ISA-62443-2-2-WD

Share Embed Donate


Short Description

Security for industrial automation and control systems. Implementation Guidance for and IACS Security Management System...

Description

THIS COPY OF A FULL OR ABRIDGED ISA PUBLICATION IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS. IT MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

Copyright © by the International Society of Automaton. All rights reserved. Not for resale. Printed in the United States of America. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), without the prior written permission of the Publisher. ISA 67 Alexander Drive P. O. Box 12277 Research Triangle Park, North Carolina 27709 USA

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

FOR USE AND REVIEW ONLY BY MEMBERS OF ISA99 AND APPROVED PARTIES:

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

This page intentionally left blank

ISA‑62443-2-2, D1E4, April 2013

–3–

ISA99, WG02, TG02

1

3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

ISA‑62443-2-2 Security for industrial automation and control systems Implementation Guidance for and IACS Security Management System Draft 1, Edit 4 April 2013

Text appearing red italics should be considered editorial comments, provided as an aid in the preparation of the document. It will be removed before the draft is completed.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

2

ISA

67 Alexander Drive

P. O. Box 12277

Research Triangle Park, NC 27709 USA

–4–

ISA

Security for industrial automation and control systems



ISBN: -to-be-assigned-

Copyright © 2011 by ISA. All rights reserved. Not for resale. Printed in the United States of America. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013 ISA99, WG02, TG02

21

22

23

–5–

ISA99, WG02, TG02

24

PREFACE

25 26

This preface, as well as all footnotes and annexes, is included for information purposes and is not part of ISA-62443.02.02.

27 28 29 30 31 32

This document has been prepared as part of the service of ISA, the International Society of Automation, toward a goal of uniformity in the field of instrumentation. To be of real value, this document should not be static but should be subject to periodic review. Toward this end, the Society welcomes all comments and criticisms and asks that they be addressed to the Secretary, Standards and Practices Board; ISA; 67 Alexander Drive; P. O. Box 122 77; Research Triangle Park, NC 27709; Telephone (919) 549-8411; Fax (919) 549-8288; E-mail: [email protected].

33 34 35 36 37 38 39 40 41 42

The ISA Standards and Practices Department is aware of the growing need for attention to the metric system of units in general and the Internatio nal System of Units (SI) in particular, in the preparation of instrumentation standards. The Department is further aware of the benefits to USA users of ISA standards of incorporating suitable references to the SI (and the metric system) in their business and professional dealings with other countries. Toward this end, this Department will endeavor to introduce SI-acceptable metric units in all new and revised standards, recommended practices and technical reports to the greatest extent possible. Standard f or Use of the International System of Units (SI): The Modern Metric System, published by the American Society for Testing and Materials as IEEE/ASTM SI 10-97, and future revisions, will be the reference guide for definitions, symbols, abbreviations, and co nversion factors.

43 44 45 46 47

It is the policy of ISA to encourage and welcome the participation of all concerned individuals and interests in the development of ISA standards, recommended practices and technical reports. Participation in the ISA standards-making process by an individual in no way constitutes endorsement by the employer of that individual, of ISA or of any of the standards, recommended practices and technical reports that ISA develops.

48 49 50 51 52

CAUTION – ISA adheres to the policy of the American National Standa rds Institute with regard to patents. If ISA is informed of an existing patent that is required for use of the standard, it will require the owner of the patent to either grant a royalty -free license for use of the patent by users complying with the standard or a license on reasonable terms and conditions that are free from unfair discrimination.

53 54 55 56 57 58 59 60

Even if ISA is unaware of any patent covering this Standard, the user is cautioned that implementation of the standard may require use of techniques, processes or materials covered by patent rights. ISA takes no position on the existence or validity of any patent rights that may be involved in implementing the standard. ISA is not responsible for identifying all patents that may require a license before implementati on of the standard or for investigating the validity or scope of any patents brought to its attention. The user should carefully investigate relevant patents before using the standard for the user’s intended application.

61 62 63

However, ISA asks that anyone reviewing this standard who is aware of any patents that may impact implementation of the standard notify the ISA Standards and Practices Department of the patent and its owner.

64 65 66 67 68 69 70

Additionally, the use of this standard may involve hazardous materials, operat ions or equipment. The standard cannot anticipate all possible applications or address all possible safety issues associated with use in hazardous conditions. The user of this standard must exercise sound professional judgment concerning its use and applic ability under the user’s particular circumstances. The user must also consider the applicability of any governmental regulatory limitations and established safety and health practices before implementing this standard.

71

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

ISA‑62443-2-2, D1E4, April 2013 72 73

–6–

ISA99, WG02, TG02

The following people served as active members of ISA99, Working Group 02, Task Group 02 for the preparation of this document: Name

Company

Contributor

, WG/TG Chair



X

, Lead Editor



X

Reviewer

74 75 76

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.



ISA‑62443-2-2, D1E4, April 2013

–7–

ISA99, WG02, TG02

CONTENTS

77

79

PREFACE ............................................................................................................................... 5

80

FORWORD ........................................................................................................................... 12

81

INTRODUCTION ................................................................................................................... 13

82 83 84

1

Context ........................................................................................................................... 13 Audience ........................................................................................................................ 13 Scope ............................................................................................................................. 15

85

2

Normative references ..................................................................................................... 15

86

3

Terms, definitions, abbreviated terms, acronyms, and conventions ................................. 16

4

3.1 Terms and definitions ............................................................................................ 16 3.2 Abbreviated terms and acronyms ........................................................................... 18 3.3 Conventions .......................................................................................................... 19 Overview ........................................................................................................................ 21

87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119

4.1 4.2

5

Structure ............................................................................................................... 21 Information security management in IACS ............................................................. 21 4.2.1 Goal .......................................................................................................... 21 4.2.2 IACS assets to be protected ...................................................................... 21 4.2.3 Establishment of information security management.................................... 22 Security Policy ................................................................................................................ 23 5.1

6

Introduction ........................................................................................................... 23 5.1.1 {Requirement} ........................................................................................... 23 Organization of Security ................................................................................................. 23 6.1 6.2

7

Introduction ........................................................................................................... 23 Internal Organization ............................................................................................. 23 6.2.1 {Requirement} ........................................................................................... 23 6.3 External Parties ..................................................................................................... 23 6.3.1 {Requirement} ........................................................................................... 23 Asset Management ......................................................................................................... 24 7.1 7.2

8

Introduction ........................................................................................................... 24 Responsibility for Assets ....................................................................................... 24 7.2.1 {Requirement} ........................................................................................... 24 7.3 Information Classification ...................................................................................... 24 7.3.1 {Requirement} ........................................................................................... 24 Human Resources Security ............................................................................................ 24 8.1

8.2

Prior to Employment .............................................................................................. 24 8.1.1 Roles and responsibilities .......................................................................... 24 8.1.2 Screening .................................................................................................. 25 8.1.3 Terms and conditions of employment ......................................................... 26 During Employment ............................................................................................... 27 8.2.1 Management responsibilities ...................................................................... 27 8.2.2 Information security awareness, education, and training ............................ 28 8.2.3 Disciplinary process ................................................................................... 29

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

78

ISA‑62443-2-2, D1E4, April 2013

ISA99, WG02, TG02

8.3

9

Termination or Change of Employment .................................................................. 29 8.3.1 Termination responsibilities ....................................................................... 29 8.3.2 Return of assets ........................................................................................ 29 8.3.3 Removal of access rights ........................................................................... 29 Physical and Environmental Security .............................................................................. 30

125 126 127 128 129 130 131 132 133 134 135 136

9.1 9.2

Introduction ........................................................................................................... 30 Secure Areas ........................................................................................................ 30 9.2.1 {Requirement} ........................................................................................... 30 9.3 Equipment Security ............................................................................................... 30 9.3.1 Physical Access Authorizations ................................................................. 30 9.3.2 Physical Access Control ............................................................................ 31 9.3.3 Access Control for Communication Medium ............................................... 31 9.3.4 Access Control for Display Medium ............................................................ 32 9.3.5 Monitoring Physical Access ....................................................................... 32 9.3.6 Visitor Control ............................................................................................ 32 9.3.7 Access Records ......................................................................................... 32 10 Communications and Operations Management ............................................................... 33

137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164

10.1 Introduction ........................................................................................................... 33 10.2 Operational Procedures and Responsibilities ......................................................... 33 10.2.1 Automated Marking .................................................................................... 33 10.3 Third Party Service Delivery Management ............................................................. 33 10.3.1 {Requirement} ........................................................................................... 33 10.4 System planning and acceptance .......................................................................... 33 10.4.1 {Requirement} ........................................................................................... 33 10.5 Protection against malicious and mobile code ....................................................... 34 10.5.1 Malicious Code Protection ......................................................................... 34 10.5.2 Security Alerts and Advisories ................................................................... 34 10.6 Backup .................................................................................................................. 34 10.6.1 {Requirement} ........................................................................................... 34 10.7 Network Security Management .............................................................................. 35 10.7.1 {Requirement} ........................................................................................... 35 10.8 Media Handling ..................................................................................................... 35 10.8.1 Media Protection Policy and Procedures .................................................... 35 10.8.2 Media Access ............................................................................................ 35 10.8.3 Media Labeling .......................................................................................... 36 10.8.4 Media Storage ........................................................................................... 36 10.8.5 Media Transport ........................................................................................ 37 10.8.6 Media Sanitization and Disposal ................................................................ 38 10.8.7 Access Control for Display Medium ............................................................ 38 10.8.8 Public Key Infrastructure Certificates ......................................................... 38 10.9 Exchange of Information ........................................................................................ 39 10.9.1 {Requirement} ........................................................................................... 39 10.10 Electronic Commerce Services .............................................................................. 39 10.10.1 {Requirement} ........................................................................................... 39 10.11 Monitoring ............................................................................................................. 39

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

120 121 122 123 124

–8–

–9–

ISA99, WG02, TG02

165 166 167 168 169

10.11.1 Audit and Accountability Policy and Procedures ......................................... 39 10.11.2 Auditable Events........................................................................................ 40 10.11.3 Audit Monitoring, Analysis and Reporting ................................................... 40 10.11.4 Audit Record Retention .............................................................................. 40 11 Access Control ............................................................................................................... 41

170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202

11.1 Introduction ........................................................................................................... 41 11.2 Business Requirement ........................................................................................... 41 11.2.1 Access Control Policy and Procedures ...................................................... 41 11.2.2 System and Information Integrity Policy and Procedures ............................ 41 11.2.3 Flaw Remediation ...................................................................................... 42 11.3 User Access Management ..................................................................................... 42 11.3.1 Account Management ................................................................................ 42 11.3.2 Separation of Duties .................................................................................. 43 11.4 User Responsibilities ............................................................................................. 43 11.4.1 {Requirement} ........................................................................................... 43 11.5 Network Access Control ........................................................................................ 44 11.5.1 Least Privilege ........................................................................................... 44 11.5.2 Permitted Actions Without Identification or Authentication ......................... 44 11.5.3 Remote Access.......................................................................................... 44 11.5.4 Use of External Information Systems ......................................................... 45 11.6 Operating System Access Control ......................................................................... 45 11.6.1 {Requirement} ........................................................................................... 45 11.7 Application and Information Access Control ........................................................... 46 11.7.1 {Requirement} ........................................................................................... 46 11.8 Mobile Computing and Teleworking ....................................................................... 46 11.8.1 Wireless Access Restrictions ..................................................................... 46 11.8.2 Use Control for Portable and Mobile Devices ............................................. 46 11.8.3 Mobile Code .............................................................................................. 47 11.8.4 Supervision and Review – Use Control ...................................................... 47 11.8.5 Identification and Authentication Policy and Procedures ............................ 47 11.8.6 Identifier Management ............................................................................... 48 11.8.7 Authenticator Management ........................................................................ 48 11.8.8 Software and Information Integrity ............................................................. 49 11.8.9 Information Input Restrictions .................................................................... 49 11.8.10 Error Handling ........................................................................................... 49 11.8.11 Information Output Handling and Retention ............................................... 50 11.8.12 Boundary Protection .................................................................................. 50 12 Systems acquisition, development and maintenance ...................................................... 51

203 204 205 206 207 208 209

12.1 Introduction ........................................................................................................... 51 12.2 Security requirements of information systems ........................................................ 51 12.2.1 {Requirement} ........................................................................................... 51 12.3 Correct Processing in Applications ........................................................................ 51 12.3.1 {Requirement} ........................................................................................... 51 12.4 Cryptographic Controls .......................................................................................... 51 12.4.1 Cryptographic Module Validation ............................................................... 51

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

– 10 –

ISA99, WG02, TG02

210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228

12.5 Security of System Files ........................................................................................ 51 12.5.1 {Requirement} ........................................................................................... 51 12.6 Security in development and support processes .................................................... 52 12.6.1 {Requirement} ........................................................................................... 52 12.7 Technical vulnerability management ...................................................................... 52 12.7.1 Configuration Management Policy and Procedures .................................... 52 12.7.2 Baseline Configuration ............................................................................... 52 12.7.3 Configuration Change Control .................................................................... 53 12.7.4 Monitoring Configuration Changes ............................................................. 53 12.7.5 Access Restrictions for Change ................................................................. 54 12.7.6 Network and Security Configuration Settings ............................................. 54 12.7.7 IACS Component Inventory ........................................................................ 54 12.7.8 System Maintenance Policy and Procedures .............................................. 55 12.7.9 Controlled Maintenance ............................................................................. 55 12.7.10 Maintenance Tools .................................................................................... 56 12.7.11 Remote Maintenance ................................................................................. 56 12.7.12 Maintenance Personnel ............................................................................. 57 12.7.13 Timely Maintenance ................................................................................... 57 13 Incident Management ..................................................................................................... 58

229 230 231 232 233 234 235 236 237 238 239 240 241

13.1 Introduction ........................................................................................................... 58 13.2 Reporting Security Events and Weaknesses .......................................................... 58 13.2.1 {Requirement} ........................................................................................... 58 13.3 Management of Incidents and Improvements ......................................................... 58 13.3.1 Incident Response Policy and Procedures ................................................. 58 13.3.2 Incident Response Training ....................................................................... 58 13.3.3 Incident Response Testing and Exercises .................................................. 59 13.3.4 Incident Handling ....................................................................................... 59 13.3.5 Incident Monitoring .................................................................................... 59 13.3.6 Incident Reporting ..................................................................................... 60 13.3.7 Incident Response Assistance ................................................................... 60 13.3.8 IACS Monitoring Tools and Techniques ..................................................... 60 14 Business Continuity Management ................................................................................... 62

242 243 244 245 246 247 248 249 250 251 252 253 254

14.1 Introduction ........................................................................................................... 62 14.2 Security Aspects.................................................................................................... 62 14.2.1 Contingency Planning Policy and Procedures ............................................ 62 14.2.2 Contingency Plan ...................................................................................... 62 14.2.3 Contingency Training ................................................................................. 63 14.2.4 Contingency Plan Testing and Exercises ................................................... 63 14.2.5 Contingency Plan Update .......................................................................... 64 14.2.6 Alternate Storage Site ............................................................................... 64 14.2.7 Alternate Control Site ................................................................................ 64 14.2.8 IACS Backup ............................................................................................. 65 14.2.9 IACS Recovery and Reconstruction ........................................................... 65 14.2.10 Power Equipment and Cabling ................................................................... 66 14.3 Telecommunications Services ............................................................................... 66

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

ISA‑62443-2-2, D1E4, April 2013

– 11 –

ISA99, WG02, TG02

14.3.1 14.3.2 14.3.3 14.3.4 14.3.5 14.3.6 15 Compliance

Emergency Shutoff .................................................................................... 66 Emergency Power...................................................................................... 67 Emergency Lighting ................................................................................... 67 Fire Protection ........................................................................................... 67 Temperature and Humidity Controls ........................................................... 68 Water Damage Protection .......................................................................... 68 .................................................................................................................... 68

262 263 264

15.1 General ................................................................................................................. 68 15.1.1 {Requirement} ........................................................................................... 68 Annex A (informative) Foundational Requirements ................................................................ 70

265 266 267 268 269 270 271 272 273

A.1 A.2 A.3 A.4 A.5 A.6 A.7 A.8 Annex B

274 275

B.1 Overview ............................................................................................................... 72 BIBLIOGRAPHY ................................................................................................................... 73

Overview ............................................................................................................... 70 FR1 A CCESS C ONTROL ............................................................................................ 70 FR2 U SE C ONTROL ................................................................................................. 70 FR3 D ATA I NTEGRITY .............................................................................................. 70 FR4 D ATA C ONFIDENTIALITY .................................................................................... 70 FR5 R ESTRICT D ATA F LOW ...................................................................................... 71 FR6 T IMELY R ESPONSE TO AN E VENT ....................................................................... 71 FR7 R ESOURCE A VAILABILITY ................................................................................... 71 (informative) - Mapping Controls to Foundational Requirements ............................. 72

276 277

No table of figures entries found.

278

No table of figures entries found.

279

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

255 256 257 258 259 260 261

ISA‑62443-2-2, D1E4, April 2013

– 12 –

ISA99, WG02, TG02

280

FORWORD

281 282 283 284

This standard is part of a series that addresses the issue of security for industrial automation and control systems. It has been developed by Working Group 02, Task Group 02 of the ISA99 committee.

285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301

SKELETON NOTE The forward should only be a few lines and should indicate the basic premise of the document and why it is important. It should also indicate if this document supersedes or modifies any other document. The following information comes from the IEC Directives. The foreword shall appear in each document. It shall not contain requirements, recommendations, figures or tables. It consists of a general part and a specific part. The general part (supplied by the Central Secretariat of ISO or by the Central Office of the IEC, as appropriate) gives information relating to the organization responsible and to International Standards in general, i.e. a) the designation and name of the committee that prepared the document, b) information regarding the approval of the document, and c) information regarding the drafting conventions used, co mprising a reference to this part of the ISO/IEC Directives. The specific part (supplied by the committee secretariat) shall give a statement of significant technical changes from any previous edition of the document and as many of the following as are appropriate: d) an indication of any other international organization that has contributed to the preparation of the document; e) a statement that the document cancels and replaces other documents in whole or in part; f) the relationship of the document to other documents (see 5.2.1.3); g) in IEC, an indication of the next stability date (see ISO/IEC Directives, IEC Supplement, 2010, 3.4).

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

302

This standard addresses the requirements for the operation of an effective cyber security program within the context of the foundational requirements defined in ISA‑62443-1-1.

ISA‑62443-2-2, D1E4, April 2013

– 13 –

ISA99, WG02, TG02

INTRODUCTION

303

The format of this document follows the ISO/IEC requirements discussed in ISO/IEC Directives, Pa rt 2. [12] 1 The ISO/IEC Directives specify the format of this document as well as the use of terms like “shall”, “should”, and “may”. The use of those terms for the requirements specified in Clause Error! Reference source not f ound. of this document use the conventions discussed in the ISO/IEC Directives, Appendix H.

304 305 306 307 308 309

NOTE

310

Context

311 312 313 314 315

Industrial automation and control system (IACS) organizations increasingly use commercial -offthe-shelf (COTS) networked devices that are inexpensive, efficient and highly automated. These devices and networking technologies provide an increased opportunity for cyber attack against the IACS equipment. This weakness may lead to health, safety and environmenta l (HSE) consequences in deployed systems.

316 317 318 319 320 321

Organizations deploying pre-existing information technology (IT) and business cyber security solutions to address IACS security may not fully comprehend the results of this decision. While many business IT applications and security solutions can be applied to IACS, they need to be applied in the correct way to eliminate inadvertent consequences. For this reason, the approach used to define system requirements needs to be based on a combination of functional and consequence analysis, and often an awareness of operational issues as well.

322 323 324 325 326 327 328

The primary goal of the ISA‑99 series is to provide a flexible framework that facilitates addressing current and future vulnerabilities in IACS and applying necessary mitigations in a systematic, defensible manner. It is important to understand that the intention of the ISA ‑99 series is to build extensions to enterprise security that adapt the requirements for IT business systems and combine them with the unique requirements that embrac e the strong availability needed by IACS. The ISA‑99 committee has made every effort to avoid building unique stovepipe security architectures for IACS.

329 330 331 332

This International Standard provides interpretation guidelines for the implementation and management of information security management for Industrial Automation and Control Systems (IACS). The approach used is consistent with ISO/IEC 27002 (Code of practice for information security management).

333 334 335 336 337

IACS security goals focus on system availability, plant prote ction, plant operations (even if in a degraded mode), and time-critical system response. IT security goals often do not place the same emphasis on these factors. They may be more concerned with protecting information rather than physical assets. These different goals need to be clearly stated as security objectives regardless of the degree of plant integration achieved.

338 339 340

This document assumes that a security program has been established in accordance with ISA‑99.02.01 and that patch management is implemented consistent with the recommendations detailed in ISA‑TR99.02.03.

341

Audience

342 343 344 345 346

The audience for the information in this standard includes asset owners, those responsible for information security; system vendors, auditors, and application content providers, with a common set of general security control objectives based on ISO/IEC 27002, IACS specific controls, and information security management guidelines allowing for the selection and implementation of such controls.

347 ————————— 1 Numbers in square brackets refer to the Bibliography.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

The initial content of this section is based on similar material from other standards in the ISA99 series. This is provided only as a starting point.

ISA‑62443-2-2, D1E4, April 2013

368 369

ISA99, WG02, TG02

SKELETON NOTE For most documents in the ISA-99 series, the Introduction will probably be labeled as Clause 0, since there are sub-clauses included. This is common. The Introduction should be limited to no more than 2 pages and should contain no figures. If figures are needed, then that section sh ould be moved to Clause 4+ or an Annex. If you need a Clause 0, you will need to edit the “iecstd_us.dotm” and change starting number for the Heading style to start at 0. After that, make sure that the styles reload into the Skeleton file and change the style of the Introduction section header to Heading instead of Heading (Nonumber). The Introduction should indicate major similarities or relationships between the document and existing ISO/IEC documents. It does not have to include detailed explanations, bu t should give the reader some context in relation to other documents. The following information comes from the IEC Directives. The introduction is an optional preliminary element used, if required, to give specific information or commentary about the technical content of the document, and about the reasons prompting its preparation. It shall not contain requirements. Whenever alternative solutions are adopted internationally in a document and preferences for the different alternatives provided, the reasons for the preferences shall be explained in the introduction [see A.6 d)]. Where patent rights have been identified in a document, the introduction shall include an appropriate notice. See Annex F for further information. The introduction shall not be numbered unless there is a need to create numbered subdivisions. In this case, it shall be numbered 0, with subclauses being numbered 0.1, 0.2, etc. Any numbered figure, table, displayed formula or footnote shall be numbered normally beginning with 1.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367

– 14 –

ISA‑62443-2-2, D1E4, April 2013

– 15 –

ISA99, WG02, TG02

1

371 372

The initial content of this section is based on similar material from other standards in the ISA99 series. This is provided only as a starting point.

373 374 375 376 377 378

This standard addresses the operation of an effective IACS cyber security program. Aspects of this operation are examined in the context of the foundational requirements (FRs) described in ISA‑99.01.01. The requirements and controls would be used by various members of the industrial automation and control systems (IACS) community along with the defined zones an d conduits for the system under consideration (SuC) while developing the appropriate technical system target security assurance level (SAL), SAL-T(system), for a specific asset.

379 380 381 382 383 384 385 386 387 388 389 390 391

SKELETON NOTE Clause 1 shall always be the Scope. This is a short statement that describes the scope of this document only. It does not list the overall scope of ISA -99. That has been described in other documents and does not need to be repeated here. The following information comes from the IEC Directives. This element shall appear at the beginning of each document and define without ambiguity the subject of the document and the aspects covered, thereby indicating the limits of applicability of the document or particular parts of it. It shall not contain requirements. In documents that are subdivided into parts, the scope of each part shall define the subject of that part of the document only. The scope shall be succinct so that it can be used as a summary for bibliographic purposes. This element shall be worded as a series of statements of fact. Forms of expression such as the following shall be used: “This International Standard the dimensions of … " - specifies {a method of … " the characteristics of … " a system for … " - establishes { general principles for … "

392 393 394 395 396 397 398 399

Scope

— gives guidelines for …” — defines terms …” Statements of applicability of the document shall be introduced by wording such as: “This International Standard is applicable to …” The wording shall be altered as a function of the document type concerned, i.e. International Standard, Technical Specification, Publicly Available Specification, Technical Report or Guide.

400

2

Normative references

401 402 403

The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies.

404 405 406

The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. F or undated references, the latest edition of the referenced document (including any amendments) applies.

407 408

ISA‑99.01.01 – Security for industrial and automation control systems: Terminology, concepts and models

409 410

ISA‑99.02.01 – Security for industrial and automation control system: Establishing an industrial automation and control systems security program

411 412

ISA‑99.03.02 – Security for industrial and automation control system: Security assurance levels for zones and conduits

413 414

SKELETON NOTE Generally, in the ISA-99 series, there is only 1 completely normative document, ISA -99.01.01. If there are others, put them here as well. Normative references shall be International Standards documents of

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

370

ISA‑62443-2-2, D1E4, April 2013 415 416

– 16 –

ISA99, WG02, TG02

some sort. Even though a document gets listed here, it will also be liste d in the Bibliography along with all the other documents.

417

3

Terms, definitions, abbreviated terms, acronyms, and conventions

418 419

The initial content of this section is based on similar material from other standards in the ISA99 series. This is provided only as a starting point.

420

3.1

421 422

For the purposes of this document, the terms and definitions given in ISA‑62443-1-1 and the following apply.

423 424 425 426

3.1.1 authentication verifying the identity of an IACS user, often as a prerequisite to allowing access to resources in an information system

427 428 429

3.1.2 authenticity property of being genuine and being able to be verified and trusted

430

NOTE

431 432 433 434

3.1.3 automatic pertaining to a process or equipment that, under specified conditions, functions without human intervention

435

[IEV number 351-21-40]

436 437 438

3.1.4 availability ensuring timely and reliable access to and use of information

439

[FIPS 199]

440 441 442 443

3.1.5 communication channel logical or physical point-to-point or point-to-multipoint data flow between components in one zone to one or more components in another zone

444 445 446 447

3.1.6 confidentiality preserving authorized restrictions on information access and disclosure, including means fo r protecting personal privacy and proprietary information

448

[FIPS 199]

449 450 451 452

3.1.7 connection association established between two or more endpoints which supports the transfer of IACS specific data

453 454 455

3.1.8 consequence outcome of an event

456 457 458 459

3.1.9 environment aggregate of external procedures, conditions, and objects affecting the development, operation and maintenance of IACS

It may also be defined as confidence in the validity of a transmission, a message, or message o riginator.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

Terms and definitions

– 17 –

ISA99, WG02, TG02

460 461 462

3.1.10 event occurrence or change of a particular set of circumstances

463 464 465 466

3.1.11 external information systems hardware, software components and repositories that are connecte d by some means or embedded within the component

467 468 469 470

3.1.12 IACS user entity (including human users, processes and devices) that performs a function in the IACS or a component used by the IACS

471 472 473

3.1.13 impact evaluated consequence of a particular event

474 475 476

3.1.14 industrial automation and control system system which controls the manufacturing process within a defined set of operational limits

477 478 479 480

3.1.15 integrity guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity

481

[FIPS 199]

482 483 484 485 486

3.1.16 local access any access to an organizational IACS by an IACS user communicating through an internal, organization-controlled network (such as a local area network) or directly to the IACS without the use of a network

487 488 489 490 491

3.1.17 non-repudiation assurance that the sender of information is provided with proof of delivery and all recipients are provided with proof of the sender’s identity, so the sender cannot deny having sent the information and the recipient cannot deny having received the information

492 493 494 495

3.1.18 remote access any access to an IACS by an IACS user communicating through an external, non -organizationcontrolled network (such as the Internet)

496 497 498 499

3.1.19 remote session session initiated whenever an IACS is accessed by a human user communicating across the boundary of a zone defined by the asset owner based on their risk assessment

500 501 502 503

3.1.20 role set of connected behaviors, privileges and obligations associated to IACS users in a given situation

504

NOTE 1

The privileges to perform certain operations are assigned to specific ro les.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

ISA‑62443-2-2, D1E4, April 2013

– 18 –

ISA99, WG02, TG02

505 506 507 508

NOTE 2

509 510 511 512 513

3.1.21 security assurance level measure of confidence that computer systems and data are free from vulnerabilities, either intentionally designed computer components or accidently inserted at any time during its lifecycle, and that the computer systems functions in the intended manner

514 515 516 517

3.1.22 session semi-permanent, stateful, communicating devices

518

NOTE

519 520 521 522 523

3.1.23 threat any circumstance or event with the potential to adversely affect organizational operations (including mission, functions, image or reputation), organizational assets, IACS or individuals via unauthorized access, destruction, disclosure, modification of dat a and/or denial of service

524 525 526 527

3.1.24 trust belief that an operation or data transaction source or process is secure and will perform as intended

528 529 530

3.1.25 untrusted entity that has not met predefined requirements to be trusted

531 532 533 534 535 536 537 538

3.1.26 vulnerability

539

3.2

540

This subclause defines the abbreviated terms and acronyms used in this document.

Role definitions must be distinguished in infrastructure role definitions (within a process), functional role definitions (part of an entity functions) or organizational role definition (a person position). A functional role may be associated with privileges and confer responsibility and authority on a user assigned to that role

interactive

information

interchange

between

two

or

more

Typically a session has a clearly defined start process and end process.

weakness in an IACS function, procedure, internal control or implementation that could be exploited or triggered by a threat source SKELETON NOTE Only add in the reference at the end of the term if it relates directly to something from an international standard. IEC seems to dislike referencing national standards documents (ISA, NIST, NERC, NEMA, etc.). Only include these references if there is an ISO/IEC, NATO, etc. reference. Also, if the reference is not exactly from the reference, indicate something like “Adapted from … ”.

Abbreviated terms and acronyms

AC

Access Control

AES

Advanced encryption standard

API

Application programming interface

CA

Certification authority

CIP

Critical infrastructure protection

COTS

Commercial-off-the-shelf

DC

Data confidentiality

DI

Data integrity

DMZ

Demilitarized zone

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

Adapted from [ISO/IEC 1st WD 24760: 2005 -10-01]

– 19 –

DoS

Denial of service

FR

Foundational requirement

FTP

File transfer protocol

HSE

Health, safety, and environmental

HTTP

Hypertext transfer protocol

IACS

Industrial automation and control system(s)

ID

Identifier

IDS

Intrusion detection system

IEC

International Electrotechnical Commission

IEEE

Institute of Electrical and Electronics Engineers

IM

Instant messaging

IPS

Intrusion prevention system

ISO

International Organization for Standardization

IT

Information technology

NERC

North American Electric Reliability Corporation

NIST

U.S. National Institute of Standards and Technology

PDF

Portable document format

RA

Resource availability

RDF

Restrict data flow

RE

Requirement enhancement

SAL

Security assurance level

SIS

Safety instrumented system

SP

Special Publication (from NIST)

SR

System requirement

SuC

System under consideration

TRE

Timely response to an event

UC

Use control

US-CERT

U.S. Computer Emergency Readiness Team

USB

Universal serial bus

VoIP

Voice over internet protocol

ISA99, WG02, TG02

541

3.3

Conventions

542 543 544 545 546

Much of the content of this standard is expressed in the form of specific requirements or controls. Each of these has a baseline requirement and zero or more requirement enhancements to strengthen security assurance. Rationale and supplemental guidance may be provided for each baseline requirement, and for any associated enhancement as is deemed necessary, to provide clarity to the reader.

547 548

SKELETON NOTE This sub-clause is where specific conventions used in the document, like specific clause/sub clause formatting, special text conventions, or any other things that the reader should know in order to read

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

549 550 – 20 –

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013 ISA99, WG02, TG02

the document. The reader may still need some introduction to conventions used throughout the document, but this sub-clause allows for a greater explanation in one place.

551

ISA‑62443-2-2, D1E4, April 2013

– 21 –

ISA99, WG02, TG02

552

4

Overview

553

4.1

554 555 556

The content of this standard has been organized in a manner similar to that used in ISO/IEC 27002. In cases where objectives and controls specified in ISO/IEC 27002 are applicable without a need for any additional information, only a reference is provided to ISO/IEC 27002.

557 558 559 560

In cases where controls need additional guidance spec ific to IACS, the ISO/IEC 27002 control and implementation guidance is repeated without modification, followed by the IACS specific guidance related to this control. IACS specific guidance and information is included in the following clauses:

561

– Organization of information security (clause 6)

562

– Asset management (clause 7)

563

– Human resources security (clause 8)

564

– Physical and environmental security (clause 9)

565

– Communications and operations management (clause 10)

566

– Access control (clause 11)

567

– Information systems acquisition, development and maintenance (clause 12)

568

– Information security incident management (clause 13)

569

– Business continuity management (clause 14)

570

4.2

571

4.2.1

572 573 574 575

Industrial control systems and associated networks are faced with security threats from a wide range of sources, including computer-assisted fraud, espionage, sabotage, vandalism, information leakage, earthquake, fire or flood. These security threats may originate from inside or outside the control systems environment resulting in damage to the organization.

576 577 578 579

Once the security of an IACS is compromised, for example by unauthorized access, the system or the equipment under control may suffer damage. Therefore, it is essential for an asset owner to ensure its security by continuously improving its related programs in accordance with ISO/IEC 27001.

580 581 582 583 584

Effective IACS security is achieved by implementing a suitable set of controls based on those described in this standard. These controls need to be established, implemen ted, monitored, reviewed and improved in facilities, services and applications. The successful deployment of security controls will better enable meeting the security and business objectives of the organization to be met.

585

4.2.2

586 587 588

In order to establish information security management, it is essential for an asset owner to clarify and identify all IACS related assets. The clarification of attributes and importance of the assets makes it possible to implement appropriate controls.

Information security management in IACS Goal

IACS assets to be protected

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

Structure

ISA‑62443-2-2, D1E4, April 2013

– 22 –

ISA99, WG02, TG02

589

4.2.3

Establishment of information security management

590

4.2.3.1

591 592

It is essential for asset owners to identify their security requirements. There are three main sources of security requirements as follows:

593 594 595

a) What is derived from assessing risks to IAC S operation, taking into account the overall business strategy and objectives. Through risk assessment, threats to assets are identified, vulnerability to and likelihood of occurrence is evaluated and potential impact is estimated;

596 597

b) The legal, statutory, regulatory, and contractual requirements that asset owners have to satisfy, and the socio-cultural environment;

598 599

c) The particular set of principles, objective and business requirements for information processing that an asset owner has developed to support its operations.

600

4.2.3.2

601 602 603 604 605

Security requirements are identified by a methodical assessment of security risks. Expenditure on controls needs to be balanced against the business harm likely to result from security failures. The results of the risk assessment will help to guide and determine the appropriate management action and priorities for managing information security risks, and for implementing controls selected to protect against these risks.

606 607

Risk assessment should be repeated periodically to address any changes that might influence the risk assessment results.

608

4.2.3.3

609 610 611

Once security requirements and risks have been identified and decisions for the treatment of risks have been made, appropriate controls should be selected and implemented to ensure risks are reduced to an acceptable level.

612 613 614 615

This standard provides guidance and IACS specific controls, in addition to general information security management, taking account of IACS specific requirements. Therefore, asset owners are recommended to select controls from this guideline and implement them. In addition, new controls can be designed to meet specific needs as appropriate.

616 617 618 619

The selection of security controls is dependent upon organizational decisions based on the criteria for risk acceptance, risk treatment options, and the general risk management approach applied by asset owners, and should also be subject to all relevant national and international legislation and regulations.

620

4.2.3.4

621 622

Experience has shown that the following factors are often critical to the successful implementation of information security in an industrial automation and control system :

623 624

a) information security policy, objectives, and activities t hat reflect business objectives and the specific characteristics of an IACS;

625 626

b) an approach and framework to implementing, maintaining, monitoring, and improving information security that is consistent with the organizational culture;

627

c) visible support and commitment from all levels of managem ent;

628

d) a good understanding of the security requirements, risk assessment, and risk management;

629 630

e) effective marketing of information security to all managers, employees, and other parties to achieve awareness;

Assessing security risks

Selecting controls

Critical success factors

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

How to establish security requirements

– 23 –

ISA99, WG02, TG02

631 632

f) distribution of guidance on information security policy and standards to all managers, employees and other parties;

633

g) provision to fund information security management activities;

634

h) providing appropriate awareness, training, and education;

635

i) establishing an effective information security inci dent management process;

636 637

j) implementation of a measurement system that is used to evaluate performance in information security management and feedback suggestions for improvement.

638

5

639

5.1

640

5.1.1

Security Policy Introduction

641

{Requirement} Requirement:

642 643

Foundational Requirement:

644

Rationale/Supplemental Guidance:

645

Requirement Enhancements:

646 647

6

Organization of Security

648

6.1

Introduction

650

6.2

Internal Organization

651

6.2.1

649

652

{Requirement} Requirement:

653 654

Foundational Requirement:

655

Rationale/Supplemental Guidance:

656

Requirement Enhancements:

657 658

6.3

659

6.3.1

660

External Parties {Requirement} Requirement:

661 662

Foundational Requirement:

663

Rationale/Supplemental Guidance:

664

Requirement Enhancements:

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

ISA‑62443-2-2, D1E4, April 2013

– 24 –

ISA99, WG02, TG02

665 666

7

Asset Management

667

7.1

Introduction

669

7.2

Responsibility for Assets

670

7.2.1

668

671

Requirement:

672 673

Foundational Requirement:

674

Rationale/Supplemental Guidance:

675

Requirement Enhancements:

676 677

7.3

Information Classification

678

7.3.1

679

{Requirement} Requirement:

680 681

Foundational Requirement:

682

Rationale/Supplemental Guidance:

683

Requirement Enhancements:

684 685

8

Human Resources Security

686

8.1 Prior to Employment

687 688 689

Objective: To ensure that employees, contractors and third party users understand their responsibilities, and are suitable for the roles they are considered for, and to reduce the risk of theft, fraud or misuse of facilities.

690 691

Security responsibilities should be addressed prior to e mployment in adequate job descriptions and in terms and conditions of employment.

692 693

All candidates for employment, contractors and third party users should be adequately screened, especially for sensitive jobs.

694 695

Employees, contractors and third party users of information processing facilities should sign an agreement on their security roles and responsibilities.

696

8.1.1

697

Control

698 699

Security roles and responsibilities of employees, contractors and third party users should be defined and documented in accordance with the organization’s information security policy.

700

Implementation guidance

Roles and responsibilities

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

{Requirement}

ISA‑62443-2-2, D1E4, April 2013

ISA99, WG02, TG02

Security roles and responsibilities should include the requirement to:

702 703

a) implement and act in accordance with the organization’s information security policies (see 5.1);

704 705

b) protect assets from unauthorized access, disclosure, modification, destruction or interference;

706

c) execute particular security processes or activities;

707

d) ensure responsibility is assigned to the individual for actions taken;

708

e) report security events or potential events or other security risks to the organization.

709 710

Security roles and responsibilities should be defined and clearly communicated to job candidates during the pre-employment process.

711

IACS-specific implementation guidance

712 713 714 715

Facilities should appoint staff who have the right credentials or appropriate knowledge and skills to be in charge of the supervision of matters related to the installation, maintenance and operation of IACS. The relevant staff should be notified of their assigned roles and responsibilities.

716

Other Information

717 718 719

Job descriptions can be used to document security roles and responsibilities. Security roles and responsibilities for individuals not engaged via the organization’s employment process, e.g. engaged via a third party organization, should also be clearly defined and communicated.

720 721

Requirement:

722 723

Foundational Requirement:

724

Rationale/Supplemental Guidance:

725

Requirement Enhancements:

726 727

8.1.2

Screening

728

Control

729 730 731 732

Background verification checks on all candidates for employment, contractors, and third party users should be carried out in accordance with relevant laws, regulations and ethics, and proportional to the business requirements, the classification of the information to be accessed, and the perceived risks.

733

Implementation guidance

734 735

Verification checks should take into account all relevant privacy, protection of personal data and/or employment based legislation, and should, where permitted, include the following:

736

a) availability of satisfactory character references, e.g. one business and one per sonal;

737

b) a check (for completeness and accuracy) of the applicant’s curriculum vitae;

738

c) confirmation of claimed academic and professional qualifications;

739

d) independent identity check (passport or similar document);

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

701

– 25 –

– 26 –

ISA99, WG02, TG02

740

e) more detailed checks, such as credit checks or checks of criminal records.

741 742 743 744

Where a job, either on initial appointment or on promotion, involves the person having access to information processing facilities, and in particular if these are handling sensitive information, e.g. financial information or highly confidential information, the organization should also consider further, more detailed checks.

745 746

Procedures should define criteria and limitations for verification checks, e.g. who is eligible to screen people, and how, when and why verification checks a re carried out.

747 748 749 750 751 752

A screening process should also be carried out for contractors, and third party users. Where contractors are provided through an agency the contract with the agency should clearly specify the agency’s responsibilities for screening and the notification procedures they need to follow if screening has not been completed or if the results give cause for doubt or concern. In the same way, the agreement with the third party (see also 6.2.3) should clearly specify all responsibilities and notification procedures for screening.

753 754 755 756

Information on all candidates being considered for positions within the organization should be collected and handled in accordance with any appropriate legislation existing in the relevant jurisdiction. Depending on applicable legislation, the candidates should be informed beforehand about the screening activities.

757

IACS-specific implementation guidance

758 759 760

Facilities should also consider further, more detailed checks for job positions that give staff access to IACS that have been assessed as critical and thus require higher levels of security. [wording?]

761

8.1.3

762

Control

763 764 765

As part of their contractual obligation, employees, contractors and third party users should agree and sign the terms and conditions of their employment contract, which should state their and the organization’s responsibilities for information security.

766

Implementation guidance

767 768

The terms and conditions of employment should reflect the organization’s security policy in addition to clarifying and stating:

769 770 771

a) that all employees, contractors and third party users who are given access to sensitive information should sign a confidentiality or non-disclosure agreement prior to being given access to information processing facilities;

772 773

b) the employee’s, contractor’s and any other user’s legal responsibilities and rights, e.g. regarding copyright laws or data protection legislation (see also 15.1.1 and 15.1.2);

774 775 776

c) responsibilities for the classification of information and management of organizational assets associated with information systems and services handled by the employee, contractor or third party user (see also 7.2.1 and 10.7.3);

777 778

d) responsibilities of the employee, contractor or third party user for the handling of information received from other companies or external parties;

779 780 781

e) responsibilities of the organization for the handling of personal information, including personal information created as a result of, or in the course of, employment with the organization (see also 15.1.4);

782 783

f)

Terms and conditions of employment

responsibilities that are extended outside the organization’s premises and outside normal working hours, e.g. in the case of home-working (see also 9.2.5 and 11.7.1);

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

– 27 –

ISA99, WG02, TG02

784 785

g) actions to be taken if the employee, contractor or third party user disregards the organization’s security requirements (see also 8.2.3).

786 787 788

The organization should ensure that employees, contractors and third party users agree to terms and conditions concerning information security appropriate to the nature and extent of access they will have to the organization’s assets associated with information systems and services.

789 790

Where appropriate, responsibilities contained within the terms and conditions of employment should continue for a defined period after the end of the employment (see also 8.3).

791

IACS-specific implementation guidance

792 793

Facilities should clarify and state the responsibilities for maintaining IACS availability, plant protection, plant operations (even if in a degraded mode), and time -critical system response.

794

Other Information

795 796 797 798 799 800

A code of conduct may be used to cover the employee’s, contractor’s or third party user’s responsibilities regarding confidentiality, data protection, ethics, appropriate use of the organization’s equipment and facilities, as well as reputable practices expected by the organization. The contractor or third party users may be associated with an external organization that may in turn be required to enter in contractual arrangements on behalf of the contracted individual.

801

8.2 During Employment

802 803 804 805

Objective: To ensure that employees, contractors and third party users are aware of information security threats and concerns, their responsibilities and liabilities, and are equipped to support organizational security policy in the course of their normal work, and to reduce the risk of human error.

806 807

Management responsibilities should be defined to ensure that security is applied throughout an individual’s employment within the organization.

808 809 810 811

An adequate level of awareness, education, and training in security procedures and the correct use of information processing facilities should be provided to all employees, contractors and third party users to minimize possible security risks. A formal disciplinary process for handling security breaches should be established.

812

8.2.1

813

Control

814 815

Management should require employees, contractors and third party users to apply security in accordance with established policies and procedures of the organization.

816

Implementation guidance

817 818

Management responsibilities should include ensuring that employees, contractor s and third party users:

819 820

a) are properly briefed on their information security roles and responsibilities prior to being granted access to sensitive information or information systems;

821

b) are provided with guidelines to state security expectations of their role within the organization;

822

c) are motivated to fulfil the security policies of the organization;

823 824

d) achieve a level of awareness on security relevant to their roles and responsibilities within the organization (see also 8.2.2);

Management responsibilities

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

ISA‑62443-2-2, D1E4, April 2013

– 28 –

ISA99, WG02, TG02

825 826

e) conform to the terms and conditions of employment, which includes the organization’s information security policy and appropriate methods of working;

827

f)

continue to have the appropriate skills and qualifications.

829

IACS-specific implementation guidance

830 831

Management should ensure that individuals responsible for operating and maintaining IACS are included in the above mentioned activities

832

Other Information

833 834 835

If employees, contractors and third party users are not made aware of their security responsibilities, they can cause considerable damage to an organization. Motivated personnel are likely to be more reliable and cause less information security incidents.

836 837 838

Poor management may cause personnel to feel undervalued resulting in a negative security impact to the organization. For example, poor management may lead to security being neglected or potential misuse of the organization’s assets.

839

Requirement:

840

Foundational Requirement:

841

Rationale/Supplemental Guidance:

842

Requirement Enhancements:

843

8.2.2

Information security awareness, education, and training

844

Control

845 846 847

All employees of the organization and, where relevant, contractors and third party users should receive appropriate awareness training and regular updates in organizational policies and procedures, as relevant for their job function.

848

Implementation guidance

849 850 851

Awareness training should commence with a formal induction process designed to introduce the organization’s security policies and expectations before access to information or services is granted.

852 853 854

Ongoing training should include security requirements, legal responsibilities and business controls, as well as training in the correct use of information processing facilities e.g. log -on procedure, use of software packages and information on the disciplinary process (see 8.2.3).

855

IACS-specific implementation guidance

856 857 858

Individuals responsible for operating and maintaining IACS should be included in the above mentioned activities and, where necessary, specific training should be developed for individuals in these roles.

859

Other Information

860 861 862 863

The security awareness, education, and training activities should be suitable and relevant to the person’s role, responsibilities and skills, and should include information on known threats, who to contact for further security advice and the proper channels for reporting inf ormation security incidents (see also 13.1).

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

828

ISA‑62443-2-2, D1E4, April 2013

– 29 –

ISA99, WG02, TG02

864 865

Training to enhance awareness is intended to allow individuals to recognize information security problems and incidents, and respond according to the needs of their work role.

866

8.2.3

867

The control objective and the contents from ISO/IEC 27002 clause 8.2.3 apply.

868

8.3 Termination or Change of Employment

869 870

Objective: To ensure that employees, contractors and third party users exit an organization or change employment in an orderly manner.

871 872 873

Responsibilities should be in place to ensure an employee’s, contractor’s or third party user’s exit from the organization is managed, and that the return of all equipment and the removal of all access rights are completed.

874 875 876

Change of responsibilities and employments within an organization should be managed as the termination of the respective responsibility or employment in line with this section, and any new employments should be managed as described in section 8.1.

877

8.3.1

878

The control objective and the contents from ISO/IEC 27002 clause 8.3 .1 apply.

879

8.3.2

880

The control objective and the contents from ISO/IEC 27002 clause 8.3.2 apply.

881

8.3.3

882

Control

883 884 885

The access rights of all employees, contractors and third party users to information and information processing facilities should be removed upon termination of their employment, contract or agreement, or adjusted upon change.

886

Implementation guidance

887 888 889 890 891 892 893 894 895

Upon termination, the access rights of an individual to assets associ ated with information systems and services should be reconsidered. This will determine whether it is necessary to remove access rights. Changes of an employment should be reflected in removal of all access rights that were not approved for the new employment. The access rights that should be removed or adapted include physical and logical access, keys, identification cards, information processing facilities (see also 11.2.4), subscriptions, and removal from any documentation that identifies them as a current member of the organization. If a departing employee, contractor or third party user has known passwords for accounts remaining active, these should be changed upon termination or change of employment, contract or agreement.

896 897 898

Access rights for information assets and information processing facilities should be reduced or removed before the employment terminates or changes, depending on the evaluation of risk factors such as:

899 900

a) whether the termination or change is initiated by the employee, contractor or third party user, or by management and the reason of termination;

Termination responsibilities

Return of assets

Removal of access rights

901

f)

the current responsibilities of the employee, contractor or any other user;

902

g) the value of the assets currently accessible.

903 904

IACS-specific implementation guidance

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

Disciplinary process

– 30 –

ISA99, WG02, TG02

905 906

Other risk factors to be considered when reducing or removing access rights should include risks associated with disruption to IACS availability, plant protection, and plant operations.

907

Other Information

908 909 910 911 912

In certain circumstances access rights may be allocated on the basis of being available to more people than the departing employee, contractor or third party user, e.g. group IDs. In such circumstances, departing individuals should be removed from any group access lists and arrangements should be made to advise all other employees, contractors and third party users involved to no longer share this information with the person departing.

913 914 915

In cases of management-initiated termination, disgruntled employees, contractors or third party users may deliberately corrupt information or sabotage information processing facilities. In cases of persons resigning, they may be tempted to collect information for future use.

916 917

9

918

9.1

Physical and Environmental Security Introduction

919 920

9.2 Secure Areas

921

9.2.1

922

{Requirement} Requirement:

923 924

Foundational Requirement:

925

Rationale/Supplemental Guidance:

926

Requirement Enhancements:

927 928

9.3 Equipment Security

929

9.3.1

Physical Access Authorizations

930

Requirement:

931 932 933 934 935

The organization shall develop and keeps current a list of personnel with authorized access to the facility where the IACS resides ( except for those areas within the facility officially designated as publicly accessible) and issues assigns appropriate authorization credentials. Designated officials within the organization review and approve the access list and authorization credentials [Assignment: organization-defined frequency].

936

Foundational Requirement:

937 938 939 940

Rationale/Supplemental Guidance: Appropriate authorization credentials include, for example, badges, identification cards, smart cards, key pads codes or biometric attributes. The organization promptly removes from the access list personnel no longer requiring access to the facility where the IACS resides.

941

Requirement Enhancements:

942 943

(1) Authorized access shall be adjusted for assignments in restricted areas or for personnel dismissal.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

– 31 –

ISA‑62443-2-2, D1E4, April 2013 9.3.2

Physical Access Control

945

Requirement:

946 947 948 949 950 951

The organization shall control all physical access points (including designated entry/exit points) to the facility where the IACS resides (except for those areas within the facility officially designated as publicly accessible) and verifies individual access authorizations before granting access to the facility. The organization controls access to areas officially designated as publicly accessible, as appropriate, in accordance with the organization’s assessment of risk.

952

Foundational Requirement:

953 954 955 956 957 958 959 960 961 962 963 964

Rationale/Supplemental Guidance: The organization uses physical access devices (e.g., keys, locks, combinations, card readers) and/or guards to control entry to facilities containing IACS. The organization secures keys, combinations, and other access devices and inventories those devices regularly. The organization changes combinations and keys: (i) periodically; and (ii) when keys are lost, combinations are compromised, or individuals are transferred or terminated. Workstations and associated peripherals connected to (and part of) an organizational IACS may be located in areas designated as publicly accessible with access to such devices being appropriately controlled. The organization considers IACS safety and security interdependencies. The organization considers access requirements in emergency situations. During an emergency-related event, the organization may restrict access to IACS facilities and assets to authorized individuals only.

965

Requirement Enhancements:

966 967 968

(1) The organization controls physical access to the IACS independent of the physical access controls for the facility. Identity verification is required for entry to the most secured IACS spaces.

969 970 971 972 973 974 975 976 977 978

Rationale/Supplemental Guidance: This requirement enhancement, in general, applies to server rooms, communications centers, telecom munication spaces, control rooms, instrument rack rooms, remote control rooms or any other areas within a facility containing large concentrations of IACS components or components with a higher impact level than that of the majority of the facility. The intent is to provide an additional layer of physical security for those areas where the organization may be more vulnerable due to the concentration of IACS components or the impact level of the components. The requirement enhancement is not intended to apply to workstations or peripheral devices that are typically dispersed throughout the facility and used routinely by organizational personnel.

979

FR1 Access Control

9.3.3 Access Control for Communication Medium

980

Requirement:

981 982

The organization shall control physical access to IACS distr ibution and communication lines within local organizational facilities.

983

Foundational Requirement:

984 985 986 987 988 989 990

Rationale/Supplemental Guidance: Physical protections applied to IACS distribution and communication lines help prevent accidental damage, disruption, and ph ysical tampering. Additionally, physical protections are necessary to help prevent eavesdropping or in transit modification of unencrypted communications. Protective measures to control physical access to IACS distribution and communication lines include : (i) including endpoints or any access point contained in locked wiring closets; (ii) disconnected or locked spare jacks; and/or (iii) protection of cabling by conduit or cable trays.

991

Requirement Enhancements: None.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

944

ISA99, WG02, TG02

ISA‑62443-2-2, D1E4, April 2013

ISA99, WG02, TG02

9.3.4 Access Control for Display Medium

993

Requirement:

994 995

The organization shall control physical access to IACS devices that display information to prevent unauthorized individuals from observing the display output.

996

Foundational Requirement:

997

Rationale/Supplemental Guidance: None.

998

Requirement Enhancements:

999 1000 1001

(1) Access displays shall be placed in such a manner to prevent others from viewing the display of clear text access information. 9.3.5 Monitoring Physical Access

1002

Requirement:

1003 1004

The organization shall monitor physical access to the IACS to detect and respond to physical security incidents.

1005

Foundational Requirement:

1006 1007 1008 1009

Rationale/Supplemental Guidance: The organization reviews physical access logs periodically and investigates apparent security violations or s uspicious physical access activities. Response to detected physical security incidents is part of the organization’s incident response capability.

1010

Requirement Enhancements:

1011 1012

(1) The organization monitors real-time physical intrusion alarms and surveillance equipment.

1013 1014

(2) The organization employs automated mechanisms to r ecognize potential intrusions and initiate appropriate response actions.

1015

9.3.6 Visitor Control

1016

Requirement:

1017 1018 1019

The organization shall control physical access to the IACS by authenticating visitors before authorizing access to the facility where the IACS resides oth er than areas designated as publicly accessible.

1020

Foundational Requirement:

1021 1022

Rationale/Supplemental Guidance: Personnel without permanent authorization or permanent duties, including physical access to an IACS, are considered a visitor.

1023

Requirement Enhancements:

1024

(1) The organization escorts visitors and monitors visitor activity.

1025

9.3.7 Access Records

1026

Requirement:

1027 1028 1029 1030 1031 1032

The organization shall maintain visitor access records to the facility where the IACS resides (except for those areas within the facility officially designated as publicly accessible).The detailed contents of these records are to be defined by the asset owner and their respective security policy. Designated officials within the organization review the visitor access records [Assignment: organization-defined frequency] and maintain those records for [Assignment: organization-defined periodicity]. .

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

992

– 32 –

– 33 –

ISA99, WG02, TG02

1033

Foundational Requirement:

1034 1035 1036 1037 1038

Rationale/Supplemental Guidance: These logs are intended to support forensic investigation. Useful attributes would include: (i) name and organization of the person visiting; (ii) signature of the visitor; (iii) form of identification; (iv) date of access; (v) time of entry and departure; (vi) purpose of visit; and (vii) name and organization of person visited..

1039

Requirement Enhancements:

1040 1041

(1) The organization employs automated mechanisms to facilitate the maintenance and review of access records.

1042 1043

(2) The organization maintains a record of all physical access, both visitor and authorized individuals.

1044

10 Communications and Operations Management

1045

10.1

Introduction

1046 1047

10.2 Operational Procedures and Responsibilities

1048

10.2.1 Automated Marking

1049

Requirement:

1050 1051

The IACS shall mark output using standard naming conventions to identify any special dissemination, handling, or distribution instructions .

1052

Foundational Requirement:

1053 1054

Rationale/Supplemental Guidance: Automated marking refers to markings employed on external media (e.g., hardcopy documents output from the IACS).

1055

Requirement Enhancements: None.

1056

10.3 Third Party Service Delivery Management

1057

10.3.1

1058

{Requirement} Requirement:

1059 1060

Foundational Requirement:

1061

Rationale/Supplemental Guidance:

1062

Requirement Enhancements:

1063 1064

10.4 System planning and acceptance

1065

10.4.1

1066

{Requirement} Requirement:

1067 1068

Foundational Requirement:

1069

Rationale/Supplemental Guidance:

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

ISA‑62443-2-2, D1E4, April 2013 1070

– 34 –

ISA99, WG02, TG02

Requirement Enhancements:

1071 1072

10.5 Protection against malicious and mobile code

1073

10.5.1 Malicious Code Protection

1075 1076 1077

Requirement: The organization updates malicious code protection mechanisms (including the latest virus definitions) whenever new releases are available in accordance with organizationa l configuration management policy and procedures.

1078

Foundational Requirement:

1079 1080 1081 1082 1083 1084 1085 1086 1087 1088

Rationale/Supplemental Guidance: The organization considers using malicious code protection software products from multiple vendors (e.g., using one vendor for boundary devices and servers and another vendor for workstations). The organization also considers the receipt of false positives during malicious code detection and eradication and the resulting potential affect on the availability of the IACS. Updates are scheduled to occur during planned IACS outages. The organization considers IACS vendor recommendations for malicious code protection. To reduce malicious code, organizations remove the functions and services that should not be employed on the IACS (e.g., Voice Over Internet Protocol, Instant Messaging, File Transfer Protocol, Hyper Text Transfer Protocol, electronic mail, file sharing).

1089

Requirement Enhancements: None.

1090

10.5.2 Security Alerts and Advisories

1091 1092 1093

Requirement: The organization shall receive IACS security alerts/advisories on a regular basis, issues alerts/advisories to appropriate personnel, and takes appropriate actions in response.

1094

Foundational Requirement:

1095 1096 1097 1098 1099 1100

Rationale/Supplemental Guidance: The organization documents the types of actions to be taken in response to security alerts/advisories. The organization also maintains contact with special interest groups (e.g., inform ation security forums) that: (i) facilitate sharing of security-related information (e.g., threats, vulnerabilities, and latest security technologies); (ii) provide access to advice from security professionals; and (iii) improve knowledge of security best practices.

1101

Requirement Enhancements:

1102 1103

(1) The organization employs automated mechanisms to make security alert and advisory information available throughout the organization as needed.

1104

10.6 Backup

1105

10.6.1

1106

{Requirement} Requirement:

1107 1108

Foundational Requirement:

1109

Rationale/Supplemental Guidance:

1110

Requirement Enhancements:

1111

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

1074

ISA‑62443-2-2, D1E4, April 2013 1112

10.7 Network Security Management

1113

10.7.1

1114

– 35 –

ISA99, WG02, TG02

{Requirement} Requirement:

1116

Foundational Requirement:

1117

Rationale/Supplemental Guidance:

1118

Requirement Enhancements:

1119 1120

10.8 Media Handling

1121

10.8.1 Media Protection Policy and Procedures

1122

Requirement:

1123 1124 1125 1126 1127

The organization shall develop, disseminate, and periodically reviews/updates: (i) a formal, documented, media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the media protection policy and associated media protection requirements.

1128

Foundational Requirement:

1129 1130 1131 1132 1133

Rationale/Supplemental Guidance: The media protection policy and procedures are consistent with applicable laws, directives, policies, regulations, standards, and guidance. The media protection policy can be included as part of the general information security policy for the organization. Media protection procedures can be developed for the security program in general, and for a particular IACS, when required.

1134

Requirement Enhancements: None.

1135 1136

10.8.2 Media Access

1137

Requirement:

1138

The organization shall restrict access to IACS media to authorized individuals.

1139

Foundational Requirement:

1140 1141 1142 1143 1144 1145

Rationale/Supplemental Guidance: IACS media includes both digital media (e.g., diskettes, magnetic tapes, external/removable hard drives, flash/thumb drives, compact disks, digital video disks) and non-digital media (e.g., paper, microfilm). This requirement also applies to portable and mobile computing and communications devices with information storage capability (e.g., notebook computers, personal digital assistants, cellular telephones).

1146 1147 1148 1149 1150 1151 1152 1153 1154

An organizational assessment of risk guides the sel ection of media and associated information contained on that media requiring restricted access. Organizations document in policy and procedures, the media requiring restricted access, individuals authorized to access the media, and the specific measures t aken to restrict access. The rigor with 𝑡𝑎𝑟𝑔𝑒𝑡 which this requirement is applied is commensurate with the 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 categorization of the information contained on the media. For example, fewer protection measures are needed for media containing information determined by the organization to be in the public domain, to be publicly releasable, or to have limited or no adverse impact on the organization or individuals if accessed by other than authorized personnel. In these

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

1115

– 36 –

ISA99, WG02, TG02

1155 1156

situations, it is assumed that the physical access requirements where the media resides provide adequate protection.

1157

Requirement Enhancements:

1158 1159

(1) The organization employs automated mechanisms to restrict access to media storage areas and to audit access attempts and access granted.

1160 1161 1162 1163 1164 1165

Foundational Requirement: Rationale/Supplemental Guidance: This requirement enhancement is primarily applicable to designated media storage areas within an organization where a significant volume of media is stored and is not intended to apply to every lo cation where some media is stored (e.g., in individual offices).

1166

10.8.3 Media Labeling

1167

Requirement:

1168 1169 1170 1171 1172

The organization shall: (i) affix external labels to removable IACS media and IACS output indicating the distribution limitations, handling caveats and applicable security markings (if any) of the information; and (ii) exempt [Assignment: organization-defined list of media types or hardware components] from labeling so long as they remain within [ Assignment: organization-defined protected environment].

1173

Foundational Requirement:

1174 1175 1176 1177 1178

Rationale/Supplemental Guidance: An organizational assessment of selection of media requiring labeling. Organizations document in policy the media requiring labeling and the specific measures taken to afford The rigor with which this requirement is applied is commensurate categorization of the information contained on the media.

1179

Requirement Enhancements: None.

1180

risk guides the and procedures, such protection. 𝑡𝑎𝑟𝑔𝑒𝑡 with the 𝑆𝑠𝑦𝑠𝑡𝑒𝑚

10.8.4 Media Storage

1181

Requirement:

1182 1183

The organization shall physically control and securely store IACS media within controlled areas.

1184

Foundational Requirement:

1185 1186 1187 1188 1189 1190

Rationale/Supplemental Guidance: IACS media includes both digital media (e.g., diskettes, magnetic tapes, external/removable hard drives, flash/thumb drives, compact disks, digital video disks) and non-digital media (e.g., paper, microfilm). A controlled area is any area or space for which the organization has confidence that the physical and procedural protections provided are sufficient to meet the requirements established for protecting the information and/or IACS.

1191 1192 1193

This requirement applies to portable and mobile computing and communications devices with information storage capability (e.g., notebook computers, personal digital assistants, cellular telephones, telephone systems (voicemail only)).

1194 1195 1196 1197 1198 1199 1200

Organizations document in policy and procedures, the media requiring physical protection and the specific measures taken to afford such protection. The rigor with which this 𝑡𝑎𝑟𝑔𝑒𝑡 requirement is applied is commensurate with the 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 categorization of the information contained on the media. For example, fewer protection measures are needed for media containing information determined by the organization to have limited or no adverse impact on the organization or individuals if accessed by non -authorized personnel. The assumption is that the physical access controls to the facility where the media resides

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

– 37 –

ISA99, WG02, TG02

1201 1202 1203

provide adequate protection. The organization protects IACS media identified by the organization until the media are destroyed or sanitized using approved equipment, techniques, and procedures.

1204 1205 1206 1207 1208

As part of a defense-in-depth protection strategy, the organization considers routinely encrypting data at rest on selected secondary storage device s. The organization implements effective cryptographic key management in support of secondary storage encryption and provides protections to maintain the availability of the information in the event of the loss of cryptographic keys by IACS users.

1209

Requirement Enhancements: None.

1210

10.8.5 Media Transport

1211

Requirement:

1212 1213 1214

The organization shall protect and control IACS media during transport outside of controlled areas and restricts the activities associated with transport of such media to authorized personnel.

1215

Foundational Requirement:

1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238

Rationale/Supplemental Guidance: IACS media includes both digital media (e.g., diskettes, tapes, removable hard drives, flash/thumb drives, compact disks, digital video disks) and non-digital media (e.g., paper, microfilm). A c ontrolled area is any area or space for which the organization has confidence that the physical and procedural protections provided are sufficient to meet the requirements established for protecting the information and/or IACS. This requirement also applies to portable and mobile computing and communications devices with information storage capability (e.g., notebook computers, personal digital assistants, cellular telephones) that are transported outside of controlled areas. Telephone systems are also co nsidered IACS and may have the capability to store information on internal media (e.g., on voicemail systems). Since telephone systems do not have, in most cases, the identification, authentication, and access control mechanisms typically employed in othe r IACS, organizational personnel exercise extreme caution in the types of information stored on telephone voicemail systems that are transported outside of controlled areas. An organizational assessment of risk guides the selection of media and associated information contained on that media requiring protection during transport. Organizations document in policy and procedures, the media requiring protection during transport and the specific measures taken to protect such transported media. The rigor with which this requirement is applied is 𝑡𝑎𝑟𝑔𝑒𝑡 commensurate with the 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 categorization of the information contained on the media. An organizational assessment of risk also guides the selection and use of appropriate storage containers for transporting non-digital media. Authorized transport and courier personnel may include individuals from outside the organization (e.g., U.S. Postal Service or a commercial transport or delivery service).

1239

Requirement Enhancements:

1240 1241 1242

(1) The organization protects digital and non-digital media during transport outside of controlled areas using [Assignment: organization-defined security measures, e.g., locked container, cryptography].

1243 1244 1245 1246 1247 1248

Rationale/Supplemental Guidance: Physical and technical security measures for the protection of digital and non-digital media are approved by the organization, 𝑡𝑎𝑟𝑔𝑒𝑡 commensurate with the 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 categorization of the information residing on the media, and consistent with applicable laws, directives, policies, regulations, standards, and guidance. Cryptographic mechanisms can provide confidentiality and/or integrity protections depending upon the mechanisms used.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

– 38 –

ISA99, WG02, TG02

1249 1250

(2) The organization documents, where appropriate, activities associated with the transport of IACS media using [Assignment: organization-defined system of records].

1251 1252 1253

Rationale/Supplemental Guidance: Organizations establish documentation requirements for activities associated with the transport of IACS media in accordance with the organizational assessment of risk.

1254

(3) The organization employs an identified custodian at all times to transport IACS media.

1255 1256 1257

Rationale/Supplemental Guidance: Organizations establish documentation requirements for activities associated with the transport of IACS media in accordance with the organizational assessment of risk.

1258

10.8.6 Media Sanitization and Disposal

1259

Requirement:

1260 1261

The organization shall sanitize IACS media, both digital and non-digital, prior to disposal or release for reuse.

1262

Foundational Requirement:

1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273

Rationale/Supplemental Guidance: Sanitization is the process used to remove information from IACS media such that there is reasonable assurance, in proporti on to the confidentiality of the information, that the information cannot be retrieved or reconstructed. Sanitization techniques, including clearing, purging, and destroying media information, prevent the disclosure of organizational information to unauth orized individuals when such media is reused or disposed. The organization uses its discretion on sanitization techniques and procedures for media containing information deemed to be in the public domain or publicly releasable, or deemed to have no advers e impact on the organization or individuals if released for reuse or disposed. The National Security Agency provides media sanitization guidance and maintains a listing of approved sanitization products at http://www.nsa.gov/ia/government/mdg.cfm .

1274

Requirement Enhancements:

1275 1276

(1) The organization tracks, documents, and verifies media sanitization and disposal actions.

1277 1278

(2) The organization periodically tests sanitization equipment and procedures to verify correct performance.

1279

10.8.7 Access Control for Display Medium

1280

Requirement:

1281 1282

The organization shall control physical access to IACS devices that display information to prevent unauthorized individuals from observing the display output.

1283

Foundational Requirement:

1284

Rationale/Supplemental Guidance: None.

1285 1286 1287

Requirement Enhancements: None.

1288

10.8.8 Public Key Infrastructure Certificates

1289

Requirement:

1290 1291

Where public key cryptography is utilized, the organization shall determine what appropriate interfaces are required with existing public key infrastructure under an

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

– 39 –

ISA99, WG02, TG02

1292 1293

appropriate certificate policy or obtains public key certificates under an appropriate certificate policy from an approved service provider.

1294

Foundational Requirement:

1295 1296 1297 1298

Rationale/Supplemental Guidance: Registration to receive a public key certificate needs to include authorization by a supervisor or a responsible official and needs to be accomplished using a secure process that verifies the identity of the certificate holder and ensures that the certificate is issued to the intended party.

1299

Requirement Enhancements: None.

1300

10.9 Exchange of Information

1301

10.9.1

1302

{Requirement} Requirement:

1303 1304

Foundational Requirement:

1305

Rationale/Supplemental Guidance:

1306

Requirement Enhancements:

1307 1308

10.10 Electronic Commerce Services

1309

10.10.1 {Requirement}

1310

Requirement:

1311 1312

Foundational Requirement:

1313

Rationale/Supplemental Guidance:

1314

Requirement Enhancements:

1315 1316

10.11 Monitoring

1317

10.11.1 Audit and Accountability Policy and Procedures

1318

Requirement:

1319 1320 1321 1322 1323

The organization shall develop, disseminate, and periodically reviews/updates: (i) a formal, documented, audit and accountability policy that addresses purpos e, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the audit and accountability policy and associated audit and ac countability controls.

1324

Foundational Requirement:

1325 1326 1327 1328 1329 1330

Rationale/Supplemental Guidance: The audit and accountability policy and procedures are consistent with applicable laws, directives, policies, regulations, standards, and guidance. The audit and accountability policy can be included as part of the general information security policy for the organization. Audit and accountability procedures can be developed for the security program in general, and for a particular IACS, when required. The parameters to be monitored are a local matter. Of those parameters it is

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

ISA‑62443-2-2, D1E4, April 2013

– 40 –

ISA99, WG02, TG02

1331 1332

strongly recommended to consider false-positives (e.g. how many times did an authorized entity get hindered or prevented from performing its function ).

1333

Requirement Enhancements: None.

1335 1336 1337

10.11.2 Auditable Events Requirement: The organization periodically reviews and updates the list of orga nization-defined auditable events.

1338

Foundational Requirement:

1339 1340 1341 1342 1343 1344 1345

Rationale/Supplemental Guidance: The purpose of this requirement is to identify important events which need to be audited as significant and relevant to the security of the IACS. The security audit function is usually coordinated with the network health and status monitoring function which may be in a different zone. Commonly recognized and accepted checklists and configuration guides should be considered when compiling a list of auditable events. The organization defines auditable events that are adequate to support after-the-fact investigations of security incidents.

1346

Requirement Enhancements: None.

1347

10.11.3 Audit Monitoring, Analysis and Reporting

1348

Requirement:

1349 1350 1351

The organization shall regularly review/analyze IACS audit records for indications of inappropriate or unusual activity, investigates suspicious activity or suspected violations, reports findings to appropriate officials, and takes necessary actions.

1352

Foundational Requirement:

1353 1354 1355 1356

Rationale/Supplemental Guidance: Organizations increase the level of audit monitoring and analysis activity within the IACS whenever there is an indication of increased risk to organizational operations, organizational assets, or individuals based on law enforcement information, intelligence information, or other credible sources of information.

1357

Requirement Enhancements:

1358 1359 1360

(1) The organization employs automated mechanisms to integrate audit monitoring, analysis, and reporting into an overall process for investigation and res ponse to suspicious activities.

1361 1362 1363 1364

(2) The organization employs automated mechanisms to alert security personnel of the following inappropriate or unusual activities with security implications: [ Assignment: organization-defined list of inappropriate or unusual ac tivities that are to result in alerts].

1365

10.11.4 Audit Record Retention

1366

Requirement:

1367 1368 1369

The organization shall retain audit records for [Assignment: organization-defined time period] to provide support for after-the-fact investigations of security incidents and to meet regulatory and organizational information retention requirements.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

1334

– 41 –

ISA99, WG02, TG02

1370

Foundational Requirement:

1371 1372 1373

Rationale/Supplemental Guidance: The organization retains audit records until it is determined that they are no longer needed for administrative, legal, audit , or other operational purposes.

1374

Requirement Enhancements: None.

1375

11 Access Control

1376

11.1

Introduction

1377 1378

11.2 Business Requirement

1379

11.2.1 Access Control Policy and Procedures

1380

Requirement:

1381 1382 1383 1384 1385

The organization shall develop, disseminate, and periodically reviews/updates: (i) a formal, documented, access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the access control policy and associated access controls.

1386

Foundational Requirement:

1387 1388 1389 1390 1391 1392

Rationale/Supplemental Guidance: The access control policy and procedures are consistent with applicable laws, directives, policies, regulations, standards, and guidance and in alignment with the security requirements of the IACS(s). The access control policy can be included as part of the general information security policy for the organization. Access control procedures can be developed for the security program in gener al, and for a particular IACS, when required.

1393

Requirement Enhancements: None.

1394

11.2.2 System and Information Integrity Policy and Procedures

1395

Requirement:

1396 1397 1398 1399 1400 1401

The organization shall develop, disseminate, and periodically reviews/updates: (i) a formal, documented, system and information integrity policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the s ystem and information integrity policy and associated system and information integrity requirements.

1402

Foundational Requirement:

1403 1404 1405 1406 1407 1408

Rationale/Supplemental Guidance: The system and information integrity policy and procedures are consistent with applicable laws, directives, policies, regulations, standards, and guidance. The system and information integrity policy can be included as part of the general information security policy for the organization. System and information integrity procedures can be developed for the security program in general, and for a particular IACS, when required.

1409

Requirement Enhancements: None.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

ISA‑62443-2-2, D1E4, April 2013

ISA99, WG02, TG02

11.2.3 Flaw Remediation

1411

Requirement:

1412

The organization shall identify, report, and correct IACS flaws.

1413

Foundational Requirement:

1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424

Rationale/Supplemental Guidance: The organization identifies IACS containing software affected by recently announced software flaws (and potential vulnerabilities resulting from those flaws). The organization (or the software developer/vendor in the case of software developed and maintained by a vendor/contractor) promptly installs newly released security relevant patches, service packs, and hot fixes, and tests patches, service packs, and hot fixes for effectiveness and potential side effects on the organization’s IACS before installation. Flaws discovered during security assessments, continuous monitoring, incident response activities, or IACS error handling are also addressed expeditiously. Flaw remediation is incorporated into configuration management as an emergency change. The flaw remediation process shall be consistent with certification, safety and regulatory testing requirements.

1425

Requirement Enhancements:

1426 1427

(1) The organization centrally manages the flaw remediation process and installs updates automatically.

1428 1429 1430

(2) The organization employs automated mechanisms to periodically and upon demand determine the state of IACS components with regard to flaw remediation.

1431

11.3 User Access Management

1432

11.3.1 Account Management

1433

Foundational Requirement:

1434

Requirement:

1435 1436

The organization reviews accounts [Assignment: organization-defined frequency, at least annually]. A history of account changes shall be maintained if only manually.

1437

Foundational Requirement:

1438 1439 1440 1441 1442 1443 1444

Rationale/Supplemental Guidance: Account management might include (i.e., individual, role, and system, device-based, and system), establishment of conditions for group membership, and assignment of associated authorizations. In certain IACS instances, where the organization has determined that individual accounts are unnecessary from a risk-analysis and/or regulatory aspect, shared accounts are acceptable as long as adequate compensating controls (such as limited physical access) are in place and documented.

1445 1446 1447

Non-user accounts (sometimes termed service accounts) that are utilized for process -toprocess communication (for example, an HMI connecting to a database) typically requires different security policies from human user accounts.

1448 1449

The organization identifies authorized users of the IACS and specifies access rights/privileges. The organization grants access to the IACS based on:

1450 1451

(i)

a valid need-to-know/need-to-share that is determined by assigned official duties and satisfying all functional and security criteria; and

1452 1453

(ii)

Intended system usage. The organization requires proper identification for requests to establish accounts and approves all such requests.

1454 1455

(iii)

The organization specifically authorizes and monitors the use of guest/anonymous accounts and removes, disables, or otherwise secures

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

1410

– 42 –

ISA‑62443-2-2, D1E4, April 2013

ISA99, WG02, TG02

unnecessary accounts. Account managers are notified when IACS users are terminated or transferred and associated accounts are removed, disabled, or otherwise secured.

1459 1460 1461 1462 1463

(iv)

Account managers are also notified when users’ IACS usage or need -toknow/need-to-share changes. In cases where accounts are role-based, i.e., the workstation, hardware, and/or field devices define a user role, access to the IACS includes physical security policies and procedures based on organization risk assessment.

1464 1465 1466 1467 1468 1469

(v)

In cases where physical access to the workstation, hardware, and/or field devices predefine privileges, the organization implements physical security policies, and procedures based on organization risk assessment. Account management may include additional account types (e.g., role-based, device-based, attribute-based). The organization removes, changes, disables, or otherwise secures default accounts.

1470

Requirement Enhancements:

1471 1472 1473

(1) The organization has policies and procedures to terminate guest or temporary accounts after [Assignment: organization-defined time period for each type of account].

1474 1475

(2) The organization has policies and procedures to disable inactive accounts after [Assignment: organization-defined time period].

1476 1477

(3) The organization employs mechanisms to audit account creation, Modification, disabling, and termination actions and to notify, as required, appropriate individuals.

1478

11.3.2 Separation of Duties

1479

Foundational Requirement:

1480

Requirement:

1481 1482

When assigning permissions and/or roles to users, the organization shall obey the separation of duties as outlined in their security policy.

1483

Foundational Requirement:

1484 1485 1486

Rationale/Supplemental Guidance: The organization establishes appropriate divisions of responsibility and separates duties as needed to eliminate conflicts of interest in the responsibilities and duties of individuals. Examples of separation of duties incl ude:

1487 1488

(i)

mission functions and distinct IACS support functions are divided among different individuals/roles

1489 1490 1491

(ii)

different individuals perform IACS support functions (e.g., system management, systems programming, quality assurance/testing, configuration management, and network security)

1492 1493

(iii)

security personnel who administer access control functions do not administer audit functions

1494 1495

Requirement Enhancements: None. (4)

1496

11.4 User Responsibilities

1497

11.4.1

1498

{Requirement} Requirement:

1499 1500

Foundational Requirement:

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

1456 1457 1458

– 43 –

ISA‑62443-2-2, D1E4, April 2013 1501

Rationale/Supplemental Guidance:

1502

Requirement Enhancements:

– 44 –

ISA99, WG02, TG02

1504

11.5 Network Access Control

1505

11.5.1 Least Privilege

1506

Foundational Requirement:

1507

Requirement:

1508 1509 1510

The organization shall enforce set of rights/privileges or accesses as required by ISA 99.02.xx needed by asset owner (or processes acting on behalf of asset owners) for the performance of specified tasks.

1511

Foundational Requirement:

1512 1513 1514 1515

Rationale/Supplemental Guidance: The organization employs the concept of least privilege for specific duties and IACS (zones and conduits) in accordance with risk assessments as necessary to adequately mitigate risk to organizational operations, organizational assets, and individuals.

1516

Requirement Enhancements: None.

1517

11.5.2 Permitted Actions Without Identification or Authentication

1518

Foundational Requirement:

1519

Requirement:

1520 1521 1522

The organization shall identify and document (log) specific IACS user actions that can be performed on the IACS without additional identification or authentication, if and only if prior identification and authentication have already occurred.

1523

Foundational Requirement:

1524 1525 1526

Rationale/Supplemental Guidance: The organization may allow limited IACS user activity without identification and authentication for corrective actions (e.g., emergency). The intent is to prevent repeated unnecessary identification and/or authe ntication.

1527

Requirement Enhancements:

1528 1529

(1) The organization permits actions to be performed without identification and authentication only to the extent necessary to accomplish mission objectives.

1530 1531

11.5.3 Remote Access

1532

Foundational Requirement:

1533

Requirement:

1534

The organization shall authorize all methods of remote access to the IACS.

1535

Foundational Requirement:

1536 1537 1538 1539 1540

Rationale/Supplemental Guidance: Remote access is any access to an IACS by an IACS user (human user, process, or device) communicating through an external, no norganization-controlled network (e.g., the Internet). Examples of remote access methods include dial-up, broadband, and wireless. Remote access to IACS component locations (e.g., control center, field locations) is only enabled when approved by the org anization.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

1503

ISA‑62443-2-2, D1E4, April 2013

– 45 –

ISA99, WG02, TG02

1541

Requirement Enhancements:

1542 1543

(1) The organization controls all remote accesses through a limited number of managed access control points.

1544 1545 1546

(2) The organization permits remote access for privileged functions only for compelling operational needs and documents the rationale for such access in the security plan for the IACS. 11.5.4 Use of External Information Systems

1548

Foundational Requirement:

1549

Requirement:

1550 1551 1552

The organization shall establish terms and conditions for authorized individuals to: (i) access the IACS from an external information system; and (ii) process, store, and/or transmit organization-controlled information using an external information system.

1553

Foundational Requirement:

1554 1555 1556 1557 1558 1559 1560 1561

Rationale/Supplemental Guidance: External information systems are information systems or components of information systems that are outside of the accreditation boundary established by the organization and for which the organization typically has no direct control over the application of required security controls or the assessment of secu rity control effectiveness. External information systems include, but are not limited to, personally owned information systems (e.g., computers, cellular telephones, or personal digital assistants); privately owned computing and communications devices res ident in commercial or public facilities (e.g., hotels, convention centers, or airports).

1562 1563 1564 1565 1566 1567 1568 1569

Authorized individuals include organizational personnel, contractors, or any other individuals with authorized access to the organizational IACS. The organization establishes terms and conditions for the use of external information systems in accordance with organizational security policies and procedures. The terms and conditions address as a minimum; (i) the types of applications that can be accessed on the organizational IACS from the external information system; and (ii) the maximum 𝑐𝑎𝑝𝑎𝑏𝑙𝑒 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 category of information that can be transmitted to or processed and stored on the external information system.

1570

Requirement Enhancements:

1571 1572 1573 1574 1575 1576 1577

(1) The organization prohibits authorized individuals from using an external information system to access the IACS or to process, store, or transmit organization -controlled information except in situations where the organization: (i) can verify the employment of required security controls on the external system as specified in the organization’s information security policy and system security plan; or (ii) has approved IACS connection or processing agreements with the organizational entity hosting the external information system.

1578 1579

(2) The organization provides a domain of filtered control for access by external IACS users, and limits access only to this domain.

1580 1581

(3) The organization provides a separate domain of information for read -only or download-only access by external IACS users and limits access only to this domain.

1582

11.6 Operating System Access Control

1583

11.6.1

1584

{Requirement} Requirement:

1585 1586

Foundational Requirement:

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

1547

ISA‑62443-2-2, D1E4, April 2013 1587

Rationale/Supplemental Guidance:

1588

Requirement Enhancements:

– 46 –

ISA99, WG02, TG02

1589 1590

11.7 Application and Information Access Control

1591

11.7.1

Requirement:

1593 1594

Foundational Requirement:

1595

Rationale/Supplemental Guidance:

1596

Requirement Enhancements:

1597 1598

11.8 Mobile Computing and Teleworking

1599

11.8.1 Wireless Access Restrictions

1600

Foundational Requirement:

1601

Requirement:

1602

The organization shall produce implementation guidance for wireless technologies.

1603 1604 1605 1606 1607 1608

Foundational Requirement: Rationale/Supplemental Guidance: Wireless technologies include, but are not limited to, microwave, satellite, packet radio [UHF/VHF], 802.11x, 802.15.4 (ZigBee, WirelessHART, ISA100.11a), and Bluetooth.

1609 1610

(1) The organization shall deploy continuous passive monitoring for unauthorized wireless access points and takes appropriate action if such access points are discovered.

1611 1612 1613 1614 1615 1616 1617

Foundational Requirement: Rationale/Supplemental Guidance: At the time of publication of this document, these access points are typically based on 802.11x technology. In the future, this will change and thus other wireless technologies will need to be monitored as well. Regardless, organizations should conduct a thorough scan for unauthorized wireless access points in facilities containing high-impact IACS. The scan should involve the entire facility, not just areas containing a high -impact IACS.

1618

Requirement Enhancements:

11.8.2 Use Control for Portable and Mobile Devices

1619

Foundational Requirement:

1620

Requirement:

1621 1622

The organization shall produce implementation guidance for organization -controlled portable and mobile devices.

1623

Foundational Requirement:

1624 1625 1626

Rationale/Supplemental Guidance: Portable and mobile devices may introduce undesired network traffic, malware and/or information exposure, and thus there should be specific control associated with their usage in the typical IACS environment.

1627 1628

Portable and mobile devices (e.g., notebook c omputers, personal digital assistants, cellular telephones, and other computing and communications devices with network

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

1592

{Requirement}

– 47 –

ISA99, WG02, TG02

1629 1630 1631 1632 1633 1634 1635

connectivity are only allowed access to the IACS in accordance with organizational security policies and procedures. Security policies and procedures include device identification and authentication, implementation of mandatory protective software (e.g., malicious code detection, firewall), configuration management, scanning devices for malicious code, updating virus protection software, scanning for critical software updates and patches, conducting primary operating system (and possibly other resident software) integrity checks, and disabling unnecessary hardware (e.g., wireless, infrared).

1636 1637

Requirement Enhancements: None.

1638

11.8.3 Mobile Code

1639

Foundational Requirement:

1640

Requirement:

1641 1642

The organization shall produce implementation guidance regarding the use of mobile code technologies based on the potential to cause damage to the IACS.

1643

Foundational Requirement:

1644 1645 1646 1647 1648 1649 1650 1651

Rationale/Supplemental Guidance: Mobile code technologies include, for example, Java, JavaScript, ActiveX, PDF, Postscript, Shockwave movies, Flash animations, and VBScript. Usage restrictions and implementation guidance apply to both the selection and use of mobile code installed on servers and mobile code downloaded and executed on individual workstations. Control procedures prevent the development, acquisition, or introduction of unacceptable mobile code within the IACS. For example, mobile code exchanges might be disallowed directly with the IACS, but rather in a controlled adjacent information environment maintained by IACS personnel.

1652

Requirement Enhancements: None.

1653

11.8.4 Supervision and Review – Use Control

1654

Foundational Requirement:

1655

Requirement:

1656 1657

The organization shall supervise and review the activities of IACS users with respect to the enforcement and usage of IACS assets.

1658

Foundational Requirement:

1659 1660 1661 1662 1663 1664 1665 1666 1667

Rationale/Supplemental Guidance: The organization reviews audit records (e.g., user activity logs) for inappropriate activities in accordance wit h organizational procedures. The organization investigates any unusual IACS -related activities and periodically reviews changes to access authorizations. The organization reviews more frequently the activities of IACS users with significant IACS roles and responsibilities. The extent of the audit record reviews is based on the impact level of the IACS. For example, for low -impact systems, it is not intended that security logs be reviewed frequently for every workstation, but rather at central points such as a web proxy or email servers and when specific circumstances warrant review of other audit records.

1668 1669 1670 1671

Requirement Enhancements: (1) The organization develops a baseline of normal IACS user behavior, allowable variances and employs automated mechanisms to facilitate the review of user activities.

1672 1673

11.8.5 Identification and Authentication Policy and Procedures Foundational Requirement:

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

– 48 –

ISA99, WG02, TG02

1674

Requirement:

1675 1676 1677 1678 1679 1680

The organization shall develop, disseminate, and periodically review/update: (i) a formal, documented, identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls for IACS.

1681

Foundational Requirement:

1682 1683 1684 1685 1686 1687

Rationale/Supplemental Guidance: The organization ensures the identification and authentication policy and procedures are consistent with applicable laws, directives, policies, regulations, standards, and guidance. The identification and authentication policy can be included as part of the general security policy for the organization. Identification and authentication procedures can be developed for the security program in general, and for a particular IACS, when required.

1688 1689

Requirement Enhancements: None.

1690

11.8.6 Identifier Management

1691

Foundational Requirement:

1692

Requirement:

1693 1694 1695 1696

The organization shall manage identifiers by user, group, role, and/or system interface. An appropriate organization official or group is responsible for authorizing the issuance of user identifiers, issuing the user identifier to the intended party, and archiving user identifiers.

1697

Foundational Requirement:

1698 1699 1700 1701 1702 1703 1704 1705

Rationale/Supplemental Guidance: Identifiers are distinguished from the privileges which they permit an entity to perform within a specific IACS control domain/zone (see also 2.6, Authenticator Management). Where users function as a single group (e.g., control room operators), user identification may be role-based, group-based, or device-based. For some IACS, the capability for immediate operator interaction is critical. Local emergency actions for the IACS must not be hampered by identification requirements. Access to these systems may be restricted by appropriate compensating security mechanism s. Identifiers may be required on portions of the IACS but not necessarily the entire system.

1706 1707 1708 1709 1710 1711 1712 1713 1714 1715

For very high SAL level IACS the requirement for maximum control is increased, not decreased. Security measures that have the potential to cause loss of control in process operations are not acceptable. In these cases, to maintain the higher SAL levels, compensating measures external to the IACS (e.g. additional physical security measure s and/or enhanced personnel background checks) will be needed. In these cases, it may be possible to see a normally high SAL level IACS at a lower SAL 1 or 2 rating, depending upon the compensating controls. Lockout or loss of control due to security mea sures is not acceptable in high availability IACS.

1716 1717 1718

(1) The organization shall verify the identity of each IACS user. This verification may be maintained separately from the IACS (such as by the appropriate HR group).

1719 1720

Requirement Enhancements:

11.8.7 Authenticator Management Foundational Requirement:

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

ISA‑62443-2-2, D1E4, April 2013

1722 1723

ISA99, WG02, TG02

Requirement: The organization shall establish administrative procedures for initial authenticator distribution, for lost/compromised, or damaged authenticators, and for revoking authenticators.

1724

Foundational Requirement:

1725 1726 1727 1728 1729 1730 1731

Rationale/Supplemental Guidance: IACS authenticators include, for example, tokens, Public Key certificates, biometrics, passwords, physical keys, and key cards. IACS users should take reasonable measures to safeguard authenticators including maintainin g possession of their individual authenticators, not loaning or sharing authenticators with others, and reporting lost or compromised authenticators immediately. In the case of a process or device, such users should also take measures to protect their IAC S authenticators.

1732 1733 1734 1735 1736 1737

If the IACS is required to have a high level of availability, measures must be taken to maintain this high level of availability (e.g. compensating physical controls, duplicate keys, supervisory override). Lockout or loss of control due to security measures is not acceptable.

1738 1739 1740 1741

Requirement Enhancements: None. 11.8.8 Software and Information Integrity Requirement: The organization reassesses the integrity of software and information by performing [ Assignment: organization-defined frequency] integrity scans of the system.

1742

Foundational Requirement:

1743 1744 1745 1746 1747

Rationale/Supplemental Guidance: This requirement complements related Access Control requirements. Access Control involves enforcing the roles, permissions, and use patterns as designed. Integrity verification methods are employed to detect, record, report, and protect against the effects of software and information tampering that may occur if other protection mechanisms (e.g. Access Control) have been circumvented.

1748

Requirement Enhancements: None.

1749 1750

11.8.9 Information Input Restrictions

1751

Requirement:

1752 1753 1754

Restrictions on entities authorized to input information to the IACS may extend beyond the typical access controls employed by the system and include limitations based on specific operational/project responsibilities.

1755

Foundational Requirement:

1756

Rationale/Supplemental Guidance: None.

1757

Requirement Enhancements: None.

1758

11.8.10 Error Handling

1759

Requirement:

1760 1761

The extent to which the IACS identifies and handles error conditions shall be guided by organizational policy and operational requirements.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

1721

– 49 –

ISA‑62443-2-2, D1E4, April 2013

– 50 –

1762

Foundational Requirement:

1763

Rationale/Supplemental Guidance: None.

1764

Requirement Enhancements: None.

ISA99, WG02, TG02

1765 11.8.11 Information Output Handling and Retention

1767

Requirement:

1768 1769

The organization shall handle and retain output from the IACS in accordance with applicable laws, directives, policies, regulations, standards, and operational requirements.

1770

Foundational Requirement:

1771

Rationale/Supplemental Guidance: None.

1772

Requirement Enhancements: None.

1773

11.8.12 Boundary Protection

1774

Requirement:

1775 1776 1777

The organization carefully considers the intrinsically shared nature of commercial telecommunications services in the implementation of security controls associated with the use of such services.

1778

Foundational Requirement:

1779 1780 1781 1782 1783 1784 1785

Rationale/Supplemental Guidance: Commercial telecommunications services are commonly based on network components and consolidated management systems shared by all attached commercial customers, and may include third party provided access lines and other service elements. Consequently, such interconnecting communication services may represent sources of increased risk despite contract security provisions. Therefore, when this situation occurs, the organization either implements appropriate compensating security controls or explicitly accepts the additional risk.

1786

Requirement Enhancements:

1787 1788 1789 1790

(1) The organization implements a managed interface (boundary protection devices in an effective security architecture) with any external telecommunication service, implementing controls appropriate to the required protection of the confidentiality and integrity of the information being transmitted.

1791 1792

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

1766

ISA‑62443-2-2, D1E4, April 2013

– 51 –

1793

12 Systems acquisition, development and maintenance

1794

12.1

ISA99, WG02, TG02

Introduction

1795 1796

12.2 Security requirements of information systems

1797

12.2.1

Requirement:

1799 1800

Foundational Requirement:

1801

Rationale/Supplemental Guidance:

1802

Requirement Enhancements:

1803 1804

12.3 Correct Processing in Applications

1805

12.3.1

1806

{Requirement} Requirement:

1807 1808

Foundational Requirement:

1809

Rationale/Supplemental Guidance:

1810

Requirement Enhancements:

1811 1812

12.4 Cryptographic Controls

1813

12.4.1 Cryptographic Module Validation

1814 1815 1816 1817

Requirement: If cryptography is required, the IACS shall employ validated cryptographic modules that applicable laws, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module ma y require.

1818

Foundational Requirement:

1819 1820 1821 1822 1823

Rationale/Supplemental Guidance: The use of cryptography is determined after careful consideration of the security needs and the potential ramifications on system performance. The procurement process most effective safeguard is to use a cryptographic module validated by a recognized 3 rd party authority, e.g. the Cryptographic Module Validation Program.

1824

Requirement Enhancements: None.

1825 1826

12.5 Security of System Files

1827

12.5.1

1828 1829

{Requirement} Requirement:

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

1798

{Requirement}

ISA‑62443-2-2, D1E4, April 2013 1830

Foundational Requirement:

1831

Rationale/Supplemental Guidance:

1832

Requirement Enhancements:

– 52 –

ISA99, WG02, TG02

1833 1834

12.6 Security in development and support processes

1835

12.6.1

Requirement:

1837 1838

Foundational Requirement:

1839

Rationale/Supplemental Guidance:

1840

Requirement Enhancements:

1841 1842

12.7 Technical vulnerability management

1843

12.7.1 Configuration Management Policy and Procedures

1844

Requirement:

1845 1846 1847 1848 1849 1850

The organization shall develop, disseminate, and periodically review/update: (i) a formal, documented, configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the configuration management policy and associated configuration management controls.

1851

Foundational Requirement:

1852 1853 1854 1855 1856 1857

Rationale/Supplemental Guidance: The configuration management policy and procedures are consistent with applicable laws, directives, policies, regulations, standards, and guidance. The configuration management policy can be included as part of the general information security policy for the organization. Co nfiguration management procedures can be developed for the security program in general, and for a particular IACS, when required.

1858 1859

Requirement Enhancements: None.

1860 1861 1862 1863

12.7.2 Baseline Configuration Requirement: The organization shall develop, document, and maintain a current baseline configuration of the IACS.

1864

Foundational Requirement:

1865 1866 1867 1868 1869

Rationale/Supplemental Guidance: This requirement establishes a baseline configuration for the IACS. The baseline configuration provides information about a particular component’s makeup (e.g., the standard software load for a workstation or notebook computer including updated patch information) and the component’s logical placement within the IACS architecture. The baseline configuration also provides the organization

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

1836

{Requirement}

– 53 –

ISA99, WG02, TG02

1870 1871

with a well-defined and documented specification to which the IACS is built and deviations, if required, are documented in support of mission needs/ objectives.

1872

Requirement Enhancements:

1873 1874

(1) The organization updates the baseline configuration of the IACS as an integral part of IACS component installations.

1875 1876

(2) The organization employs automated mechanisms to maintain an up -to-date, complete, accurate, and readily available baseline configuration of the IACS.

1877 1878 1879

12.7.3 Configuration Change Control Requirement: The organization shall authorize, document, and control changes to the IACS.

1880

Foundational Requirement:

1881 1882 1883 1884 1885 1886 1887 1888 1889 1890

Rationale/Supplemental Guidance: The organization manages configuration changes to the IACS using an organizationally approved process. Configuration change control involves the systematic proposal, justification, implementation, test/evaluation, review, and disposition of changes to the IACS, including upgrades and modifications. Configuration change control includes changes to the configuration settings for information technology products (e.g., operating systems, firewalls, routers). The organization includes emergency changes in the configuration change control process, including changes resulting from the remediation of flaws. The approvals to implement a change to the IACS include successful results from the security analysis of the change. The organization audits activities associated with configuration changes to the IACS.

1891

Requirement Enhancements:

1892 1893 1894 1895

(1) The organization employs automated mechanisms to: (i) document proposed c hanges to the IACS; (ii) notify appropriate approval authorities; (iii) highlight approvals that have not been received in a timely manner; (iv) inhibit change until necessary approvals are received; and (v) document completed changes to the IACS.

1896 1897

(2) The organization tests, validates, and documents changes (e.g., patches and updates) before implementing the changes on the operational IACS.

1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909

Foundational Requirement: Rationale/Supplemental Guidance: The organization ensures that testing does not interfere with IACS functions. The individual/group conducting the tests fully understands the organizational information security policies and procedures, the IACS security policies and procedures, and the specific health, safety, and environmental risks associated with a particular facility and/or process. A production IACS may need to be taken off-line, or replicated to the extent feasible, before testing can be conducted. If an IACS must be taken off-line for testing, the tests are scheduled to occur during planned IACS outages whenever possible. In situations where the organization cannot, for operational reasons, conduct live testing of a production IACS, the organization employs compensating controls (e.g., providing a replicated system to conduct testing).

1910

12.7.4 Monitoring Configuration Changes

1911

Requirement:

1912 1913

The organization shall conduct security impact analyses to determine the effects of configuration changes.

1914

Foundational Requirement:

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

– 54 –

ISA99, WG02, TG02

1915 1916 1917 1918 1919 1920 1921 1922

Rationale/Supplemental Guidance: Prior to change implementation, and as part of the change approval process, the organization analyzes changes to the IACS for potential adverse security consequences. After the IACS is changed (including upgrades and modifications), the organization checks the security features to verify that the features are still functioning properly. The organization audits activities associated with configuration changes to the IACS. Monitoring configuration changes and conducting security impact analyses are important elements with regard to the ongoing assessment o f security controls in the IACS.

1923 1924

Requirement Enhancements: None.

1925

12.7.5 Access Restrictions for Change

1926

Requirement:

1927 1928 1929

The organization shall: (i) approve individual access privileges and enforces physical and logical access restrictions associated with changes to the IACS; and (ii) generate, retain, and review records reflecting all such changes.

1930

Foundational Requirement:

1931 1932 1933 1934 1935

Rationale/Supplemental Guidance: Planned or unplanned changes to the hardware, software, and/or firmware components of the IACS can have signif icant effects on the overall security of the system. Accordingly, only qualified and authorized individuals obtain access to IACS components for purposes of initiating changes, including upgrades and modifications.

1936

Requirement Enhancements:

1937 1938 1939

(1) The organization employs automated mechanisms to enforce access restrictions and support auditing of the enforcement actions.

1940 1941 1942 1943 1944 1945 1946

12.7.6 Network and Security Configuration Settings Requirement: The IACS vendor shall provide guidelines for recommended network and securi ty configurations. The organization shall, based upon guidelines provided by the vendor: (i) establish mandatory network and security configuration settings for IACS components (ii) configure these settings to the most restrictive mode consistent with ope rational requirements; (iii) document these settings; and (iv) enforce these settings in all components of the IACS.

1947

Foundational Requirement:

1948 1949

Rationale/Supplemental Guidance: These configuration settings are the adjustable parameters of the IACS components.

1950

Requirement Enhancements:

1951 1952 1953

(1) The organization shall employ automated mechanisms to centrally manage, apply, and verify configuration settings.

1954 1955

12.7.7 IACS Component Inventory Requirement:

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

– 55 –

ISA99, WG02, TG02

1956 1957

The organization shall develop, document, and maintain a current inventor y of the components of the IACS and relevant ownership information.

1958

Foundational Requirement:

1959 1960 1961 1962 1963 1964 1965

Rationale/Supplemental Guidance: The organization determines the appropriate level of granularity for the IACS components included in the inventory that are subj ect to management control (i.e., tracking, and reporting). The inventory of IACS components includes any information determined to be necessary by the organization to achieve effective property accountability (e.g., manufacturer, model number, serial numb er, software license information, system/component owner). The component inventory is consistent with the accreditation boundary of the IACS.

1966 1967 1968

Requirement Enhancements: (1) The organization updates the inventory of IACS components as an integral part of component installations.

1969 1970 1971

(2) The organization employs automated mechanisms to help maintain an up -to-date, complete, accurate, and readily available inventory of IACS components.

1972

12.7.8 System Maintenance Policy and Procedures

1973

Requirement:

1974 1975 1976 1977 1978

The organization shall develop, disseminate, and periodically review/update: (i) a formal, documented, IACS maintenance policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the IACS maintenance policy and associated system maintenance controls.

1979

Foundational Requirement:

1980 1981 1982 1983 1984

Rationale/Supplemental Guidance: The IACS maintenance policy and procedures are consistent with applicable laws, directives, policies, regulations, standards, and guidance. The IACS maintenance policy can be included as part of the general information security policy for the organization. System maintenance procedures can be developed for the security program in general, and for a particular IACS, when required.

1985

Requirement Enhancements: None.

1986 1987 1988 1989 1990 1991

12.7.9 Controlled Maintenance Requirement: The organization shall schedule, perform, document, and review records of routine preventative and regular maintenance (including repairs) on the components of the IACS in accordance with vendor, system integrator, and/or organizational specifications and requirements.

1992

Foundational Requirement:

1993 1994 1995 1996 1997 1998 1999

Rationale/Supplemental Guidance: All maintenance activities to include routin e, scheduled maintenance and repairs are controlled; whether performed on site or remotely and whether the equipment is serviced on site or removed to another location. Organizational officials approve the removal of the IACS or IACS components from the facility when repairs are necessary. If the IACS or component of the system requires off site repair, the organization removes all information from associated media using approved procedures. After maintenance is performed on the IACS, the organization

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

– 56 –

ISA99, WG02, TG02

2000 2001

checks all potentially affected security controls to verify that the controls are still functioning properly.

2002

Requirement Enhancements:

2003 2004 2005 2006 2007

(1) The organization maintains maintenance records for the IACS that include: (i) the date and time of maintenance; (ii) name of the individual performing the maintenance; (iii) name of escort, if necessary; (iv) a description of the maintenance performed; and (v) a list of equipment removed or replaced (including identification numbers, if applicable).

2008 2009 2010 2011

(2) The organization employs automated mechanisms to schedule and conduct maintenance as required, and to create up-to date, accurate, complete, and available records of all maintenance actions, both needed and completed.

2012

12.7.10 Maintenance Tools

2013

Requirement:

2014 2015

The organization shall approve, control, and monitor the use of IACS maintenance tools and maintains the tools on an ongoing basis.

2016

Foundational Requirement:

2017 2018 2019 2020 2021 2022 2023

Rationale/Supplemental Guidance: The intent of this requirement is to address hardware and software brought into the IACS specifically for diagnostic/repair actions (e.g., a hardware or software packet sniffer that is introduced for the purpose of a particular maintenance activity). Hardware and/or software components that may support IACS maintenance, yet are a part of the system (e.g., the software implementing “ping”, “ls”, “ipconfig” or the hardware and software implementing the monitoring port of an Ethernet switch) are not covered by this requirement.

2024

Requirement Enhancements:

2025 2026

(1) The organization inspects all maintenance tools c arried into a facility by maintenance personnel for obvious improper modifications.

2027

Foundational Requirement:

2028 2029

Rationale/Supplemental Guidance: Maintenance tools include, for diagnostic and test equipment used to conduct maintenance on the IACS.

example,

2030 2031

(2) The organization checks all media containing diagnostic and test programs for malicious code before the media are used in the IACS.

2032 2033 2034 2035 2036

(3) The organization checks all maintenance equipment with the capability of retaining information so that no organizational information is written on the equipment or the equipment is appropriately sanitized before release; if the equipment cannot be sanitized, the equipment remains within the facility or is destroyed, unless an appropriate organization official explicitly authori zes an exception.

2037 2038 2039

(4) The organization employs automated mechanisms to restrict the use of maintenance tools to authorized personnel only.

2040 2041 2042 2043

12.7.11 Remote Maintenance Requirement: The organization shall authorize, monitor, and control any remotely executed maintenanc e and diagnostic activities, if employed.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

– 57 –

ISA99, WG02, TG02

2044

Foundational Requirement:

2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058

Rationale/Supplemental Guidance: Remote maintenance and diagnostic activities are conducted by individuals communicating through an external, non -organization-controlled network (e.g., the Internet). The use of remote maintenance and diagnostic tools is consistent with organizational policy and documented in the security plan for the IACS. The organization maintains records for all remote maintenance and diagnostic activities. Other techniques and/or controls to consider for improving the security of remote maintenance include: (i) encryption and decryption of communications; (ii) strong identification and authentication techniques; and (iii) remote disconnect verification. When remote maintenance is completed, the organization (or IACS in certain cases) terminates all sessions and remote connections invoked in the performance of that activity. If password-based authentication is used to accomplish remote maintenance, the organization changes the passwords following each remote maintenance service. The National Security Agency provides a listing of approved media sanitization products at http://www.nsa.gov/ia/government/mdg.cfm .

2059

Requirement Enhancements:

2060 2061 2062

(1) The organization audits all remote maintenance and diagnostic sessions and appropriate organizational personnel review the maintenanc e records of the remote sessions.

2063 2064 2065

(2) The organization addresses the installation and use of remote maintenance and diagnostic links in the security plan for the IACS.

2066 2067 2068

12.7.12 Maintenance Personnel Requirement: The organization shall allow only authorized personnel to perform maintenance on the IACS.

2069

Foundational Requirement:

2070 2071 2072 2073 2074 2075 2076

Rationale/Supplemental Guidance: Maintenance personnel (whether performing maintenance locally or remotely) have appropriate access authorizations to the IACS when maintenance activities allow access to organizational information or could result in a future compromise of confidentiality, integrity, or availability. When maintenance personnel do not have needed access authorizations, organizational personnel with appropriate access authorizations supervise maintenance personnel during the performance of maintenance activities on the IACS.

2077

Requirement Enhancements: None.

2078

12.7.13 Timely Maintenance

2079

Requirement:

2080 2081 2082

The organization shall obtain maintenance support and spare parts for [ Assignment: organizationdefined list of key IACS components] within [Assignment: organization-defined time period] of failure.

2083

Foundational Requirement:

2084

Rationale/Supplemental Guidance: None.

2085

Requirement Enhancements: None.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

ISA-62443.02.02, D1E4, April 2013 2086

13 Incident Management

2087

13.1

– 58 –

ISA99, WG02, TG02

Introduction

2088 2089

13.2 Reporting Security Events and Weaknesses

2090

13.2.1

Requirement:

2092 2093

Foundational Requirement:

2094

Rationale/Supplemental Guidance:

2095

Requirement Enhancements:

2096 2097

13.3 Management of Incidents and Improvements

2098

13.3.1 Incident Response Policy and Procedures

2099

Requirement:

2100 2101 2102 2103 2104

The organization shall develop, disseminate, and periodically review/update: (i) a forma l, documented, incident response policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the incident response policy and associated incident response controls.

2105

Foundational Requirement:

2106 2107 2108 2109 2110

Rationale/Supplemental Guidance: The incident response policy and procedures are consistent with applicable laws, directives, policies, regulations, standards, and guidance. The incident response policy can be included as part of the general information security policy for the organization. Incident response procedures can be developed for the security program in general, and for a particular IACS, when required.

2111 2112

Requirement Enhancements: None.

2113 2114 2115 2116 2117

13.3.2 Incident Response Training Requirement: The organization shall train personnel in their incident response roles and responsibilities with respect to the IACS and provides refresher training [ Assignment: organization-defined frequency, at least annually].

2118

Foundational Requirement:

2119

Rationale/Supplemental Guidance: None.

2120

Requirement Enhancements:

2121 2122

(1) The organization incorporates simulated events into incident response training to facilitate effective response by personnel in crisis situations.

2123 2124

(2) The organization employs automated mechanisms to provide a more thorough and realistic training environment.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

2091

{Requirement}

ISA‑62443-2-2, D1E4, April 2013

– 59 –

ISA99, WG02, TG02

2125

2127 2128 2129 2130 2131

13.3.3 Incident Response Testing and Exercises Requirement: The organization shall test and/or exercise the incident response capability for the IACS [Assignment: organization-defined frequency, at least annually ] using [Assignment: organization-defined tests and/or exercises] to determine the incident response effectiveness and documents the results.

2132

Foundational Requirement:

2133

Rationale/Supplemental Guidance: None

2134

Requirement Enhancements:

2135 2136

(1) The organization employs automated mechanisms to more thoroughly and effectively test/exercise the incident response capability.

2137 2138 2139 2140 2141 2142

Foundational Requirement: Rationale/Supplemental Guidance: Automated mechanisms can provide the ability to more thoroughly and effectively test or exercise the incident response ca pability by providing more complete coverage of incident response issues, selecting more realistic test/exercise scenarios and environments, and more effectively stressing the response capability.

2143

13.3.4 Incident Handling

2144

Requirement:

2145 2146

The organization shall implement an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery.

2147

Foundational Requirement:

2148 2149 2150 2151 2152

Rationale/Supplemental Guidance: Incident-related information can be obtained from a variety of sources including, but not limited to, audit monitoring, network monitoring, physical access monitoring, and user/administrator reports. The organization incorporates the lessons learned from ongoing incident handling activities into the incident response procedures and implements the procedures accordingly.

2153

Requirement Enhancements:

2154 2155

(1) The organization employs automated mechanisms to support the incident handling process.

2156

13.3.5 Incident Monitoring

2157

Requirement:

2158

The organization shall track and document IACS security incidents on an ongoing basis.

2159

Foundational Requirement:

2160

Rationale/Supplemental Guidance: None.

2161

Requirement Enhancements:

2162 2163

(1) The organization employs automated mechanisms to assist in the tracking of security incidents and in the collection and analysis of incident information.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

2126

ISA-62443.02.02, D1E4, April 2013

2165 2166

ISA99, WG02, TG02

13.3.6 Incident Reporting Requirement: The organization shall promptly reports incident information to appropriate authorities.

2167

Foundational Requirement:

2168 2169 2170 2171 2172 2173 2174

Rationale/Supplemental Guidance: The types of incident information reported, the content and timeliness of the reports, and the list of designated reporting authorities or organizations are consistent with applicable laws, directives, policies, regulations, standards, and guidance. The United States Computer Em ergency Readiness Team (USCERT) maintains the IACS Security Center at http://www.uscert.gov/control_systems. In addition to incident information, weaknesses and vulnerabilities in the IACS are reported to appropriate organizational officials in a timely manner to prevent security incidents.

2175

Requirement Enhancements:

2176 2177

(1) The organization employs automated mechanisms to assist in the reporting of security incidents.

2178 2179 2180 2181 2182

13.3.7 Incident Response Assistance Requirement: The organization shall provide an incident response support resource that offers advice and assistance to users of the IACS for the handling and reporting of security incidents. The support resource is an integral part of the organization’s incident respo nse capability.

2183

Foundational Requirement:

2184 2185 2186

Rationale/Supplemental Guidance: Possible implementations of incident response support resources in an organization include a help desk or an assistance group and access to forensics services, when required.

2187

Requirement Enhancements:

2188 2189

(1) The organization employs automated mechanisms to increase the availability of incident response-related information and support.

2190 2191

13.3.8 IACS Monitoring Tools and Techniques

2192

Requirement:

2193 2194 2195 2196

The organization shall determine the required granularity of the information collected based upon its monitoring objectives and the capability of the IACS to support such activities. This includes monitoring inbound and outbound communications for unusual or unauthorized activities or conditions.

2197

Foundational Requirement:

2198 2199 2200 2201 2202

Rationale/Supplemental Guidance: Organizations consult appropriate legal counsel with regard to all IACS monitoring activities. Organizations heighten the level of IACS monitoring activity whenever there is an indication of increas ed risk to organizational operations, organizational assets, or individuals based on law enforcement information, intelligence information, or other credible sources of information.

2203

Requirement Enhancements:

2204 2205

(1) The organization interconnects and configures individual intrusion detection tools into a system wide intrusion detection system using common protocols.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

2164

– 60 –

– 61 –

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013 ISA99, WG02, TG02

2206

ISA-62443.02.02, D1E4, April 2013 2207

14 Business Continuity Management

2208

14.1

– 62 –

ISA99, WG02, TG02

Introduction

2210

14.2 Security Aspects

2211

14.2.1 Contingency Planning Policy and Procedures

2212

Requirement:

2213 2214 2215 2216 2217

The organization shall develop, disseminates, and periodically reviews/updates: (i) a formal, documented, contingency planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls.

2218

Foundational Requirement:

2219 2220 2221 2222 2223

Rationale/Supplemental Guidance: The contingency planning policy and procedures are consistent with applicable laws, directives, policies, regulations, standards, and guidance. The contingency planning policy can be included as part of the general information security policy for the organization. Contingency planning procedures can be develop ed for the security program in general, and for a particular IACS, when required.

2224

Requirement Enhancements: None.

2225 2226 2227 2228 2229 2230 2231

14.2.2 Contingency Plan Requirement: The organization shall develop and implement a contingency plan for the IACS addressing contingency roles, responsibilities, assigned individuals with contact information, and activities associated with restoring the system after a disruption or failure. Designated officials within the organization review and approve the contingency plan and distribute copies of the plan to key contingency personnel.

2232

Foundational Requirement:

2233 2234 2235 2236 2237 2238

Rationale/Supplemental Guidance: The organization defines contingency plans for categories of disruptions or failures. In the event of a loss of processing within the IACS or communication with operational facilities, the IACS executes predetermined procedures (e.g., alert the operator of the failure and then do nothing, alert the operator and then safely shut down the industrial process, alert the operator and then maintain the last operational setting prior to failure). These examples are not exhaustive.

2239

Requirement Enhancements:

2240 2241

(1) The organization coordinates contingency plan development with organizational elements responsible for related plans.

2242

Foundational Requirement:

2243 2244 2245

Rationale/Supplemental Guidance: Examples of related plans include Business Continuity Plan, Disaster Recovery Plan, Continuity of Operations Plan, Business Recovery Plan, Incident Response Plan, and Emergency Action Plan.

2246 2247 2248

(2) The organization conducts capacity planning s o that necessary capacity for information processing, telecommunications, and environmental support exists during crisis situations.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

2209

ISA‑62443-2-2, D1E4, April 2013

2250 2251 2252 2253

ISA99, WG02, TG02

14.2.3 Contingency Training Requirement: The organization shall train personnel in their contingency roles and responsibilities w ith respect to the IACS and provides refresher training [Assignment: organization-defined frequency, at least annually].

2254

Foundational Requirement:

2255

Rationale/Supplemental Guidance: None.

2256

Requirement Enhancements:

2257 2258

(1) The organization incorporates simulated events into contingency training to facilitate effective response by personnel in crisis situations.

2259 2260

(2) The organization employs automated mechanisms to provide a more thorough and realistic training environment.

2261 2262 2263 2264 2265 2266 2267

14.2.4 Contingency Plan Testing and Exercises Requirement: The organization shall: (i) test and/or exercise the contingency plan for the IACS [ Assignment: organization-defined frequency, at least annually ] using [Assignment: organization-defined tests and/or exercises] to determine the plan’s effectiveness and the organization’s readiness to execute the plan; and (ii) review the contingency plan test/exercise results and initiates corrective actions.

2268

Foundational Requirement:

2269 2270 2271 2272 2273 2274 2275

Rationale/Supplemental Guidance: There are several methods for testing and/or exercising contingency plans to identify potential weaknesses (e.g., full -scale contingency plan testing, functional/tabletop exercises). The depth and rigor of contingency plan 𝑡𝑎𝑟𝑔𝑒𝑡 testing and/or exercises increases with the 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 level of the IACS. Contingency plan testing and/or exercises also include a determination of the effects on organizational operations and assets (e.g., reduction in mission capability) and individuals arising due to contingency operations in accordance with t he plan.

2276

Requirement Enhancements:

2277 2278

(1) The organization coordinates contingency plan testing and/or organizational elements responsible for related plans.

exercises

with

2279

Foundational Requirement:

2280 2281 2282

Rationale/Supplemental Guidance: Examples of related plans include Business Continuity Plan, Disaster Recovery Plan, Continuity of Operations Plan, Business Recovery Plan, Incident Response Plan, and Emergency Action Plan.

2283 2284 2285

(2) The organization tests/exercises the contingency plan at the alt ernate processing site to familiarize contingency personnel with the facility and available resources and to evaluate the site’s capabilities to support contingency operations.

2286 2287 2288 2289

(3) The organization employs automated mechanisms to more thoroughly and effectivel y test/exercise the contingency plan by providing more complete coverage of contingency issues, selecting more realistic test/exercise scenarios and environments, and more effectively stressing the IACS and supported missions.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

2249

– 63 –

ISA-62443.02.02, D1E4, April 2013

– 64 –

ISA99, WG02, TG02

2290

2292 2293 2294 2295 2296

14.2.5 Contingency Plan Update Requirement: The organization shall review the contingency plan for the IACS [ Assignment: organizationdefined frequency, at least annually] and revises the plan to address system/organizational changes or problems encountered during plan implementation, execution, or testing.

2297

Foundational Requirement:

2298 2299 2300 2301 2302

Rationale/Supplemental Guidance: Organizational changes include changes in mission, functions, or business processes supported by the IACS. The organization communicates changes to appropriate organizational elements responsible for related plans (e.g., Business Continuity Plan, Disaster Recovery Plan, Continuity of Operations Plan, Business Recovery Plan, Incident Response Plan, Emergency Action Plan).

2303

Requirement Enhancements: None.

2304 2305 2306 2307 2308

14.2.6 Alternate Storage Site Requirement: The organization shall identify an alternate storage site and initiates necessary agreements to permit the storage of IACS backup information.

2309

Foundational Requirement:

2310 2311 2312

Rationale/Supplemental Guidance: The frequency of IACS backups and the transfer rate of backup information to the alternate storage site (if so designated) are consistent with the organization’s recovery time objectives and recovery point objectives.

2313

Requirement Enhancements:

2314 2315

(1) The organization identifies an alternate storage site that is geographically separated from the primary storage site so as not to be susceptible to the same hazards.

2316 2317

(2) The organization configures the alternate storage site to facilitate timely and effective recovery operations.

2318 2319 2320

(3) The organization identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.

2321 2322 2323 2324 2325 2326 2327

14.2.7 Alternate Control Site Requirement: The organization shall identify an alternate control site an d initiates necessary agreements to permit the resumption of IACS operations for critical mission/business functions within [Assignment: organization-defined time period] when the primary processing capabilities are unavailable.

2328

Foundational Requirement:

2329 2330

Rationale/Supplemental Guidance: Equipment and supplies required to resume operations within the organization-defined time period are either available at the alternate

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

2291

– 65 –

ISA99, WG02, TG02

2331 2332

site or contracts are in place to support delivery to the site. Timeframes to resume IA CS operations are consistent with organization-established recovery time objectives.

2333

Requirement Enhancements:

2334 2335 2336

(1) The organization identifies an alternate processing site that is geographically separated from the primary processing site so as not to be suscep tible to the same hazards.

2337 2338 2339

(2) The organization identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.

2340 2341

(3) The organization develops alternate processing site agreements that contain priorityof-service provisions in accordance with the organization’s availability requirements.

2342 2343

(4) The organization fully configures the alternate processing site so that it is ready to be used as the operational site supporting a minimum required operational capability.

2344

14.2.8 IACS Backup

2345

Requirement:

2346 2347 2348

The frequency of IACS backups and the transfer rate of backup information to alternate storage sites (if so designated) shall be consistent with the organization’s recovery time objectives and recovery point objectives.

2349

Foundational Requirement:

2350 2351 2352

Rationale/Supplemental Guidance: Availability of up-to-date backups is essential for recovery from IACS failure and mis-configuration. Automating this function ensures that all required files are captured, reducing operator overhead.

2353 2354 2355 2356 2357

An organizational assessment of risk guides the use of encryption for backup information. While integrity and availability are the primary concerns for system backup information, protecting backup information from unauthorized disclosure is also an important consideration depending on the type of informati on residing on the backup media and the 𝑡𝑎𝑟𝑔𝑒𝑡 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 level.

2358

Requirement Enhancements:

2359 2360

(1) The organization selectively uses backup information in the restoration of IACS functions as part of contingency plan testing.

2361 2362 2363

(2) The organization stores backup copies of the operating system and other critical IACS software in a separate facility or in a fire-rated container that is not collocated with the operational software.

2364

14.2.9 IACS Recovery and Reconstruction

2365

Requirement:

2366

None.

2367

Foundational Requirement:

2368 2369 2370 2371 2372 2373 2374

Rationale/Supplemental Guidance: IACS recovery and reconstitution to a known secure state means that all system parameters (either default or organization -established) are set to secure values, security-critical patches are reinstalled, security-related configuration settings are reestablished, system documentation and operating procedures are available, application and system software is reinstalled and configured with secure settings, information from the most recent, known secure backups is loaded, and the sy stem is fully tested and functional.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

ISA-62443.02.02, D1E4, April 2013

– 66 –

ISA99, WG02, TG02

2375

Requirement Enhancements:

2376 2377

(1) The organization shall include a full recovery and reconstitution of the IACS as part of contingency plan testing. 14.2.10 Power Equipment and Cabling

2379

Requirement:

2380 2381

The organization shall protect power equipment and power cabling for the IACS from damage and destruction.

2382

Foundational Requirement:

2383

Rationale/Supplemental Guidance: None.

2384

Requirement Enhancements:

2385

(1) The organization employs redundant and parallel power cabling paths.

2386 2387 2388 2389 2390 2391

14.3 Telecommunications Services Requirement: The organization shall identify primary and alternate telecommunications services to support the IACS and initiates necessary agreements to permit the resumption of system operations for critical mission/business functions within [ Assignment: organization-defined time period] when the primary telecommunications capabilities are unavailable.

2392

Foundational Requirement:

2393 2394 2395 2396 2397

Rationale/Supplemental Guidance: In the event that the primary and/or alternate telecommunications services are provided by a common carrier, the organization requests Telecommunications Service Priority (TSP) for all telecommunications services used for national security emergency preparedness (see http://tsp.ncs.gov for a full explanation of the TSP program).

2398

Requirement Enhancements:

2399 2400 2401

(1) The organization develops primary and alternate telecommunications service agreements that contain priority-of-service provisions in accordance with the organization’s availability requirements.

2402 2403

(2) The organization obtains alternate telecommunications services that do not share a single point of failure with primary telecommunications services.

2404 2405 2406

(3) The organization obtains alternate telecommunications service providers that are sufficiently separated from primary service providers so as not to be su sceptible to the same hazards.

2407 2408 2409

(4) The organization requires primary and alternate telecommunications service providers to have adequate contingency plans.

2410

14.3.1 Emergency Shutoff

2411

Requirement:

2412 2413 2414 2415

The IACS shall provide, for specific locations within a facility containing concentrations of IACS resources, the capability of shutting off power to any IACS component that may be malfunctioning or threatened without endangering personnel by requiring them to approach the equipment.

2416

Foundational Requirement:

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

2378

– 67 –

ISA99, WG02, TG02

2417 2418 2419 2420

Rationale/Supplemental Guidance: Facilities containing concentrations of IACS resources may include, for example, data centers, server rooms, and mainframe rooms. Emergency shutoff capabilities are typically integrated with SIS systems, if present (e.g. automated fail-safe shutdown sequences).

2421

Requirement Enhancements:

2422 2423 2424

(1) The IACS shall protect the emergency power -off capability from accidental or unauthorized activation.

2425

14.3.2 Emergency Power

2426

Requirement:

2427 2428

The organization shall provide a short-term uninterruptible power supply to facilitate an orderly shutdown of the IACS in the event of a primary power source loss.

2429

Foundational Requirement:

2430

Rationale/Supplemental Guidance: None.

2431

Requirement Enhancements:

2432 2433 2434

(1) The organization provides a long-term alternate power supply for the IACS that is capable of maintaining minimally required operational capability in the event of an extended loss of the primary power source.

2435 2436 2437

(2) The organization provides a long-term alternate power supply for the IACS that is self contained and not reliant on external power generation.

2438

14.3.3 Emergency Lighting

2439

Requirement:

2440 2441 2442

The organization shall employ and maintains automatic emergency lighting that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes.

2443

Foundational Requirement:

2444

Rationale/Supplemental Guidance: None.

2445

Requirement Enhancements: None.

2446 2447

14.3.4 Fire Protection

2448

Requirement:

2449 2450

The organization shall employ and maintain fire suppression devices/systems that can be activated in the event of a fire.

2451

Foundational Requirement:

2452 2453 2454

Rationale/Supplemental Guidance: Fire suppression and detection devices/systems include, but are not limited to, sprinkler systems, handheld fire extinguishers, fixed fire hoses, and smoke detectors.

2455

Requirement Enhancements:

and

detection

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013

– 68 –

ISA99, WG02, TG02

2456 2457

(1) The organization employs fire detection devices/systems that activate automatically and notify the organization and emergency responders in the event of a fire.

2458 2459

(2) The organization employs fire suppression devices/systems that provide automatic notification of any activation to the organization and emergency responders.

2460 2461 2462

(3) The organization employs an automatic fire suppression capability in facilities that are not staffed on a continuous basis.

2463

14.3.5 Temperature and Humidity Controls

2464

Requirement:

2465 2466

The organization shall regularly maintain, within acceptable levels, and monitor the temperature and humidity within the facility where the IACS resides.

2467

Foundational Requirement:

2468

Rationale/Supplemental Guidance: None.

2469 2470

Requirement Enhancements: None.

2471

14.3.6 Water Damage Protection

2472

Requirement:

2473 2474 2475

The organization shall protect the IACS from water damage resulting from broken plumbing lines or other sources of water leakage by providing master shutoff valves that are accessible, working properly, and known to key personnel.

2476

Foundational Requirement:

2477

Rationale/Supplemental Guidance: None.

2478

Requirement Enhancements:

2479 2480 2481

(1) The organization employs mechanisms that, without the need for manual intervention, protect the IACS from water damage in the event of a significant water leak.

2482

15 Compliance

2483

15.1

2484

15.1.1

2485

General {Requirement} Requirement:

2486 2487

Foundational Requirement:

2488

Rationale/Supplemental Guidance:

2489

Requirement Enhancements:

2490 2491 2492

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA-62443.02.02, D1E4, April 2013

– 69 –

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA‑62443-2-2, D1E4, April 2013 ISA99, WG02, TG02

2493

ISA-62443.02.02, D1E4, April 2013

– 70 –

ISA99, WG02, TG02

Annex A (informative) Foundational Requirements

2494 2495 2496 2497

A.1

Overview

2498

This annex is intended to provide guidance to the reader as to the relevance of the SRs.

2499

A.2

2500 2501 2502 2503 2504 2505 2506 2507 2508 2509 2510

Identify and authenticate IACS users (incl. human users, processes, and devices), assign them to a pre-defined role, and allow them access to the system or assets.

2511

A.3

2512 2513 2514 2515 2516 2517 2518 2519 2520 2521

Enforce the assigned privileges of an authenticated IACS user to perform the requested action on the system or assets, and monitor the use of these privileges.

2522

A.4

2523 2524 2525 2526 2527 2528 2529 2530 2531

Ensure the integrity of information on communication channels and in data repositories to prevent unauthorized manipulation.

2532

A.5

2533 2534

Ensure the confidentiality of information on communication channels and in data repositories to prevent dissemination.

2535 2536 2537

Rationale: Some IACS generated information whether at rest or in transit is of confidential/sensitive nature. This implies that some communication channels and data -stores require protection against eavesdropping and unauthorized access.

Rationale: Asset owners will have to develop a list of IACS users and to determine for each device the required level of access control protection. The goal of access control is to protect the system by verifying the identity of a user requesting the access to a de vice of the system before activating the communication. Recommendations and guidelines should include mechanisms that will operate in mixed modes; e.g. some devices on a communication channel require strong access control, i.e. strong authentication mechanism and others do not. By extension, access control requirements need to be extended to data at rest.

FR2 USE C ONTROL

Rationale: Asset owners will have to assign to each IACS user the privileges defining the authorized use of the system. The goal of use control is to protect against unauthorized actions on IACS resources by verifying if the necessary privileges are granted before allowing performing the action. Examples of actions are read or write data, download program, set configuration, etc. Recommendations and guidelines should include mechanisms that will operate in mixed modes; e.g. some IACS resources require strong use control protection, i.e. restrictive privileges and others do not. By extension, use control requirements need to be extended to data at rest .

FR3 D ATA I NTEGRITY

Rationale: Using the organization’s risk assessment methodology, asset owners will “select” communication channels that require strong integrity protection. Derived prescriptive recommendations and guidelines should include mechanisms that will operate in mixed modes; e.g. some communication channels require strong integrity protection and others do not. By extension, data integrity requirements need to be extended to data at rest; i.e. protecting the integrity of data that resides in selected repositories.

FR4 D ATA CONFIDENTIALITY

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

FR1 ACCESS CONTROL

ISA‑62443-2-2, D1E4, April 2013

– 71 –

ISA99, WG02, TG02

2538

A.6

FR5 RESTRICT D ATA F LOW

2539 2540 2541 2542 2543 2544 2545

Segment the system via zones and conduits to limit the unnecessary flow of data.

2546

A.7

2547 2548 2549 2550 2551 2552 2553 2554 2555 2556

Respond to security violations by notifying the proper authority, reporting needed forensic evidence of the violation, and taking timely corrective action when incidents are discovered.

2557

A.8

2558 2559 2560 2561 2562 2563

Ensure the availability of the system or assets against the denial of essential services.

FR6 T IMELY R ESPONSE TO AN EVENT

Rationale: Using the organization’s risk assessment methodology, asset owners will establish policies and proper lines of communication and control needed to respond to security violations. Derived prescriptive recommendations and guidelines shou ld include mechanisms that collect, report and automatically correlate the forensic evidence to ensure timely corrective action. The use of monitoring tools and techniques must not adversely affect the operational performance of the IACS.

FR7 RESOURCE AVAILABILITY

Rationale: The aim of this series of System Requirements is to ensure that the system is resilient against various types of Denial of Service events. Thi s includes the unavailability of system functionality at various levels.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

Rationale: Using the organization’s risk assessment methodology, asset owners will determine necessary information flow restrictions and thus by extension determine the configuration of the conduits used to deliver these data. Derived prescriptive recommendations and guidelines should include mechanisms that range from disconnecting control networks from business or public networks to using stateful firewalls and DMZ to manage the flow of information.

ISA-62443.02.02, D1E4, April 2013

– 72 –

ISA99, WG02, TG02

Annex B (informative) Mapping Controls to Foundational Requirements

2564 2565 2566 2567

B.1

2569 2570

This annex is intended to provide guidance to the reader as to the relevance of the specific controls to the various foundational requirements.

2571 2572

NOTE

2573

Overview

This annex will be completed as part of the final document generation after the primary content has been finalized.

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

2568

ISA‑62443-2-2, D1E4, April 2013 2574 2575

– 73 –

ISA99, WG02, TG02

BIBLIOGRAPHY

2576 2577 2578 2579 2580

NOTE

2581

References to other parts, both existing and anticipated, of the ISA‑62443 series:

2582 2583

NOTE

2584 2585

[1]

ANSI/ISA‑62443-1-1-2007, Security for industrial automation and control systems: Terminology, concepts and models

2586 2587

[2]

ANSI/ISA‑TR62443-1-2, Security for industrial automation and control systems: Master glossary of terms and abbreviations

2588 2589

[3]

ANSI/ISA‑62443-1-3, Security for industrial automation and control systems: System security compliance metrics

2590 2591

[4]

ANSI/ISA‑62443-2-1-2009, Security for industrial automation and control systems: Establishing an industrial automation and control system security program

2592 2593

[5]

ANSI/ISA‑TR62443-2-3, Security for industrial automation and control systems: Patch management in the IACS environment

2594 2595

[6]

ANSI/ISA‑TR62443-3-1-2007, Security for industrial autom ation and control systems: Security technologies for industrial automation and control systems

2596 2597

[7]

ANSI/ISA‑62443-3-2, Security for industrial automation and control systems: Target security assurance levels for zones and conduits

2598 2599

[8]

ANSI/ISA‑62443-3-3, Security for industrial automation and control systems: System security requirements and security assurance levels

2600 2601

[9]

ANSI/Error! Unknown document property name., Security for industrial automation and control systems: Product development requirements

2602 2603

[10]

ANSI/ISA‑62443-4-1, Security for industrial automation and control systems: Embedded devices

2604

[11]

ANSI/ISA‑62443-4-2, Security for industrial automation and control systems: Host devices

2605

Other standards references:

2606

[12]

2607 2608

Some of these references are normative references (see Clause 2), published documents, in development, or anticipated. They are all listed here for completeness of the a nticipated parts of the ISA‑62443 series.

ISO/IEC Directives, Part 2, Rules for the structure and drafting of International Standards

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

This bibliography includes references to sources used in the creation of this standard as well as references to sources that may aid the reader in developing a greater understanding of cyber security as a whole and developing a management system. Not all references in this bibliography are referred to throughout the text of this standard. The references have been broken down into different categories depending on the type of source they are.

– 74 –

This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.

ISA-62443.02.02, D1E4, April 2013 ISA99, WG02, TG02

2609

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF