657 2658 2659

This language can be based on the additional consequences associated with security systems or different attacks against the security objectives addressed by the FRs. The language used in the Security Level definitions can contain practical explanations of how one system is more secure than another without having to relate everything to HSE consequences.

2660

11.4.7

2661 2662 2663 2664 2665 2666 2667 2668 2669 2670

The ISA ‑ 62443 series define SLs in terms of five different levels (0, 1, 2, 3 and 4), each with an increasing level of security. The current model for defining SLs depends on protecting against an increasingly more complex threat and differs slightly depending on what type of SL it is applied to. For SL-C, this means that a particular component or system is capable of being configured by an asset owner or system integrator to protect against an increasingly complex type of threat. For SL-T, this means that the asset owner or system integrator has determined through a risk assessment that they need to protect this p articular zone, system or component against this level of threat. For SL-A, this means that the asset owner, system integrator, product supplier and/or any combination of these has configured the zone, system or component to meet the particular security requirements defined for that SL.

2671 2672 2673 2674 2675

The language used for each of the Security Levels uses terms simple, sophisticated, and extended. This language is intentionally basic language to be used for all of the standards in the ISA standards in the series will define the requirements for the Security particular purpose.

2676 2677 2678 2679

While the requirements for each of the Security Levels will be different throughout the ISA ‑ 62443 series, there needs to be a general understanding of what each of the Security Levels should protect against. The following sections will provide some guidance on how to differentiate between the Security Levels.

2680



2681 2682 2683 2684 2685 2686 2687 2688 2689 2690

SL 0 has multiple meanings depending on the situation in which it is applied. In defining SL it would mean that the component or system fails to meet some of the SL 1 requirements for that particular FR. This would most likely be for components or systems that would be part of a larger zone where other components or systems would provide compensating countermeasures. In defining SL-T for a particular zone it means that the asset owner has determined that the results of their risk analysis indicate that less than the full SL 1 specific requirements are necessary for that particular FR on that component or system. This would more likely happen for individual components within a system or zone that do not contribute in any way to the FR-specific requirements. In defining SL-A it would mean that the particular zone fails to meet some of the SL 1 requirements for that particular FR

2691



2692 2693 2694 2695

Casual or coincidental violations of security are usually through the lax application of security policies. These can be caused by well-meaning employees just as easily as they can be by an outsider threat. Many of these violations will be security program related and will be handled by enforcing policies and procedures.

2696 2697 2698 2699 2700 2701 2702 2703 2704

Using Figure 3, a simple example would be an operator able to change a set point on the engineering station in the BPCS zone to a value outside certain conditions determined by the engineering staff. The system did not enforce the proper authentication and use control restrictions to disallow the change by the operator. Also using Figure 3, another example would be a password being sent in clear text over the conduit between the BPCS zone and the DMZ zone, allowing a network engineer to view the password while troubleshooting the system. The system did not enforce proper data confidentiality and authenticator protection to protect the password. Using Figure 4, a third example would be an engineer that means to access the PLC in Industrial Network #1 but actually accesses the PLC in Industrial Network

Level Defini tions

like casual, coincidental, vague to allow the same ‑ 62443. Each of the individual Levels that apply to their

Security Level 0: No specific requirements or security protection necessary

Security Level 1: Protection against casual or coincidental viola tion

-C

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 70 –

ISA99, WG03

2705 2706

#2. The system did not enforce the proper restriction of data flow preventing the engineer from accessing the wrong system.

2707 2708

– Security Level 2: Protection against intentional resources, generic skills and low motivation

2709 2710 2711 2712 2713 2714

Simple means do not require much knowledge on the part of the attacker. The attacker does not need detailed knowledge of security, the domain or the particular system under attack. These attack vectors are well known and there may be automated tools for aiding the attacker. They are also designed to attack a wide range of systems instead of targeting a specific system, so an attacker does not need a significant level of motivation or resources at hand.

2715 2716 2717 2718 2719 2720 2721 2722 2723

Using Figure 3, an example would be a virus that infects the maintenance workstation in the Plant DMZ zone spreading to the BPC S engineering workstation since they both use the same general purpose operating system. Using Figure 4, another example would be an attacker compromising a web server in the enterprise network by an exploit downloaded from the Internet for a publicly known vulnerability in the general purpose operating system of the web server. The attacker uses the web server as a pivot point in an attack against other systems in the enterprise network as well as the industrial network. Also using Figure 4, a third example would be an operator that views a website on the HMI located in Industrial Network #1 which downloads a Trojan that opens a hole in the routers and firewalls to the Internet.

2724 2725

– Security Level 3: Protection against intentional violation using sophisticated means moderate resources, IACS specific skills and moderate motivation

2726 2727 2728 2729 2730

Sophisticated means require advanced security knowledge, advanced domain knowledge, advanced knowledge of the target system or any combination of these. An attacker going after a Security Level 3 system will likely be using attack vectors that have been customized for the specific target system. The attacker may use exploits in operating systems that are not well known, weaknesses in industrial protocols, specific information about a particular target to

2731 2732

violate the security of the system or other means that require a greater motivation as well as skill and knowledge set than are required for Security Level 1 or 2.

2733 2734 2735 2736 2737 2738 2739 2740

An exa mp le of soph ist icated means could be pa sswor d or ke y cracking tools based on has h tables. These tools are available for download, but applying them takes knowledge of the system (such as the hash of a password to crack). Using Figure 3, another example would be an attacker that gains access to the FS- PLC through the serial conduit after gaining access to the control PLC through a vulnerability in the Ethernet controller. Using Figure 4, a third example would be an attacker that gains access to the data historian by using a brute-force attack through the industrial/enterprise DMZ firewall initiated from the enterprise wireless network.

2741 2742

– Security Level 4: Protection against intentional violation using sophisticated means extended resources, IACS specific skills and high motivation

2743 2744 2745 2746 2747

Security Level 3 and Security Level 4 are very similar in that they both involve sophisticated means used to violate the security req uirements of the system. The difference com es from the attacker being even more motivated and having extended resources at their disposal. These may involve high-performance computing resources, large numbers of computers or extended periods of time.

2748 2749 2750 2751 2752 2753

An example of sophist ica ted me ans wit h extended resourc es wou ld be usin g super com puter s or computer clusters to conduct brute-force password cracking using large hash tables. Another exam ple wou ld be a botnet used to attack a sys t em using mu lti ple attack vec tors at once. A third example would be an organized crime organization that has the motivation and resources to spend weeks attempting to analyze a system and develop custom “zero -day” exploits.

2754

11.4.8

2755 2756 2757

A vector ca n be us ed to des crib e th e secur it y requ ire ments for a zon e, co nduit , comp onent or system better than a single number. This vector may contain either a specific Security Level requirement or a zero value for each of the foundational requirements (see 10.3.6).

violation using

simple means with

low

with

with

Security Level Vector Format

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03 2758 2759

– 71 –

FORMAT → SL -?([FR,]domain) = { AC

ISA-62443-1-1, D5E4, August 2015 UC

DI

DC

RDF

TRE

RA }

Where;

2760

SL-? = (Required) The Security Level type (see 10.3.3). The possible formats are:

2761

– SL-T = Target SAL

2762

– SL-A = Achieved SAL

2763

– SL-C = Capabilities SAL

2764

[FR,] = (Optional) Field indicating the FR that the Security Level value applies. The

2765

FRs are written out in abbreviated form instead of numerical form to aid in readability.

2766 2767 2768 2769 2770 2771

domain = (Required) The applicable domain that the Security Level applies.Domains can refer to zones, control systems, subsystems or components. Some examples of different domains from Figure A.1 are SIS zone, BPCS zone, BPCS HMI, Plant DMZ domain controller, Plant DMZ to Control Center conduit and SIS to BPCS serial conduit. In this particular standard, all requirements refer to a control system, so the domain term is not used as it would be by other documents in the ISA ‑ 62443.

2772

EXAMPLE 1 → SL -T(BPCS Zone) = { 2

2

0

1

3

1

2773

EXAMPLE 2 → SL -C(SIS Engineering Workstation) = { 3

2774

EXAMPLE 3 → SL -C(RA, FS- PLC) = 4

2775

NOTE

The last ex ample specifie s only the R A component of a 7-dimension

2776

11.5

Foundational Requirements

2777 2778 2779 2780 2781

As noted in the dis cussion of funda me ntal concepts (see n.n), there are basic or Fo undational Requirements (FRs) that form the basis for subsequent requirements in this standard as well as other standards in the ISA ‑ 62443 series. All aspects associated with meeting a desired IACS security level (people, processes and technology) are derived through meeting the requirements associated with the following Foundational Requirements:

2782

1) Identification and authentication control (IAC),

2783

2) Use control (UC),

2784

3) System integrity (SI),

2785

4) Data confidentiality (DC),

2786

5) Restricted data flow (RDF),

2787

6) Timely response to events (TRE), an d

2788

3} 3

2

3

0

0

1}

SL-C.

7) Resource availability (RA).

2789 2790 2791 2792

As an exam ple , the syst em req uir em ents (SRs) and ass ociated ca pabilit y sec urit y lev els (S L C) defined in ISA ‑ 62443-3-3 are organized and numbered by FR. Rather than compressing security levels down to a single number, a vector is used to express the nuances associated with an often complex security or protection level. This vector of security levels allows

2793 2794

definable separations between security levels on a requirement by requirement basis. 11.5.1 FR 1 – Identification and authentication control (IAC)

2795

11.5.1.1

2796 2797 2798 2799

Based on the target security level (SL-T) determined, and using the processes defined in ISA ‑ 62443-3-2, the IACS shall provide the necessary capabilities to reliably identify and authenticate all users (humans, software processes and devices) attempting to access the ICS.

2800

11.5.1.2

2801 2802

Asset owner s wil l have to develo p a lis t of all valid users (h um ans , soft war e process es and devices) and to determine for each zone the required level of identification and authentication

Requirement

Rationale

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 72 –

ISA99, WG03

2803 2804 2805 2806 2807

control (IAC) protection. The goal is to protect the ICS from unauthenticated access by verifying the identity of any user requesting access to the ICS before activating the communication. Recommendations and guidelines should include mechanisms that will operate in mixed modes. For example, some zones and individual ICS components require strong IAC, such as strong authentication mechanisms, and others do not.

2808

11.5.2

2809

11.5.2.1

2810 2811

Based on the target security level (SL-T) determined using the processes defined in ISA ‑ 62443-3-2, the IACS shall provide the necessary capabilities to enforce the assigned

2812 2813

privileges of an authenticated user (human, software process or device) to perform the requested action on the system or assets and monitor the use of these privileges.

2814

11.5.2.2

2815 2816 2817 2818 2819 2820 2821 2822 2823 2824 2825

Once the user is identified and authenticated, the control system has to restrict the allowed actions to the authorized use of the control system. Asset owners and system integrators will have to assign to each user (human, software process or device), group, role, etc. the privileges defining the authorized use of the IACS. The goal of UC is to protect against unauthorized actions on ICS resources by verifying that the necessary privileges have been granted before allowing a user to perform the actions. Examples of actions are reading or writing data, downloading programs and setting configurations. Recommendations and guidelines should include mechanisms that will operate in mixed modes. For example, some ICS resources require strong use control protection, such as restrictive privileges, and others do not. By extension, use control requirements need to be extended to data at rest. User privileges may vary based on time-of-day/date, location and means by which access is made.

2826

11.5.3

2827

11.5.3.1

2828 2829 2830

Based on the target security level (SL-T) determined using the processes defined in ISA ‑ 62443-3-2, the IACS shall provide the necessary capabilities to ensure the integrity of the IACS to prevent unauthorized manipulation.

2831

11.5.3.2

2832 2833 2834 2835 2836 2837 2838 2839 2840 2841

An IACS wil l often go throug h mu ltiple testing cycles (unit tes tin g, fact or y acc ep tance tes tin g (FAT), site acceptance testing (SAT), certification, commissioning, etc.) to establish that the systems will perform as intended before they even begin production. Once operational, asset owners are responsible for maintaining the integrity of the IACS. Using their risk assessment methodology, asset owners may assign different levels of integrity protection to different systems, communication channels and information in their IACS. The integrity of physical assets should be maintained in both operational and non-operational states, such as during production, when in storage or during a maintenance shutdown. The integrity of logical assets should be maintained while in transit and at rest, such as being transmitted over a network or when residing in a data repository.

2842

11.5.4

2843

11.5.4.1

2844 2845 2846 2847

Based on the target security level (SL-T) determined using the processes defined in ISA ‑ 62443-3-2, the IACS shall provide the necessary capabilities to ensure the confidentiality of information on communication channels and in data repositories to prevent unauthorized disclosure.

2848

11.5.4.2

2849 2850 2851

Some control system-generated information, whether at rest or in transit, is of a confidential or sensitive nature. This implies that some communication channels and data-stores require protection against eavesdropping and unauthorized access.

FR 2 – Use control (UC) Requirement

Rationale

FR 3 – System integrity (SI) Requirement

Rationale

FR 4 – Data confidentiality (DC) Requirement

Rationale

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 73 –

ISA-62443-1-1, D5E4, August 2015

2852

11.5.5

2853

11.5.5.1

FR 5 – Restricted data flow (RDF)

2854 2855 2856

Based on the target security level (SL-T) determined using the processes defined in ISA ‑ 62443-3-2, the IACS shall provide the necessary capabilities to segment the control system via zones and conduits to limit the unnecessary flow of data.

2857

11.5.5.2

2858 2859 2860 2861 2862 2863

Using their risk assessment methodology, asset owners need to determine necessary information flow restrictions and thus, by extension, determine the configuration of the conduits used to deliver this information. Derived prescriptive recommendations and guidelines should include mechanisms that range from disconnecting control system networks from business or public networks to using unidirectional gateways, stateful firewalls and demilitarized zones (DMZs) to manage the flow of information.

2864

11.5.6

2865

11.5.6.1

2866 2867 2868 2869

Based on the target security level (SL-T) determined using the processes defined in ISA ‑ 62443-3-2, the IACS shall provide the necessary capabilities to respond to security violations by notifying the proper authority, reporting needed evidence of the violation and taking timely corrective action when incidents are discovered.

2870

11.5.6.2

2871 2872 2873 2874 2875

Using their risk assessment methodology, asset owners should establish security policies and procedures and proper lines of communication and control needed to respond to security violations. Derived prescriptive recommendations and guidelines should include mechanisms that collect, report, preserve and automatically correlate the forensic evidence to ensure timely corrective action. The use of monitoring tools and techniques should not adversely

2876 2877

affect the operational performance of the control system. 11.5.7 FR 7 – Resource availability (RA)

2878

11.5.7.1

2879 2880 2881

Based on the target security level (SL-T) determined using the processes defined in ISA ‑ 62443-3-2, the IACS shall provide the necessary capabilities to ensure the availability of the control system against the degradation or denial of essential services.

2882

11.5.7.2

2883 2884 2885 2886

The aim of this FR is to ensure that the control system is resilient against various types of denial of service events. This includes the partial or total unavailability of system functionality at various levels. In particular, security incidents in the co ntrol system should not affect SIS or other safety-related functions.

2887

11.6

2888 2889 2890 2891 2892 2893 2894 2895

Safety Instrumented Systems (SIS), represent one layer of protection that may be implemented in order to reduce risks associated with Industrial Automation Control Systems. Traditional risk assessment methodologies in the past, have generally excluded the potential for cyber related attacks to cause safety related incidents. Given that targeted attacks on Industrial Automation Control Systems have occurred and these systems are increasingly being connected to other business systems, they represent a significant potential for common mode failure. As a result, it is necessary in today's world to include cyber security in the overall Risk Assessment.

2896 2897 2898

Without addressing cyber security throughout the entire safety lifecycle, it is impossible to adequately understand the relative integrity of the various layers of protection that involve instrumented systems, including the SIS.

2899 2900

The underlying premise of this standard is that the means to implement, operate, and maintain system security should not compromise the performance of the safety instrumented systems

Requirement

Rationale

FR 6 – Timely response to events (TRE) Requirement

Rationale

Requirement

Rationale and supplemental guidance

Safety and Security

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 74 –

ISA99, WG03

2901 2902

(SIS). It should also be understood that achieving higher security levels may result in less convenience to the end user.

2903 2904 2905 2906

Note- the ISA84 Technical Report would like to use a modified version of the first 2 paragraphs that is specific to the process industry, but probably not the Rationale section. I also have reservations about including the Rationale section. We can discuss if the first 2 paragraphs have enough content for the Foundational Clause, or if the Rationale section should also be included and/or edited down.

2907 2908 2909

Note update Jun 06, 2015. The wording of the first 2 paragraphs has been modified, and a third paragraph has been added. These changes align with the ISA84 Technical Report, yet maintains a generic approach to safety & security (in contrast to ISA84's process specific approach).

2910

11.6.1

2911 2912 2913 2914 2915 2916 2917

To take advantage of digital advances, Industrial Control Systems have changed dramatically in the last two decades. Once isolated and proprietary, ICS today are part of a converged network that connects plant operations to the administrative environment. The migration from single-purpose supervisory control and data acquisition (SCADA) systems to industry standard, network-based systems provided numerous benefits, including increased information-sharing across the operation, and remote (Internet and wireless) access to Industrial Control Systems.

2918 2919 2920 2921

But those advances also created security gaps. By connecting to the larger web of networks, water-control systems are exposed to the myriad threats that lurk in cyber space, including viruses, worms and trojans. Poor control-system architecture, unfettered user access, and lax oversight of security policies and procedures have all combined to heighten the risk.

2922 2923 2924 2925

Meanwhile, manuals and training videos on ICS are publicly available, and many hacker tools can be downloaded or purchased on the Internet. Cyber criminals need little systems knowledge to infiltrate ICS operations. For all these reasons, the number of control-system cyber-security incidents has escalated sharply.

2926

Accordin g to RIS I, alm ost ha lf of all cybe r inc idents acr oss al l industries wer e ca use d by

2927 2928 2929 2930

malware, including viruses, worms and trojans. But unauthorized access or sabotage by internal sources, such as disgruntled workers or contractors using access privileges to cause harm, rose considerably at the same time. Network anomalies also triggered failures in control-system equipment.

2931 2932 2933 2934 2935 2936 2937 2938

The increasing inter-connectivity of control systems is equally important to industry since new benefits also bring new challenges. Open industrial networks that seamlessly coexist in broader Ethernet systems are being used to link various plant-wide control systems together and connect these systems into expansive, enterprise-level systems via the Internet. As the pace of control system and enterprise network architecture convergence quickens, industrial security depends on staying both flexible and vigilant and successfully controlling the space. What may be considered adequate protection today should evolve as vulnerabilities are identified and new threats emerge.

2939 2940 2941 2942

The discovery of malware that specifically targets industrial control systems brought industrial security to the forefront in manufacturing. As a result, there is growing recognition of the risks and real-world threats that are capable of disrupting control system operation and adversely affecting safety.

2943 2944 2945

12 Compliance Metrics

2946

Rationale

NOTE: This clause is reserved for a discussion of standards.

the role of compliance metrics in the application of the

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 75 –

Annex A – Zones and Conduits Examples

2947 2948

ISA-62443-1-1, D5E4, August 2015

A.1 Introduction

2949 2950

A.2 Un trusted Conduits

2951 2952 2953

Untrusted conduits are those that are not at the same level of security as the zone endpoint. In this case the security of the communication becomes the responsibility of the individual channel. This is illustrated in Figure Error! Bookmark not defined..

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

Enterprise Zone Laptopcomputer

Workstation

Mainframe

Server

Server

Enterprise Conduit

Plant A Zone

Plant B Zone Router

Laptop computer Workstation

File/Print Server

App. Server

Plant C Zone Router

Laptop computer Workstation

Data Server

File/Print App. Server Server

Plant A Control Zone

Data Server

File/Print Server

Data Server

Maint. Server

Firewall

Plant Control Conduit

Controller

2954

I/O

Controller I/O

2955

App. Server

Data Server

Plant C Control Zone

Plant B Control Zone Firewall

App. Server

Router Laptop computer Workstation

Firewall

Firewall

App. Server

Data Server

Maint. Server

Firewall

Plant Control Conduit

Controller I/O

Controller I/O

App. Server

Data Server

Maint. Server

Firewall

Plant Control Conduit

Controller I/O

Controller I/O

Figure 15 – Conduit Example

2956 2957 2958 2959 2960 2961 2962 2963

This figure represents a three-plant organization with a separate corporate headquarters. The three plants are connected to the enterprise network to allow communications to headquarters and the other plants. Four possible conduits are defined in the drawing (others would also be defined, but are skipped for brevity). The first is the enterprise conduit, shown at the top of the figure. It connects multiple plants at different locations to the corporate data center. If the wide area network (WAN) is constructed using leased or pr ivate communications, then it could be considered a trusted conduit. If it uses both public and private networks, then it may be classified as untrusted. Included in the conduit is all of the communications equipment and

2964 2965 2966

firewalls that make up the plant links. Instances of the second conduit class are shown in each plant. Here own trusted conduit to allow control communication.

2967

A.3 Mu lti-Plant Model

2968 2969 2970

A simp lif ied mu ltiplan t zone mo del is sh own in Fi gure Error! Bookma rk not def ined. . Her e the plant zone are the parents, and each plant control zone is a child contained within the plant subzone.

2971 2972

NOTE: There is a distinct advantage to aligning security zones with physical areas example, aligning a control center with a control security zone.

each of the plants has its

or zones in a facility

— for

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 76 –

ISA99, WG03

Enterprise Zone Laptop computer

Workstation

Mainframe Server

Plant A Zone

Plant B Zone Router

Laptop computer Workstation

File/Print Server

App. Server

Data Server

File/Print Server

App. Server

Controller

I/O

Maint. Server

Controller

I/O

Router Laptop computer Workstation

Data Server

File/Print Server

Plant B Control Zone Firewall

Data Server

Plant C Zone Router

Laptop computer Workstation

Plant A Control Zone

App. Server

Server

App. Server

Data Server

Plant C Control Zone Firewall

App. Server

Data Server

Controller

I/O

Maint. Server

Controller

I/O

Firewall

App. Server

Data Server

Controller

I/O

Maint. Server

Controller

I/O

2973 2974

Figure 16 – Multiplant Zone Example

2975

A.4 (Description)

2976 2977 2978

The same enterprise architecture could be grouped into separate zones as in Figure Error! Bookmark not defined.. In this model, the zone policies would be independent, and each zone could have totally different security policies.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 77 –

ISA-62443-1-1, D5E4, August 2015

Enterprise Zone Laptopcomputer

Workstation

Mainframe

Plant A Zone

Server

Server

Plant B Zone Router

Laptop computer Workstation

Plant C Zone Router

Laptop computer Workstation

Router Laptop computer Workstation

File/Print Server

App. Server

Data Server

File/Print Server

Plant A Control Zone

App. Server

Data Server

Plant B Control Zone Firewall

App. Server

Data Server

Controller

2979

I/O

File/Print Server

Maint. Server

Controller

I/O

2980

App. Server

Data Server

Plant C Control Zone Firewall

App. Server

Data Server

Controller

I/O

Maint. Server

Controller

I/O

Firewall

App. Server

Data Server

Controller

I/O

Maint. Server

Controller

I/O

Figure 17 – Separate Zones Example

2981

A.5 SCA DA Applications

2982 2983

Similar models can be constructed for SCADA applications, as shown in Figures Error! Bookmark not defined. and Error! Bookmark not defined..

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 78 –

ISA99, WG03

Enterprise Zone Laptop computer

Workstation

Mainframe Server

Server

Control Center

Backup Control Center Firewall

WAN App. Server

SCADA Server

SCADA Server

App. Server

SCADA Server

SCADA Server

SCADA System Zone Communications Processor

Communications Processor

Serial orf IP SCADA Network WAN Radio / Microwave / Cellular Network

Local HMI

2984 2985

Network Interface

Local HMI

Network Interface

Public /Private Telephone Network

Local HMI

Satellite Network

Network Interface

RTU or PLC

RTU or PLC

RTU or PLC

I/O

I/O

I/O

Site A Control Zone

Site B Control Zone

Site X Control Zone

Figure 18 – SCADA Zone Example

Local HMI

Network Interface

RTU or PLC I/O

Site Y Control Zone

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015 2991 2992

– 80 –

ISA99, WG03

Just as with zones, a similar view can be constructed for use in SCADA applications. An example is shown in Figure Error! Bookmark not defined..

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

2993 2994 2995

Figure 21 – SCADA Conduit Example

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 81 –

ISA-62443-1-1, D5E4, August 2015

Annex B – Truck Loading Description

2996 2997

B.1 Introduction

2998

(Excerpt 1)

2999 3000 3001 3002 3003

The example system is a control system for a ch emical truck loading facility . The facility is a self-service loading station where drivers of chemical tanker trucks can drive in, connect a dispensing arm to the tanker inlet, and initiate the filling of the truck through a local operator panel. There is a central control room for the facility where full time operators can also monitor and control the process. However, the primary role of the operators is to operate the

3004

chemical manufacturing process.

3005 3006 3007 3008

A system arch ite cture diagr am is sh own be low in Figure 3. Th e arch ite cture se lec ted is me an to represent a fairly modern design that is typical of what is found in many plants today. There are some cybersecurity controls in place but there are intentionally several vulnerabilities in the design. IT Data Center

Corporate WAN

Domain Controller

Data Historian

Enterprise Firewall

Business LAN

Business LAN

Control Room

Operator Consoles

Operator Consoles

PCN

Equipment Room

SIS Engineering Workstation

DCS Server DCS Server BPCS Engineering Workstation

PCN `

`

PCN

FS-PES

Control PES

Field BPCS HMI

3009 3010

Figure 22 – Chemical Truck Loading Control System Architecture Diagram

3011

The first step in the process is to identify the System-under-Consideration (SuC).

3012

Figure 18 is an illustration of the system delineating the boundary of the SUT.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 82 –

ISA99, WG03

IT Data Center

Corporate WAN

Domain Controller

Data Historian

Enterprise Firewall

Business LAN

Business LAN

Control Room

Operator Consoles

Operator Consoles

PCN

Equipment Room

SIS Engineering Workstation

DCS Server

DCS Server BPCS Engineering Workstation

PCN `

`

PCN

FS-PES

Control PES

Field BPCS HMI

3013 3014

Figure 23 – Chemical Truck Loading System with Definition of SUT Boundary

3015 3016 3017

The organization shall perform a high-level risk assessment of the assets within the SuC (per ISA99.02.01: 2009 Clause 4.2.3.1-4) to determine financial and health, safety and environmental (HSE) impact based on function, location, and potential consequences.

3018 3019 3020 3021 3022 3023

Based upon the risk assessment (HAZOP) performed on the chemical truck loading facility, the worst-case credible scenario is that the system attempts to fill a truck when there is not one present which would result is a large release of hazardous and flammable material. Under certain c onditions, it i s possible for the vapor cloud to ignite and explode. Fire suppression systems in the facility may be able to prevent the explosion and mitigate the damage if they react in time. While there are several interlocks in place designed to prevent

3024 3025 3026 3027

this scenario, they are all capable of being bypassed by the control or safety system. A local operator or truck driver has the ability to initiate an emergency-stop that is hard-wired to interrupt power to t he system. However, there are several scenarios where the local operator or truck driver fails or is unable to react in time to prevent the worst case consequence.

3028

There are several more scenarios that can result in lower category consequences such as:

3029

– A small spill

3030



3031

– Inability to load tanker

3032



Theft

Under-filling

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03 3033 3034 3035



– 83 –

ISA-62443-1-1, D5E4, August 2015

Incorrect record keeping (or loss of record)

Using the following tables (Table A.1, A.2) we will perform a cybersecurity risk assessment on the control system. . e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

3036

3037 3038 3039 3040 3041

Figure 1 shows a diagram of the major components of a chemical truck loading station to illustrate how the requirements related to the zones and conduits concepts can be used for doing risk assessments or consequence analyses. This figure also is intended to clarify some of the terminology used.

3042

3043 3044 3045

Figure 24 – Diagram of major components for chemical truck loading example We start by creating a table of the assets in the control system IACS Device Asset

Consequence Rating

Likelihood Rating

Risk Rating

DCS Eng Workstat ion

B

H

High

SIS Eng Workstation

A

M

High

Data Historian

B

M

Med

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015 Maintenance Workstation

– 84 – B

ISA99, WG03 M

Med

FS-PES

A

L

Med

Domain Controller

B

M

Med

Firewal l

B

M

Med

Operator Stations

B

M

Med

Control PES

B

L

Med

DCS Servers

B

M

Med

DMZ Switch

B

L

Low

BPCS HMI

C

L

Low

PCN Switch(es)

B

L

Low

3046

3047

3048 3049 3050 3051

NOTE: The “External Network” shown in the diagram above represents all networks external to the SuC, so could be a company’s enterprise netwo rk, which in turn would be connected to external networks, incl uding the Internet. The SuC shown here encompasse s all parts of the plant that are to be modeled using zones and conduits.

3052 3053 3054 3055 3056 3057 3058

In order to provide clearer descriptions of concepts and boundaries that are significant for explaining security issues and areas of responsibility, the following hierarchy is proposed. Significant networks in a company can be arranged with the enterprise network at the highes t level. This network s erves the enti re company and includes office automation support and communications needed for the business side and managed by the Information Technology (IT) Department. The business side includes financial, procurement, legal, and administrative activities. An Office Automation Network (OAN) supports these office automation act ivities.

3059 3060

The technical operations part of the company includes the industrial automation and control systems (IACS) support, most of which is managed by an Industrial Automation (IA)

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 85 –

ISA-62443-1-1, D5E4, August 2015

3061 3062 3063 3064

Department or control systems group. The IACS includes the system u nder consideration (SuC) and technical support for it. Both the SuC and additional organizational support (policies, guidelines, operator training activities, etc.) which all combine to make up the IACS are also connected to the enterprise network through a firewall.

3065 3066 3067

As a practic al ma tter the IACS should inc lude all ass ets neede d to ma int ain norm al pla nt operations in stand-alone mode should it be necessary to disconnect the IACS from all external networks during a sustained cyber attack (a period of time that could last weeks).

3068 3069

The system under consideration (SuC) consists of the control system security zone and everything contained in it, the router/firewall conduit separating the control system security

3070 3071 3072 3073

zone and plant network se curity zone, the plant netwo rk security zone, and the router/firewall separating the plant network from the company enterprise network. The SuC in thi s example shows a hierarchy of zones contained in zones (zone “nesting” is allowed) and conduits within zones.

3074 3075 3076 3077

An initial high le vel risk ass ess me nt ident ifi es th e mo st sig nif ica nt vulnerabiliti es at th e SuC level affecting the station as a whole such as a large catastrophic release of chlorine gas (a very bad leak), physical damage from a large explosion or m ajor rupture of a tank, and access restrictions to support maintaining the physical integrity of the station and its operation.

3078 3079 3080

The control system (PLC) network is isolated from the plant network by a router/firewall, even though both are part of the SuC, in order to reduce risks associated with a potentially very hazardous operation (transfer of chlorine gas).

3081 3082 3083 3084 3085

In the example considered here activities supported on the plant network are modeled using zones and conduits and are included in the consequence assessment (risk analysis) with associated assignment of security assurance levels (SALs) that must be met. Once the facility is in operation, management of the plant network activities could be done either by the IT or IA pa rts of the orga nization. A major IT obje ctive is usually protection of information

3086 3087 3088 3089

while major objective an industrial automation application protection of anda availability of thefor plant (in this example the ability at all (control times tosystem) control is operation of the loading station). A control system often has hazardous energy sources whi ch are not part of an office automation environment.

3090 3091 3092 3093 3094

It will be important to have IT participation at some level in the zones and conduits modeling and consequence assessment ac tivities. Roles and responsibilities of plant personnel in both areas (IT and IA) n eed to be clea rly defined. Network monitoring and management goals may be different, so need to be defined. Likewise, things li ke patch management, system t esting, and upgrades to software and operating systems.

3095

Step 3: Identify Zones & Conduits

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 86 –

ISA99, WG03

3096

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

3097 3098 3099

Figure 25 – Zone and Conduit Identification Step 4: Document Security Requirements

3100 3101

Name and/or unique identifier

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 87 –

3102

Logical boundary

3103

Physical boundary, if applicable

3104

List of all access points and associated boundary devices

3105

List of data flows associated with each access point

3106

Connected zones or conduits

3107

List of assets and associated consequences

3108

Security Level Target

3109

Appl ica ble s ecurit y p olicies

3110

Assump tio ns and external depe nde ncies

3111

ISA-62443-1-1, D5E4, August 2015

Table 9 – Zone Characteristics Name and/or unique identifier Logical boundary

Physical boundary, if applicable List of all access points and associated boundary devices

List of data flows associated with each Logical Access point

Process Control Zone This zone interfaces with the Process Information Zone, Process Safety Zone and Process Measurement Zone through 3 distinct conduits The Process Control Zone is physically located within the equipment room Logical Access Points:  Process Safety / Process Control Conduit  Process Operations / Process Control Conduit  Process Control / Process Measurement Conduit Physical Access Points  Door to Equipment Room Process Safety / Process Control Conduit:  Read-only status of safety system variables to Control System Servers for display on Operator Stations Process Operations / Process Control Conduit:  Read-only status of Control PES variables for display on Operator Stations  Data writes from Operator Stations to Control PES (e.g. setpoint changes) Process Control / Process Measurement Conduit  Two-way flow of data between Control PES and field HMI panel and remote I/O.

Connected zones

List of assets consequences

and

associated

 Process Operations Zone  Process Safety Zone  Process Measurement Zone  DCS Servers – B (Medium)

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 88 –

ISA99, WG03



Security Level Target Appl ica ble security po lic ies

DCS Engineering Workstation - B (Medium)  CLAN-2 Switch - B (Medium)  Control PES - B (Medium) Medium

Assump tio ns and external depe nde ncies 3112 3113 3114 3115 3116 3117 3118 3119 3120 3121 3122 3123

Figure 2 and Figure 3 show high-level examples of systems broken down into zones connected by conduits. Figure 2 is a graphical representation of a control system for a chlorine truck loading station. It has three security zones defined: the control system, the safety integrated system (SIS), and the plant network. The control system and SIS both use programmable logic controllers (PLCs) to operate different aspects of the loading station. The two PLCs are connected via a non-routable serial Modbus network. Figure 3 is a graphical representation of a manufacturing plant. It has four zones defined: the enterprise network, the industrial/enterprise demilitarized zone (DMZ), and two industrial networks. The enterprise infrastructure has a wireless local area network (WLAN) and a connection to the Internet. Many companies use a DMZ between important parts of their systems to isolate the network traffic. In this particular example, each industrial network operates relatively independent of each other with its own PLC, field devices, and human-machine interface (HMI).

3124 3125

Figure 26 – High-level process-industry example showing zones and conduits

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 89 –

ISA-62443-1-1, D5E4, August 2015

3126 3127

Figure 27 – High-level manufacturing example showing zones and conduits

3128

After det erm ini ng the tar get SALs, the system can be des ig ned (g reen fi eld ) or redes igned

3129 3130 3131 3132 3133 3134 3135

(brown field) to the try to meetdesign those is target SALs. against The design process is usually an iterative the approach where system checked the target multiple tim es throughout process. Multiple parts of the ISA99 series of standards contain guidance on different aspects of the programmatic and technical requirements that go into the design process. ISA 99.02.01 [2] provides guidance on the programmatic aspects of the design process while ISA 99.03.03 [5] and the ISA 99.04.## series define system-level and component-level technical security requirements and relate them to different capability SALs.

3136 3137 3138 3139 3140 3141 3142

During the design process for a system, it is necessary to evaluate the security capabilities of different components and subsystems. Vendors will have to provide these as capability SALs for their products by comparing product features and capabilities with the requirements defined in the ISA99 series for the different capability SALs. These capability SALs can be used to determine whether a given system or component is capable of meeting the target SAL for the system. The vendor or system integrator will also have to provide guidance on how to configure the component or subsystem to meet the claimed SALs.

3143 3144 3145

It is likely that in a particular design there will be some components or systems that cannot fully meet the target SAL. Where the capability SAL of a component or system is lower than the target SAL, compensating controls need to be considered to meet the desired target SAL.

3146 3147 3148 3149 3150

Compensating controls may include changing the design of thetocomponent or system to increase its capabilities, choosing another component or system meet the target SAL, or adding additional components or systems to meet the target SAL. After each iteration, the system design SALs should be reevaluated to see how they compare to the target SALs for the system.

3151 3152 3153 3154 3155 3156 3157

Once the system design is approved and implemented, the system needs to be evaluated to prevent or mitigate deterioration of the system’s security level. It should be evaluated during or after system modifications and on a regular schedule. ISA 99.02.01 and ISA 99.02.02 [3] provide guidance on the steps necessary to operate the security program and how to evaluate its effectiveness. After the achieved SALs have been determined, it will be necessary to evaluate whether the system is still meeting the srcinal target SALs (e.g. using the system requirements from ISA 99.03.03). If the system is not meeting those requirements, there may

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 90 –

ISA99, WG03

3158 3159

be multiple reasons including the lack of maintenance of the program or the need to redesign parts of the system.

3160

B.2 Safety and Security

3161 3162 3163 3164 3165 3166

Annex Error! Ref erenc e sou rc e not fo und. dis cusses th e truck loading co ntrol system . Th e specific area of interest from the safety prospective is facilitated by interlocks on the connections to the truck that assures recirculation of air via two separate hoses. The pumps cannot be turned ON unless there is a po sitive confirmation that the hoses are connected. If a hose i s removed, i t would automatically shut off the pumps. There is also a high- level protection switch that assures that if the chemical tank is at a certain level that is automatic

3167 3168 3169 3170 3171 3172

shuts off the pumps. There is also gas detection a truck unloading area and any place along the injection lines to the equipment that will use the chemical. If there is an alert, it will automatically shut down the pumps and signal the operator. In some processes where the chemical is being injected into a burning process for example, the emissions are monitored. This would be the case when a hazardous chemical is being used as part of any part of a process.

3173 3174 3175 3176 3177 3178 3179 3180 3181 3182 3183 3184

The safety system must be tested prior to commissioning of the system by circulation and injection of water to determine if there are any leaks. Otherwise, the hazardous chemical or gases could escape and create a unsafe condition for personnel the system should also have a flush cycle to inject water once again to flush the hazardous chemical out of the lines. This system must all be tested to assure proper operation. Emissions monitoring is extremely important in these types of applications where the gases can be released into the air, into the ground, or nearby bodies of water. This would put the plant at risk for OSHA or MSHA violation including EPA emissions violation, which all would be punishable by fines. Personal injury prevention is important so if any action has consequence that would expose personnel or if release into the air or water it may affect people many miles from the facility. Spill control is also important safety relevant condition so run off monitor and positioning of eyewash stations must be monitored and provide alerts to operations, which may include key

3185 3186 3187 3188 3189 3190

personnel. Personal training is done for safety conditions including lockout and wearing proper safety gear but there is no explanation of security concerns other than potential limitation of use of cell phones and other radios i n a particular area. There is always a need to have an emergency shutdown and those conditions must be evaluated since immediate shutdown of a control system must be able to recover form unexpected or an emergency shutdown.

3191 3192 3193 3194 3195 3196 3197 3198

In some process these alerts may extend to monitor when the take is low since a hazardous chemical may be an integral part of a production process to reduce NOX emissions for example. In these situations, the monitoring of a 30 -day average may be important to m aintain EPA compliance. Process operation many need to be changed to assure the long-term accumulation of release of toxic gases into the air many mean that there will be an even wider effect related to use of hazardous chemicals, which are needed as part of a productions process. There may be other instruments including sensors that may exist to detect unsafe conditions and can provide notification to opera tor.

3199 3200 3201

The use of hazardous chemicals in a process requires that all aspects of a system must operate perfectly since they cannot be allowed to operate in a reduced capacity. Consequently, the system will have interlocks that prevent startup and will force a shutdown if

3202 3203 3204

those permissive are lo st or changed. There are other conditions such as power and water supplies that now become critical which under normal operation they could be operated at a reduced capability.

3205 3206 3207 3208 3209 3210 3211

The backup power systems should be monitored. Sufficient water and air for pneumatic devices must be monitored and frequently checked to assure that they are operating properly. There is limited leeway and having an ample supply of power, water, and air are essential for plant operations especially if used in safety operations. Generally, physical security was the only consideration and there is no requirement or standard to provide assurance that restriction of packets that could adversely affect operations and impact safety of those systems.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03 3212 3213 3214 3215 3216 3217 3218

– 91 –

ISA-62443-1-1, D5E4, August 2015

It is important to define the safety aspects to recognize what can be the impact. The security aspects need to provide protection against intrusion and alteration of operations. This may include confidentiality if knowledge of those conditions or restriction to access of that system needs further restriction. The end devi ces are generally vulnerable since the protection against cyber infringement due not exists. Consequently, new capabilitie s are need to i solate those operations yet providing a means to facilitate a dialog with other devices, user, and applications that are trusted to view or control operations of security-safety related systems.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 92 –

ISA99, WG03

Annex C – Example: Procedure to apply foundational requirements

3219 3220

C.1 Overview

3221

C.1.1

3222 3223 3224 3225

Figure C-1 shows a chemical truck loading station, where a Programmable Logic Controller (PLC) is used to control the loading of liquid chlorine, a hazardous chemical, from a storage tank to a tank truck. For the purpose of this example, this is the system under consideration (SuC).

Description of example system under consideration

3226 3227 3228

Figure 28 – Example application - Chemical truck loading station Components of the IACS include:

3229 3230

– Field instruments pumps.

such as flow sensors

and transmitters,

valves, motor

control for

3231



PLC syste m including power supplie s, CPU, and in terface modules for field signals.

3232



Workstations for operation, supervision, maintenance and enginee ring.

3233



Communication infrastructure including switches and firewalls.

3234

C.1.2

3235

Objective

3236 3237

The objective of this example is show how the foundational requirements are applied to an example problem - in this case, the chemical loading truck station.

3238

Assump tio ns

3239 3240 3241 3242

It was assumed that ISA ‑ 62443-3-3 is applied throughout the life-cycle of the security architecture. Therefore, the target, design, achieved and measured system security assurance level needed to be addressed. At each stage in the life-cycle, all 4 levels are included to provide a comparison and basis for system security assurance level selection.

Technical Approach

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 93 –

ISA-62443-1-1, D5E4, August 2015

3243 3244

In C.1.2.3, the selection is based on reviewing company policy and the AC guideline provided in ISA ‑ 62443-3-3.

3245 3246 3247 3248

In C.2.1 the selection is based on FR1 AC3 and the added “security strength” requirements to discriminate between system security assurance levels. System security assurance is designated “design” because t he additional detail provides information needed for the “build -to” decision.

3249 3250 3251

In C.2.2 and C.3 the selection is based on the same information described previously, but now given an installed security architecture which has been validated after site accept ance testing and commissioning. This is designated time “t0” and the system security

3252

assurance is now labeled “achieved.”

3253 3254 3255

In C.4, the maintenance life-cycle phase includes comments regarding system security compliance metrics and the designation is label ed “measured” based on assessment of measured performance.

3256

Consequence analysis

3257 3258 3259 3260

It is interesting to note that the selected requirements from does not mention “consequence analysis” per se. This example assumes that consequence analysis occurs throughout the life cycle. It is not a one-time analysis. Each time it is performed the parameters of the consequence analysis are somewhat different.

3261 3262 3263

For example when developing a company policy, a consequence analysis of sufficient depth needed to establish the policies and procedures and provided sufficient guidance to establish the “target” security assurance level for the SuC.

3264 3265

When the security architecture is selected (“design”), a consequence ana parameters that reflect the capability of enabling security mechanisms.

3266 3267 3268

When installed and commissioned (“achieved”) at time t0, a consequence analysis is repeated to account for any variance between design expectations and real capability that has been verified by testing & analysis for c ommissioning.

3269 3270 3271 3272

Lastly, during maintenance of the installed security architecture, a consequence analysis is repeated based on collected measurements of performance and other reports required by ISA ‑ 62443-1-3. Practical experience has shown that deviations from the norm (what was expected) may or may not have an impact on the assessed consequence.

3273

Selected application of ISA

3274 3275 3276

ISA ‑ 62443-3-33 defines the guidelines to apply assessment criteria. For this example (Figure C-1), tailored for IACS application, the AC-3 guideline is prescribed in terms of control with supplemental guidance.

3277 3278 3279

Control: The Industrial Automation Control System shall provide the capability to enforce assigned authorizations for controlling access to the system in accordance with applicable policy.

3280 3281 3282 3283 3284 3285 3286 3287 3288 3289 3290

Supplemental guidance: Access control policies (e.g., identity-based policies, role-based policies, rule-based policies) and associated access enforcement mechanisms (e.g., access control lists, access control matrices, cryptography) are employed by organizations to control access between users (or processes acting on behalf of users) and objects (e.g., devices, files, records, processes, programs, domains) in the IACS. In addition to controlling access at the information system level, access enforcement mechanisms are employed at the application level, when necessary, to provide increased information security for the organization. Consideration is given to the implementation of a controlled, audited, and manual override of automated mechanisms in the event of emergencies or other serious events. If encryption of stored information is employed as an access enforcement mechanism, the cryptography used is FIPS 140-2 (as amended) compliant.

-

is

lysis is repeated with

‑ 62443-3-3 to the system under consideration

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 94 –

ISA99, WG03

3291 3292 3293 3294 3295 3296 3297 3298

For this example a review of company policies and procedures determined that the organization explicitly defines privileged functions and security-relevant information for the IACS. Furthermore, the organization explicitly authorizes personnel access to privileged functions and security-relevant information in accordance with organizational policy. And, the IACS restricts access to privileged functions (deployed in hardware, software, and firmware) and security-relevant information to explicitly authorized personnel (e.g., security administrators). Lastly, automated test mechanism implementing access enforcement policies are widely deployed.

3299 3300

For these reasons, access enforcement requires security assurance which is constrained by the need to ensure IACS operational availability, comply with the need to ensure public and

3301 3302 3303 3304 3305

environmental safety, guard against total system failure and to guard against the possibility of loss of life. Based on the installed operational concept, the asse t owner’s senior management  states that for this example, the following target system security assurance levels (  ) which are subject to verification by the system integrator; and if required, a recognized certification authority: 

3306 3307

 = 1:

IACS security functions are not mission critical and are not the target of adversarial threats.

3308 3309

 = 2:

3310 3311 3312 3313

 = 3:

3314 3315

 = 4:



IACS security functions are not mission critical, but are the target of adversarial threats.



IACS security functions are mission critical, are the target adversarial threats, do not require immediate response, but disruption could result in significant performance and financial impact resulting from the total failure of IACS operating capability.

of



IACS functions are mission critical, are the target of adversarial threats, but require immediate response to ensur e public and environmental safety resulting

3316 3317

from the total failure of IACS operating capability or loss of life. Focus on Access Enforcement

3318

Design (build-to) security assurance level

3319 3320 3321

An example of ma pping th is me thodo logy to the IACS security re quiremen ts for Figure C -1 is described in this clause. For the purpose of this example, the design security assurance levels S_system^design are based on selected (build-to) security architecture.

3322

FR 1: Access Control (AC)

3323

ISA ‑ 62443-3-3 AC-3: Access Enforcement (AE)

3324 3325

Requirement: The IACS shall provide the capability to enforce assigned authorizations for controlling access to the system in accordance with applicable policy.

3326 3327 3328

Rationale/Supplemental Guidance: Access control policies (e.g., identity-based policies, rolebased policies, rule-based policies) and associated access enforcement mechanisms (e.g., access control lists, access control matrices, cryptography) are employed by organizations to

3329 3330 3331 3332 3333 3334 3335 3336

control access between users (or processes acting on behalf of users) and objects (e.g., devices, files, records, processes, programs, domains) in the IACS. In addition to controlling access at the system level, access enforcement mechanisms are employed at the application level, when necessary, to provide increased information security for the organization. Consideration is given to the implementation of a controlled, audited and manual override of automated mechanisms in event of emergencies or other serious events. The organization ensures that access enforcement mechanisms do not adversely impact the operation performance of the IACS.

3337 3338 3339

Requirement Enhancement (RE-1): The IACS shall provide the capability to restrict access to privileged functions (deployed in hardware, software, and firmware) and security-relevant information to explicitly authorized personnel.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 95 –

ISA-62443-1-1, D5E4, August 2015

3340 3341 3342 3343 3344

Enhancement Rationale/Supplemental Guidance: Explicitly authorized personnel must include, for example, IACS operators, security administrators, system and communication network administrators, and other privileged users. Privileged users are individuals who have access to system control, monitoring, or administration functions (e.g., systems administrators, SAS security officers, maintainers, system programmers).

3345 3346 3347

Requirement Enhancement (RE-2): The IACS shall provide the capability for dual authorization, based on approved organization procedures, to privileged functions that have impacts on facility, human, and environmental safety.

3348

RE-2 Security Strength 0: No explicit security strength is mandated.

3349 3350

RE-2 Security Strength 1: Organization with functional responsibility shall sign-off (approval) on access privileges.

3351 3352

RE-2 Security Strength 2: Senior management with oversight responsibility of the functional organization responsible shall sign-off (approval) on access privileges.

3353 3354 3355

Enhancement Rationale/Supplemental Guidance: The organization does not employ dualapproved mechanisms when an immediate response is necessary to ensure human and environmental safety.

3356

Design System Security Assurance Levels: 

3357

 = 1: FR-1, 800-53 AC-3 with security strength 0

3358

 = 2: FR-1, 800-53 AC-3, RE-1 and RE-2 with security strength 0

3359 3360

 = 3: FR-1, 800-53 AC-3, RE-1 and RE-2 with security strength 1 (note, reserved

 

for possible total system failure)  

3361 3362

= 4: FR-1, 800-53 AC-3, RE-1 and RE-2 with security strength 2 (note, reserved for possible total system failure or loss of life)

3363 3364

This example illustrates the caveat which states that RE-1 and RE-2 may not provide  sufficient discrimination to differentiate between  assignments. Furthermore, the

3365 3366 3367 3368 3369 3370 3371

aggregation of  =1, 2, 3 or 4 contributed by each zone, conduit, or class of device shown above depends on the implementation of ISA-99.03.02 (security assurance levels for zones and conduits), ISA-99.01.03 (system security compliance metrics), ISA-99.03.04, ISA99.04.01.. 04 (derived requirements for classes of components). Is important to remember that allocation of system security assurance to zones, conduits and classes of components, as well as aggregation of security assurance provide by elements of the SuC are not within the scope of ISA-99.03.03.

3372

C.1.3

3373 3374 3375 3376

Based on a review of company policies and procedures it was determined that the organization explicitly defines privileged functions and security-relevant information for the IACS. Furthermore, the organization explicitly authorizes personnel access to privileged functions and security-relevant information in accordance with organizational policy. And, the

3377 3378 3379 3380

IACS restricts access to privileged functions (deployed in hardware, software, and firmware) and security-relevant information to explicitly authorized personnel (e.g., security administrators). Lastly, automated test mechanism implementing access enforcement policies are widely deployed.

3381 3382 3383 3384 3385 3386

For these reasons, access enforcement requires security assurance which is constrained by the need to ensure IACS operational availability, comply with the need to ensure public and environmental safety, guard against total system failure and to guard against the possibility of loss of life. Based on the installed security architecture, the asset owner now states for the ℎ example, the following achieved system target security levels (  ) which are subject to verification:



Achieved security assurance level

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015 3387 3388

ℎ  = 1:

3389 3390

ℎ  = 2:

3391 3392 3393 3394

ℎ  = 3:

3395

ℎ  = 4:

3396 3397 3398 3399

– 96 –

ISA99, WG03

IACS security functions are not mission critical and are not the target of adversarial threats. IACS security functions a re not mission critical, but are the target of adversarial threats. IACS security functions are mission critical, are the target adversarial threats, do not require immediate response, but disruption could result in significant performance and financial impact resulting from the total failure of IACS operating capability.

of

IACS functions are mission critical, are the target of adversarial threats,

but require immediate response to ensure public and environmental safety resulting from the total failure of IACS operating capability or loss of life. Furthermore, the asset owner states that all metrics for this example are subject to the following considerations:

3400 3401

ℎ Al l  = 1 metrics are limited to applications related to protection of company data.

3402

ℎ Al l  = 2 metrics are limited to applications subject to threat.

3403 3404

ℎ Al l  = 3 metrics are applicable to performance constrained mission critical applications that can result in total system failure.

3405 3406

ℎ Al l  = 4 metrics are applicable to mission critical applications that can result in loss of life.

3407

C.2 System security assurance

when commission ed

3408

Subject to all conditions described in

3409 3410

ℎ implemented and site acceptance testing is complete, the achieved system security assurance level is all  (t 0 ) = 4.

3411 3412 3413 3414 3415 3416

In retrospect, the Asset Owner’s senior management could have stated that their goal was to  design and install a security architecture that could be rated  (t 0 ) = 4. Then, when the design was complete, by analysis the system integrator could state that the build-to system  security assurance is  (t 0 ) = 4. As a cross check the system integrator could sum the contribution of each zone and conduit security assurance using the calculation procedure specified in ISA-99.03.02.

3417

C.3 System security assurance during after

3418 3419 3420 3421 3422 3423

If security is maintained in accordance with ISA-99.02.02 and quantitative metrics described in ISA-99.01.03 are collected and automatically processed in a timely manner, the measured system security assurance can be assessed on a regular basis using the same procedures  described in C.2. The result should be labelled  (t) = f(processed metrics). When   (t) degrades to an unacceptable level (a value determined by the Asset Owner), corrective action is required to plus-up the system security assurance. Guidance for plus-up

3424 3425

action is described in ISA-99.01.03 for each system metric.

C.1.3, when the security architecture has been

commissioning

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 97 –

ISA-62443-1-1, D5E4, August 2015

Annex D (informative) Understanding ho w to use the IS A99 adaptation of the IEC styleguide

3426 3427 3428

Overview

3429

D.1

3430 3431 3432 3433

Annex D contains some notes that have been collected while going through the process of converting documents from the older ISA format to the newer IEC format. Please read through them to understand the basic style and formatting that should be applied to documents as they are being developed for the ISA99 committee.

3434 3435 3436 3437 3438

ISA has adopted the IEC styleguide [15] to format its documents from now on. ISA99 has found that not all of the appropriate formatting and text guidelines necessary to avoid editorial comments from IEC members are included in the styleguide. The following sub-clauses include discussions of different general practices that should be applied to all current and future ISA99 documents.

3439

D.2

3440 3441 3442 3443 3444



ALWAYS, ALWAYS, ALWAYS use styles to format text. Avoid u sing simple font formatting unless it is for a single word or a couple words. Use the IEC styles for their correctly named purpose. If you need another style that uses the same format as an existing style, but for another purpose, then use Word’s feature to create a new style based on another style. Do not modify the IEC styles unless you know what you are doing.

3445 3446 3447



Blocks of text should be positio ned with textboxes and not with returns/line breaks. This ensures that text appear correctly on each person’s computer regardless of the differences related to fonts.

3448



Document p roperties should be used for many of the standard items. The document items

Document and page formatting

3449 3450 3451

should non-breaking spaces and non-breaking Microsoft Word so doesn’t seem toutilize allow you to copy these non-breaking charactersdashes. into the document properties, you will have to type them in directly.

3452

The following is a list of the recommended list of properties:

3453



Title

3454



Subject

3455



Author

3456



Company

3457



VerNo

3458



DraftNo

3459



EditNo

3460 3461

– Date completed year)

3462





“Security for industrial automation and control systems” 







Draft number (rev’e d for each voting draft)

Edit number (rev’ed periodically as edits and comments are incorporated)

Publisher 

“ISA”

Version number (if there are multiple versions)



StdNo ComNo

Specific name of the document

Editor’s name and affiliation







Date the version/draft/edit was completed (minimum month and

“ISA”

3463 3464

– –

Currently “99”, but will need to change “99”

3465



WrkGrpNo



2-digit version of working group number

3466



TskGrpNo



2-digit version of task group number (if applicable)

3467 3468



SeriesNo SeriesNo)

3469 3470



PartNo  Document part number within the series (For example, ISA-99.02.01, where 01 is the PartNo)

3471



DOC-01-01

3472









to “62443 ” soon

Document series number (For example, ISA-99.02.01, where 02 is the



ISA-99.01.01

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015 3473



DOC-XX-YY



ISA-99.XX.YY

3474



DOC-Series



“ISA -9 9”

3475



– 98 –

ISA99, WG03

Document draft and edit numbers should be used.

3476 3477 3478



3479 3480 3481



3482 3483 3484

Draft numbers represent the voting version of the document. Each time a voting draft goes out for comment/vote, the draft number of the next version should be incremented. Edit numbers are incremented as “significant” cha nges are made to the document. This could be periodically or it could be based on the amount of content added. It allows the document to be tracked without too much difficulty. The “significant” period or content amount is left up to the working/task group, but should allow someone new to the group to understand most of the current state of the document without having too much additional material to absorb.

3485 3486 3487 3488 3489

 The Table of Contents should be added using the pre-defined IEC macro. This will automatically populate the table of contents, table of figures, and table of tables. Some documents do not include any figures or tables, so when the document goes for voting/comment drafts, it may be necessary to delete the unused table (for the ISA version).

3490

D.3

3491 3492



These items come out of the IEC styleguide, but aren’t always very o generating a document.

3493 3494 3495 3496



All text paragraphs need to have some way to reference them. This means that there c an be no hanging paragraphs. This includes things like emphasizing the base requirements or requirement enhancements by making them bold/underline instead of giving them their own heading designation.

Sectioning

INCORRECT

4.

EXAMPL

E

Section title

Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Etiam faucibus arcu in lorem dapibus bibendum. 4.1

Subsection title

In augue sem, tincidunt in, tristique quis, dapibus eget, neque. Suspendisse potenti. In suscipit lacus molestie odio. CORRECT EXAMPLE

4.

Section title

4.1

Overview

Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Etiam faucibus arcu in lorem dapibus bibendum. 4.2 Subsection title In augue sem, tincidunt in, tristique quis, dapibus eget, neque. Suspendisse potenti. In suscipit lacus molestie odio.

3497

bvious when

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03 3498



– 99 –

ISA-62443-1-1, D5E4, August 2015

Section headings cannot g o 3 deep in a single series. INCORRECT

EXAMPL

E

4.

Section title

4.1

Subsection title

4.1.1

Sub-subsection title

In augue sem, tincidunt in, tristique quis, dapibus eget, neque. Suspendisse potenti. In suscipit lacus molestie odio. CORRECT EXAMPLE

4.

Section title

4.1

Overview

Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Etiam faucibus arcu in lorem dapibus bibendum. 4.2

Subsection title

In augue sem, tincidunt in, tristique quis, dapibus eget, neque. Suspendisse potenti. In suscipit lacus molestie odio.

3499 3500



3501

D.4

3502



Figures should always b e gene rated at 100% s caling wit h all fonts at 8pt.

3503 3504



ISA99 generally uses Microso ft Visio 2003 or newer to generate graphics, although programs are acceptable.

3505 3506 3507



For Visio graphics, save the graphic as a Windows Meta File (WMF) first, then insert it into the Microsoft Word file. This seems to be more stable and less prone to conversion issues than inserting a Microsoft Visio object directly.

3508 3509 3510



Avoid generating bitmap fi les (PNG, JPG, G IF, etc.) for li ne- art graphics unless a bsolutely necessary. These file formats rasterize the line art graphics, so they can’t be blown up or zoomed properly in print copies or PDFs of the document.

3511

D.5

3512 3513

 Tables should always u se the pre-defined IEC sty les for tables unle ss absolutely necessary.

3514



3515 3516

IEC limits section numbering to 6 levels deep, although we have generally tried to sti ck to at most 5 levels (a remnant of the srcinal ISA document styleguide).

Figures other

Tables

Large tables may need to have the page rotated to v iew properly. There is an IEC macro to rotate the page to landscape . Try this first. If that doesn’t work pro perly, generate a new section and add in a textbox to display the page numbering and other header information.

3517 3518 3519 3520 3521 3522 3523



Tables that e xtend over more than 2 page s need to have a title on the top of each page reflecting the table name and the table title. There are multiple ways to accomplish this. You can break the table itself at the page break and then add table headers for each new table. The preferred way would be to break the table after the first page, add in an additional header row to the second page with the “(continued)” line in the title, and then repeat the title and normal header rows from then on. This will auto-populate the title on each subsequent page.

3524 3525 3526



Don’t allow rows to break across pages. This is not an absolute requirement, but annoys many people when reading documents. It is an easy fix and keeps all the content for a particular item easily viewable.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 100 –

ISA99, WG03

3527

D.6

Wording and language recomme ndations

3528



3529



Do not use contractions. Use should not

3530



Use formal l anguage. Do not use informal o r colloquial sayings, u nless necessary.

3531 3532



Do not u se first or second person terms like I, we, us, y ou, etc. It is improper in some cultures to speak to others that you do not know using these types of terms.

3533 3534



Use standard-eeze, requirement-style supplemental guidance.

Use a single space between sentences. instead of shouldn’t.

language in both the normative requirements and in

3535 3536



The word “must” connotes an absolute necessity like the law of gravity. be used as such.

3537 3538



Terms like “shall”, “should”, and “may” are the recommended forms of requ style language. “Needs to” is also another one that seems to be acceptable.

It should only irement-

3539 3540 3541



3542



Don’t use e.g. or i.e. Use t

3543 3544 3545 3546



Once an acronym has been defined in the normative sections of the document (starting with clause 1), avoid reusing the text form of the term again. Also, don’t redefin e the term again. Terms defined in the preface, forward, or clause 0 should still be defined in clauses and annexes that follow.

3547 3548



Don’t over -capitalize words. There is a tendency to capitalize words to connote emphasis. Words should not be capitalized unless they are names or specific terms used in industry.

3549



ISA99 references the committee, ISA-99 references

3550 3551

Statements like “this person is going to do that action” should not be used. It should be rephrased as “this person needs to do that action” or “this person should perform action”. erms like “for example” and “such

using these in the document and in communications.

that

as” instead.

the docu ment series. Be care ful when

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 101 –

ISA-62443-1-1, D5E4, August 2015

3552

BIBLIOGRAPHY

3553 3554 3555 3556 3557

NOTE This bibliography includes references to sources used in the creation of this standard as well as references to sources that may aid the reader in developing a greater understanding of cyber security as a whole and developing a management system. Not all referen ces in this bibliography are referred to throughout the text of this standard. The references have been broken down into different categories depending on the type of source they are.

3558

References to other parts, both existing and anticipated, of the ISA

3559 3560

NOTE Some of these references are normative references (see Clause 2 ), published documents, in development, or anticipated. They are all listed here for comple teness of the anticipated parts of the ISA ‑ 62443 series.

3561 3562

SKELETON N OTE reference thi s reference documentfrom below, change the documen “This standard is …”.For Youthe can’t have ato circular a document to itself.

3563 3564

[1]

ANSI/ISA ‑ 62443-1-1-2007, Security for industrial automation and control systems: Terminology, concepts and models

3565 3566

[2]

ANSI/ISA ‑ TR62443-1-2, Security for industrial automation and control systems: Master glossary of terms and abbreviations

3567 3568

[3]

ANSI/ISA ‑ 62443-1-3, Security for industrial automation and control systems: System security compliance metrics

3569 3570

[4]

ANSI/ISA ‑ 62443-2-1-2009, Security for industrial automation and control systems: Establishing an industrial automation and control system security program

3571 3572

[5]

ANSI/ISA ‑ 62443-2-2, Security for industrial automation and control Operating an industrial automation and control system security program

3573 3574

[6]

ANSI/ISA ‑ TR62443-2-3, Security for industrial automation and control systems: Patch management in the IACS environment

3575 3576

[7]

ANSI/ISA ‑ TR62443-3-1-2007, Security for industrial automation and control systems: Security technologies for industrial automation and control systems

3577 3578

[8]

ANSI/ISA ‑ 62443-3-2, Security for industrial automation and control systems: Target security assurance levels for zones and conduits

3579 3580

[9]

ANSI/ISA ‑ 62443-3-3, Security for industrial automation and control systems: System security requirements and security assurance levels

3581 3582

[10]

ANSI/ISA ‑ 62443-3-4, Security for industrial automation and control systems: Product development requirements

3583 3584

[11]

ANSI/ISA ‑ 62443-4-1, Embedded devices

3585 3586

[12]

ANSI/ISA ‑ 62443-4-2, Security for industrial automation and control systems: Host devices

3587 3588

[13]

ANSI/ISA ‑ 62443-4-3, Security for industrial automation and control systems: Network devices

3589 3590

[14]

ANSI/ISA ‑ 62443-4-4, Security for Application , dat a and fu nctions

3591

Other standards references:

3592 3593

[15]

3594

ISO/IEC Directives, Standards

Security

Part 2,

for

industrial

industrial

automation

automation

62443 series:

t reference to a note stating

and

and

control

control

systems:

systems:

systems:

Rules for the structure and drafting of International

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA-62443-1-1, D5E4, August 2015

– 102 –

ISA99, WG03

3595 3596 3597 3598 3599

SKELETON NOTE Any th ing tha t can hav e an ISO /I EC, NATO, etc . num ber sho ul d be inc lud ed in th e “Ot he r standards references” section. For ISA documents, these should receive their ISA numbers if they have them, otherwise , use the international numbering. For IEC versions of the documents, these numbers should be replaced with their international number equivalents. (For example, ANSI/ISA-95.00.01-2000 would be replaced by IEC 62264-1 in the IEC version.)

3600

In addition to the two sections of references above, you can also have other sections like:

3601



Industry-spe cific and sector-sp ecific references

3602 3603



Other documents and published sources  National/government documents or any other published resources . NIST FIPS/SP documents fall into this category.

3604



3605

Websites



Full sites or pages



Trade organization documents and such.

within specific sites containi

ng reference material.

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

ISA99, WG03

– 103 –

ISA-62443-1-1, D5E4, August 2015

3606 3607 3608 3609

Developing and promulgating technically sound consensus standards and recommended practices is one of ISA's primary goals. To achieve this goal the Standards and Practices Department relies on the technical expertise and efforts of volunteer committee members, chairmen, and reviewers.

3610 3611 3612 3613 3614

ISA is an American National Standards Institute (ANSI) accredited organization. ISA administers United States Technical Advisory Groups (USTAGs) and provides secretariat support for International Electrotechnical Commission (IEC) and International Organization for Standardization (ISO) committees that develop process measurement and control standards. To obtain additional information on the Society's standards program, please write:

3615 3616 3617 3618 3619 3620

ISA Attn: St andards Departm ent 67 Alexander Drive P.O. Box 12277 Research Triangle Park, NC 27709

3621 3622 3623 3624 3625 3626 3627 3628

ISBN: -to-be-assigned-

. e ict o n t u o th i w e g n a h c to tc je b su is d n a te e l p m o c f o te a r u cc a e b t o n y a m It tc.

. tcs u d o r p kr o w e e tit m m o c f o t n e m p lo e v e d r e h rt fu f o tr o p p u su d ro in p kr w i o e w vre e f e tti o e m so mp r o c u 9 p 9 e A h t IS r n fo a Y f o L E T L F O A S R d D e iv Gd IN ro K p R s O tiI W a si t n e m cu o d si h T

. e l a s r fo r o n o tci u d ro p re r e trh u f r o f d e r e ff o r o , rs e h t o to d te u ib trs i d , d ie p o c e b t o n y a m t n e m u c o d si h T

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF