International Society Automation
International Society Automation
International Society Automation
67 Alexander Drive
P.O. Box 12277
Research Triangle Park, NC 27709
PHONE (919) 549-8411
FAX (919) 549-8288
E-MAIL info@isa.org
www.isa.org
April 5, 2013
International Society of Automation (ISA) / The Automation Federation
ISA99, Industrial Automation and Control Systems Security
International industry standards development organization
All industrial sectors and critical infrastructure
Industrial automation and control systems
On behalf of the ISA99 Committee on Industrial and Automation Control Systems (IACS) Security, we
are pleased to submit this response to the Request for Information on the subject Framework for
Reducing Cyber Risks to Critical Infrastructure. In providing the requested information, we have
focused on describing the ongoing, ANSI-accredited ISA99 program that has drawn industrial
cybersecurity experts from across the globe to develop a comprehensive series of consensus industry
standards.
Respectfully,
Eric C. Cosman
James D. Gilsinn
ISA99 Co-Chairs
Copyright ISA
Table of Contents
1
THE NEED FOR STANDARDS SPECIFIC TO INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS ............................. 1
2.1
2.2
2.3
2.4
OVERVIEW .......................................................................................................................................................... 1
COMPONENT TYPES .............................................................................................................................................. 2
SECURITY OBJECTIVES ........................................................................................................................................... 3
IACS SECURITY AND EXISTING STANDARDS ................................................................................................................ 3
Copyright ISA
About ISA
The International Society of Automation, ISA, is a global, nonprofit technical association of
more than 30,000 automation professionals engaged in the design, development, production, and
application of devices and systems that sense, measure, and control industrial processes and
manufacturing operations.
ISA provides education and training, professional certification, conferences and workshops,
standards, and publications including textbooks, a magazine, and a peer-reviewed technical
journal. ISA has local member sections in 28 countries and 19 different technical divisions and
interest groups. Based in Research Triangle Park, North Carolina, ISA is the founding member
of the Automation Federation, an umbrella nonprofit with 15 organizational members
representing more than 400,000 individual practitioners, unifying the profession and serving as
the voice of automation.
ISA is best known for developing consensus industry standards that meet American National
Standards Institute (ANSI) requirements for openness and due process. Through ISAs ANSI
accreditation, many original ISA Standards have been adopted to become widely used
international standards through the International Electrotechnical Commission (IEC) in vital
areas including industrial cybersecurity, enterprise-control system integration, batch process
control, and process safety.
ISA is leading an international program called ISA99 to develop a comprehensive set of
cybersecurity standards for industrial automation and control systems (IACS) and critical
infrastructure that are being adopted as the IEC 62443 series of standards. Unlike programs
targeted at specific industries, the ISA99 initiative is applicable to all key industry sectors and
critical infrastructure in recognition of the interrelated nature of industrial computer networks in
which cyber vulnerabilities exploited in one sector can impact multiple sectors and
infrastructure.
The need for standards specific to Industrial Automation and Control Systems
2.1 Overview
Industrial automation and control systems designs increasingly use commercial-off-the-shelf
(COTS) technology (for example, network protocols and operating systems) that are
inexpensive, efficient, and highly automated, and that can be interconnected in heterogeneous
environments. These systems are also increasingly interconnected with non-IACS networks for
business reasons. These devices, open networking technologies, and increased connectivity
present greater opportunities for cyber attacks against control system hardware and software.
These multiple weaknesses can lead to serious or even catastrophic health, safety and
environmental (HSE), financial and/or reputational consequences in deployed control systems.
Copyright ISA
Page 1
Field measurement and control devices that generally use real time operating systems. The
communication at this level is usually implemented using industrial application protocols.
Modern versions of these are based on industry standards such as Ethernet and TCP/IP.
Securing these field devices requires a major modification of traditional IT cybersecurity
policies, technologies, and testing, and in many areas entirely new approaches are necessary.
Integration of cybersecurity capabilities has begun for the latest generation of field devices,
but devices deployed in the field have a lifecycle measured in decades rather than years.
Moreover, many industrial protocols have not yet specified security mechanisms.
Even though some of the technologies used in IACS are similar to those used in traditional IT
applications, significant differences in characteristics occur due to the fact that logic executing in
an IACS environment has a direct affect on the physical world. The approach used to define
IACS cybersecurity requirements thus needs to be based on a combination of functional
requirements and risk assessment, often requiring an awareness of operational issues as well.
Copyright ISA
Page 2
Copyright ISA
Page 3
Based on a risk analysis, some facilities may determine that certain types of security measures
may halt continuous operations, but must not result in loss of protection that could result in
health, safety and environmental (HSE) consequences. Some specific constraints could include:
Accounts used for essential functions must not be locked out, even temporarily.
Verifying and recording operator actions to enforce non-repudiation must not add significant
delay to system response time.
For mission critical control systems with inherently high availability requirements, the failure
of the certificate authority or other key management mechanisms must not interrupt essential
functions.
Identification and authentication must not prevent the initiation of safety systems. Similarly
for authorization enforcement.
Incorrectly time-stamped audit records must not adversely affect essential functions.
Essential functions of an IACS must be maintained if zone boundary protection goes into
fail-close and/or island mode.
A denial of service (DoS) event on the control system or safety system network must not
prevent the safety system from actuating as designed.
An IACS rarely operates in isolation from the rest of the enterprise, and thus some essential
security functions can be expected to be handled by an external resource. Examples of this might
be the maintenance of firewalls and intrusion detection systems by corporate organizations. In
addition, in some high resource availability applications, compensating countermeasures external
to the control system (such as additional physical security measures and/or enhanced personnel
background checks) will be needed. In some cases, a legacy control system that cannot be
adequately secured with technology might be made more dependent upon compensating
countermeasures such as physical access control and 24/7 staffing and supervision. Sensitivity to
lockout or loss of control due to security measures is increased, not decreased, for mission
critical control systems. Consequently, a risk assessment which includes noting local operational
constraints might result in local relaxation of security controls to enable better availability in
combination with enhanced surrounding countermeasures.
Additionally, IACS security clearly is consistent with the business IT security concept of least
privilege. The capability to enforce the concept of least privilege is thus a fundamental
requirement of IACS security, with granularity of permissions and flexibility of mapping those
permissions to roles sufficient to support it. Individual accountability should be available when
required, unless it has a detrimental impact on safety.
Revised: April 5, 2013
Copyright ISA
Page 4
3.1
Committee Scope
The scope of the committee includes industrial automation and control systems whose
compromise could result in any or all of the following situations:
endangerment of public or employee safety
damage to the environment
loss of public confidence
violation of regulatory requirements
loss of proprietary or confidential information
economic loss
impact on national security
Copyright ISA
Page 5
Processes
All activities of the ISA99 committee are conducted within the context of an ANSI-approved
consensus standards development process. General procedures and rules have been established
by the ISA Standards and Practices board. In addition, the committee has defined more specific
and detailed governance processes and procedures that assist in guiding committee activities.
3.1
1 Although the term SCADA is commonly used to refer to all types of control systems, the ISA99 committee makes a distinction
Copyright ISA
Page 6
Structure
The comprehensive approach of the ISA99 committee is reflected in its working group (WG)
structure, shown in Table 1, with each WG focusing on specific aspects of IACS security.
Table 1 ISA99 Work Groups
Name
Topic
Description
WG 1
Security technologies
WG 2
WG 3
WG 4
Technical Requirements
WG 5
Committee Leadership
WG 6
Patch Management
WG 7
WG 8
Communications and
Outreach
WG 9
WG 11
Copyright ISA
Page 7
Copyright ISA
Page 8
Status of Standards
The current status of each of the listed ISA-62443 documents is summarized in the following
table.
Table 2 ISA 62443 Series of Standards and Technical Reports Development Status
ISA Reference
IEC Reference
ISA-62443-1-1
IEC/TS 62443-1-1
Title
Status
ISA-TR62443-1-2
IEC/TR 62443-1-2
Under Development
Under Development
Published, Under
Revision
ISA-62443-1-3
IEC 62443-1-3
ISA-62443-1-4
IEC/TR 62443-1-4
Proposed
ISA-62443-2-1
IEC 62443-2-1
Published, Under
Revision
ISA-62443-2-2
IEC 62443-2-2
Proposed
ISA-TR62443-2-3
IEC/TR 62443-2-3
Under Development
Under Development
ISA-62443-2-4
IEC 62443-2-4
ISA-TR62443-3-1
IEC/TR 62443-3-1
ISA-62443-3-2
IEC 62443-3-2
ISA-62443-3-3
IEC 62443-3-3
ISA-62443-4-1
IEC 62443-4-1
Under Development
ISA-62443-4-2
IEC 62443-4-2
Under Development
Published
Under Development
Approved
For those documents under development or revision, working drafts are available for public
review and comment on the committee Wiki at http://isa99.isa.org.
Copyright ISA
Page 9
General Concepts
General Concept is a term applied to subjects that are important to the understanding of the
material in the ISA-62443 series, but are fairly common in the general area of cybersecurity.
Each of these concepts is provided as informative content in the first standard in the series, ISA624431-1-1, and may be referenced in subsequent standards in the series. At this time, the
following general concepts have been identified by the ISA99 committee:
Security Context
Security Objectives
Threat-Risk Assessment
Security Levels
Security Lifecycle
Security Program Maturity
Security Policies
Defense in Depth
Security Zones and Conduits
Role Based Access Control
4.3
Foundational Requirements
In addition to the general concepts, the first standard in the series, ISA-62443-1-1, defines a set
of foundational requirements which serve as a common frame of reference in the remaining
documents in the series. These foundational requirements are:
Identification and Authentication Control
Use Control
System Integrity
Data Confidentiality
Restricted Data Flow
Timely Response to Events
Resource Availability
These foundational requirements are used to semi-formally describe the security levels as well as
to structure the technical requirements on the system and component levels.
Copyright ISA
Page 10
Copyright ISA
Page 11
6.1
What do organizations see as the greatest challenges in improving cybersecurity practices across
critical infrastructure?
The ISA99 committee has taken a cross-sector approach to the development of Industrial
Automation and Control Systems standards and practices from the beginning. The committee
has a large, diverse and international membership that represents many sectors. The
committee has also been heavily influenced by cross-sector efforts such as the DHS Catalog
of Control Systems Security: Recommendations for Standards Developers, the DHS Crosssector Roadmap for Cybersecurity of Control Systems, NIST 800-53 Recommended Security
Control for Federal Information Systems and Organizations, and NIST 800-82 Guide to
Industrial Control Systems (ICS) Security.
Copyright ISA
Page 12
Describe your organizations policies and procedures governing risk generally and cybersecurity risk
specifically. How does senior management communicate and oversee these policies and procedures?
Risk analysis
Risk identification,
classification and
assessment
Business rationale
Selected security
countermeasures
Implementation
CSMS scope
Personnel
security
Risk
management and
implementation
Organize for
security
Physical and
environmental
security
System
development and
maintenance
Network
segmentation
Information and
document
management
Business
continuity plan
Access control:
Account
administration
Incident planning
and response
Security policies
and procedures
Access control:
Authentication
Access control:
Authorization
Conformance
Copyright ISA
Page 13
How do organizations define and assess risk generally and cybersecurity risk specifically?
To what extent is cybersecurity risk incorporated into organizations overarching enterprise risk
management?
What standards, guidelines, best practices, and tools are organizations using to understand, measure,
and manage risk at the management, operational, and technical levels?
What are the current regulatory and regulatory reporting requirements in the United States (e.g.
local, state, national, and other) for organizations relating to cybersecurity?
What organizational critical assets are interdependent upon other critical physical and information
infrastructures, including telecommunications, energy, financial services, water, and transportation
sectors?
Copyright ISA
Page 14
The ISA-62443-1-3 work product was created to address this specific question. While the
choice of specific goals may vary by situation, it is important that there be a well defined set
of metrics identified for use with other standards in the ISA-62443 series.
11. If your organization is required to report to more than one regulatory body, what information does
your organization report and what has been your organizations reporting experience?
The approach used to address IACS cybersecurity is dependent on factors including the
regulatory climate, the level of standardization of solutions, the relationship with the system
supplier(s) and the level of technical expertise available. It is the objective of the ISA99
committee to produce a set of consensus-based standards that can be applied in virtually any
sector, with the details tailored to meet the needs of the specific situation. This can be done
by the asset owner, the solution provider or an independent engineering company.
Copyright ISA
Page 15
The approach taken for a particular situation or by a particular organization can be influenced
by the size and complexity of systems and the level of technical expertise available. The
large number of companies represented by the members of the ISA99 committee is a clear
indicator that there is strong support for robust, multi-industry international standards.
4.
Standards are more useful if they are comprehensive in scope and available sooner. To that
end the most immediate opportunity is to sponsor and support the involvement of more
industry experts in their development, and to provide the necessary administrative support to
accelerate the development process.
Also, in securing industrial control systems the sometimes complex and arcane security
related topics and recommendations must be expressed in terms and within a framework that
can be understood and managed by operations and control engineers who are not security
experts. Their expertise and major driver is to operate the process under control in the safest,
most efficient and profitable manner possible. Moreover, their language is that of
operations, and not security.
6.
ISA formed the ISA99 committee to address the need for cybersecurity standards for
industrial automation and control systems regardless of the sector (or country) in which they
are employed. The committee has benefited from long term support from many large,
multinational companies throughout the process industries. It clearly makes considerably
more business sense to have comprehensive, sector-independent standards than to attack the
problem on a sector-by-sector basis.
7.
When using an existing framework, should there be a related sector-specific standards development
process or voluntary program?
See above response to question 6. The essential elements of effective standards can be
largely sector independent. The nature of how such standards are applied and the specific
metrics or performance levels applied can and should be variable by sector, depending on the
nature of the processes, materials used, and importance to the critical infrastructure.
Revised: April 5, 2013
Copyright ISA
Page 16
What can the role of sector-specific agencies and related sector coordinating councils be in
developing and promoting the use of these approaches?
Sector-specific agencies and coordinating councils can promote the use of standards and
encourage their members to adopt generally acceptable practices consistent with those
standards. They can also sponsor and support standards development by sharing their
experience and expertise.
9.
Improvements are always desirable in the degree of outreach and collaboration across sectors
and across borders. The ISA99 committee has established liaison relationships in vital areas
such as process safety and nuclear plant cybersecurity.
6.3
Describing and promoting such practices is an essential theme of the entire ISA-62443 series
of standards. Such practices must fully address not only security technology, but also the
people and process elements of the subject. As described in ISA-62443-1-1, Terminology,
Concepts and Models:
log
no
ch
Te
Pr
oc
es
s
To establish a mature and robust IACS cybersecurity program requires that attention
and resources are devoted to the principles of people, processes, and technology.
This concept has also been referred to as the people-process-technology triad or triangle.
The people-process-technology concept has been applied to business processes moreover
than just cybersecurity. The basic premise is that people, processes, and technology all
have roles in the cybersecurity of IACS.
Security
People
Copyright ISA
Page 17
Are these practices widely used throughout critical infrastructure and industry?
While it not our place as a standards committee to comment on what practices are widely
used, we can state that the ISA-62443 series of standards addresses all of these practices (and
more), with the exception of privacy and civil liberties protection. These latter items are not
typically emphasized in protecting industrial systems since these systems usually do not
contain a great deal of personal information.
The ISA-62443 Policy and Procedure documents define when and how these and other
practices should be applied. The System documents and Component documents address the
technologies and how they should be applied.
2.
The ISA99 committee has made great efforts to bring together numerous standards and
recommendations that exist and then to create a comprehensive set of documents that is
consistent and broadly applicable to all IACS scenarios. The members of the ISA99
committee have worked closely with or are members of other key ISA, IEC and NIST teams.
The bibliography sections of the documents include many references to existing documents
as proof of the inclusive nature of the ISA99 initiative. See section 5 above.
As a result, the ISA-62443 standards are gaining increased attention internationally, and
across many sectors. For example, ISA-62443-2-1, IACS Security Management System
Requirements, is currently being revised to address comments from the international
community and to improve its alignment with the ISO 27000 series of standards for
information security.
More information on the relationships between the ISA-62443 standards and other
international standards is given in section 5 of this document.
3.
Which of these practices do commenters see as being the most critical for the secure operation of
critical infrastructure?
Because of the ever-changing nature of threats and technology and the uniqueness of each
situation, our committee does not prescribe a list of measures for all situations. The ISA62443 series includes a risk-based methodology for selecting the practices that are most
appropriate to mitigate risk for a given situation.
Revised: April 5, 2013
Copyright ISA
Page 18
Are some of these practices not applicable for business or mission needs within particular sectors?
The position of the ISA99 committee is that providing a straightforward list of practices is
the correct approach to security always keeping in mind that the overriding goal is to
achieve an appropriate security program for a given situation. This includes the need to
provide a life cycle which may change what is needed over time.
ISA-62443-2-1 Clause 0.2 states:
There is not a one-size-fits-all set of security practices. Absolute security may be
achievable, but is probably undesirable because of the loss of functionality that would be
necessary to achieve this near perfect state. Security is really a balance of risk versus
cost.
5.
Again it is difficult to be specific without details on the IACS system. Any measure that
removes or limits an operators view of the process will be difficult to implement. Practices
like individual passwords or system patching are considerably more difficult to apply on an
IACS.
To use patching as an example, on a business system patches are pushed down from a central
system once the patches are released from the vendor and some general testing is completed.
For an IACS, in contrast, it is often necessary to perform extra testing and wait for the system
to not be in use, and then apply the patch by hand to ensure that the system is ready to use
after the patch is applied.
6.
How are standards or guidelines used by organizations in the implementation of these practices?
The ISA-62443 series is designed to be the most comprehensive set of standards that will, in
conjunction with any regulation-specific documents, provide organizations the guidance
needed to develop and maintain an appropriate security program for their operations.
7.
Do organizations have a methodology in place for the proper allocation of business resources to
invest in, create, and maintain IT standards?
Copyright ISA
Page 19
Do organizations have a formal escalation process to address cybersecurity risks that suddenly
increase in severity?
What risks to privacy and civil liberties do commenters perceive in the application of these practices?
The ISA-62443 documents are developed using input, references and industrial cybersecurity
experts from across the globe. Reflecting this international collaboration, the numbering
system for the ISA-62443 series is based on IEC document numbering. It is the ISA99
committees firm direction to create documents that are published by the IEC as soon as
possible after completing the ISA standards process.
11. How should any risks to privacy and civil liberties be managed?
The concepts and definitions of privacy and civil liberties are very dependent on country and
cultural background. Since the ISA99 committee is developing a global set of standards,
these topics can only be addressed from a very high level. As stated in the response to
question 9 (above), these topics need to be addressed in ISA-62443-2-2.
Copyright ISA
Page 20
The ISA-62443 series assumes continual assessment and response to new and changing risks,
so this list will always be subject to revision. The practices that form the basis of effective
IACS security include what the standards describe as Fundamental Concepts. These
include (but are not limited to):
Separation of functions using the concept of zones and conduits. A specific and critical
example of this is the distinction between basic control and safety functions.
Maintaining overall system integrity (including but not limited to data integrity).
Copyright ISA
Page 21