Isa 62443 1 1 WD
Isa 62443 1 1 WD
Isa 62443 1 1 WD
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
FOR USE AND REVIEW ONLY BY MEMBERS OF ISA99 AND APPROVED PARTIES:
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
THIS COPY OF A FULL OR ABRIDGED ISA PUBLICATION IS TO BE USED SOLELY FOR THE PURPOSES OF
Copyright by the International Society of Automaton. All rights reserved. Not for resale. Printed in
the United States of America. No part of this publication may be reproduced, stored in a retrieval
system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording, or
otherwise), without the prior written permission of the Publisher.
ISA
67 Alexander Drive
P. O. Box 12277
Research Triangle Park, North Carolina 27709
USA
This page intentionally left blank
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
10
9
8
7
6
5
4
3
2
1
Draft 6, Edit 2
ISA-62443-1-1
September 2016
Models and Concepts
Security for industrial automation and control systems
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA-62443-1-1, D6E2, September 2016 4 ISA99, WG03
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
11 ISA
14 ISBN: -to-be-assigned-
15 Copyright 2016 by ISA. All rights reserved. Not for resale. Printed in the United States of America.
16
17 ISA
18 67 Alexander Drive
19 P. O. Box 12277
20 Research Triangle Park, NC 27709 USA
21
ISA99, WG03 5 ISA-624431-1, D6E2, September 2016
22 PREFACE
23 This preface, as well as all footnotes and annexes, is included for information purposes and is not
24 part of ISA-62443-1-1.
25 This document has been prepared as part of the service of ISA, the Internatio nal Society of
26 Automation, toward a goal of uniformity in the field of instrumentation. To be of real value, this
27 document should not be static but should be subject to periodic review. Toward this end, the Society
28 welcomes all comments and criticisms and asks that they be addressed to the Secretary, Standards
29 and Practices Board; ISA; 67 Alexander Drive; P. O. Box 12277; Research Triangle Park, NC
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
30 27709; Telephone (919) 549-8411; Fax (919) 549-8288; E-mail: standards@isa.org.
31 The ISA Standards and Practices Department is aware of the growing need for attention to the
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
32 metric system of units in general and the International System of Units (SI) in particular, in the
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
33 preparation of instrumentation standards. The Department is further aware of the benefits to U SA
34 users of ISA standards of incorporating suitable references to the SI (and the metric system) in
41 It is the policy of ISA to encourage and welcome the participation of all concerned individuals and
42 interests in the development of ISA standards, recommended practices and technical reports.
43 Participation in the ISA standards-making process by an individual in no way constitutes
44 endorsement by the employer of that individual, of ISA or of any of the standards, recommended
45 practices and technical reports that ISA develops.
46 CAUTION ISA adheres to the policy of the American National Standards Institute with
47 regard to patents. If ISA is informed of an existing patent that is required for use of the
48 standard, it will require the owner of the patent to either grant a royalty-free license for use
49 of the patent by users complying with the standard or a license on reasonable terms and
50 conditions that are free from unfair discrimination.
51 Even if ISA is unaware of any patent covering this Standard, the user is cautioned that
52 implementation of the standard may require use of techniques, processes or materials
53 covered by patent rights. ISA takes no position on the existence or validity of any patent
54 rights that may be involved in implementing the standard. ISA is not responsible for
55 identifying all patents that may require a license before implementation of the standard or
56 for investigating the validity or scope of any patents brought to its attention. The user should
57 carefully investigate relevant patents before using the standard for the users intended
58 application.
59 However, ISA asks that anyone reviewing this standard who is aware of any patents that may
60 impact implementation of the standard notify the ISA Standards and Practices Departme nt
61 of the patent and its owner.
62 Additionally, the use of this standard may involve hazardous materials, operations or
63 equipment. The standard cannot anticipate all possible applications or address all possible
64 safety issues associated with use in hazardous conditions. The user of this standard must
65 exercise sound professional judgment concerning its use and applicability under the users
66 particular circumstances. The user must also consider the applicability of any governmental
67 regulatory limitations and established safety and health practices before implementing this
68 standard.
ISA-62443-1-1, D6E2, September 2016 6 ISA99, WG03
69 The following people served as active members of ISA99, Working Group 03 during the preparation
70 of this document:
71
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
Tom Good Consultant
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
Dennis Holstein OPUS Consulting Group
Jean-Pierre Hauet
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
Vic Hammond Argon National Labs
72
ISA99, WG03 7 ISA-624431-1, D6E2, September 2016
73 TABLE OF CONTENTS
74 PREFACE ............................................................................................................................... 5
75 FOREWORD ......................................................................................................................... 11
76 INTRODUCTION ................................................................................................................... 12
77 0 Scope ............................................................................................................................. 13
78 1 Normative references ..................................................................................................... 13
79 2 Terms, definitions, abbreviated terms, acronyms, and conventions ................................. 14
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
80 2.1 Terms and definitions ............................................................................................ 14
81 2.2 Abbreviated terms and acronyms ........................................................................... 26
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
82 2.3 Conventions .......................................................................................................... 26
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
83 3 The ISA62443 series ..................................................................................................... 28
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
124 9.4 Defense in Depth ................................................................................................... 50
125 9.5 Threat-Risk Assessment ........................................................................................ 50
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
126 9.6 Policies and Procedures ........................................................................................ 50
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
127 9.7 Topics Covered by Policies and Procedures .......................................................... 53
128 9.8 Supply Chain Security ........................................................................................... 55
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
162 Figure 6 Reference Model .................................................................................................. 44
163 Figure 7 Physical Architecture Model Example ................................................................... 46
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
164 Figure 8 Zone Model Example ............................................................................................ 47
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
165 Figure 9 Context Element Relationships ............................................................................. 49
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
198 Table 6 Implementation Phase ........................................................................................... 68
199 Table 7 Operations Phase .................................................................................................. 68
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
200 Table 8 Recycle and Disposal Phase ................................................................................. 68
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
201 Table B-1 Typical Likelihood Scale .................................................................................... 98
Table B-2 Typical Consequence Scale ............................................................................... 98
207
ISA99, WG03 11 ISA-624431-1, D6E2, September 2016
208 FOREWORD
209 This document is the first of a series of standards and technical reports that addresses the issue
210 of security for industrial automation and control systems (IACS). It has been developed by working
211 group 03 of the ISA99 committee in cooperation with IEC Technical Committee, Work Group 10.
212 This standard describes the concepts and models that form the foundation of all documents in the
213 series. Many of these topics are addressed in more detail in one or more related standards or
214 reports.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
215 This document supersedes the first edition of this standard, which was published as ISA99.00.01
216 2007.
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
217
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
ISA-62443-1-1, D6E2, September 2016 12 ISA99, WG03
218 INTRODUCTION
219 The format of this document follows the requirements and conventions presented in ISO/IEC
220 Directives, Part 2. [1] 1 These directives specify the format of this document as well as the use of
221 terms like shall, should, and may. The use of those terms for the requirements specified in
222 Clause 3 of this document use the conventions discussed in the ISO/IEC Directives, Appendix H.
223
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
1 Numbers in brackets refer to the Bibliography.
ISA99, WG03 13 ISA-624431-1, D6E2, September 2016
224 0 Scope
225 This standard introduces concepts and models that are d escribed and applied in more detail in
226 subsequent standards in the series.
227 The content includes both general purpose cyber security elements that are applicable in the
228 Industrial Automation and Control Systems (I ACS) environment, as well as a small set of concepts
229 and models that are specific or unique to IACS. Normative content is limited to what required to
230 define essential concepts that must be consistently applied across all aspects of and IACS security
231 response.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
232 The intended audience for this standard is the IACS community, including asset owners, system
233 integrators, product suppliers, service providers and, where appropriate, compliance authorities.
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
234 Compliance authorities include but are not limited to government agencies and regulators with the
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
235 legal authority to perform audits to verify compliance with governing laws and regulations.
242 There is insufficient detail in this standard to design and build a comprehensive security
243 architecture. That requires additional system -level analysis and development of derived
244 requirements that are the subject of other standards in the ISA62443 series.
245
250 ISATR62443-1-2, Security for Industrial Automation and Con trol Systems Master Glossary
251 ISA62443-2-1, Security for industrial automation and control systems Requirements for an
252 Industrial automation and control system security management system
253 ISA62443-3-2, Security for Industrial Automation and Control Systems Security Risk Assessment
254 and System Design
255 ISA62443-3-3, Security for Industrial Automation and C ontrol Systems System Security
256 Requirements and Security Levels
257 ISA62443-4-1, Security for Industrial Automation and Control Systems Product Development
258 Requirements
259 ISA62443-4-2, Security for Industrial Automation and Control Systems Technical Security
260 Requirements for IACS Components
261 ISO/IEC 27001 Information technology Security techniques Information security management
262 systems Requirements
263 ISO/IEC 27002, Information technology Security techniques Code of practice for information
264 security management
265
ISA-62443-1-1, D6E2, September 2016 14 ISA99, WG03
270 2.1.1
271 access
272 ability and means to communicate with or otherwise interact with a system in order to use syst em
273
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
resources
274 Note to entry: Access may involve physical access (authorization to be allowed physically in an area, possession of a
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
275 physical key lock, PIN code, or access card or biometric attributes that allow access) or logical access (authorization to
276 log in to a system and application, through a combination of logical and physical means)
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
277 2.1.2
278 access control
282 2.1.3
283 accountability
284 property of a system (including all of its system resources) that ensures that the actions of a system
285 entity may be traced uniquely to that entity, which can be held responsible for its actions
286 2.1.4
287 actuator
288 actuating element connected to process equipment and to the control system
289 2.1.5
290 application
291 software programs executing on the infrastructure that are used to interface with the pr ocess or the
292 control system itself
293 2.1.6
294 area
295 subset of a sites physical, geographic, or logical group of assets
296 Note to entry: An area may contain manufacturing lines, process cells, and production units. Areas may be connected to
297 each other by a site local area network and may contain systems related to the operations performed in that area.
298 2.1.7
299 asset
300 physical or logical object owned by or under the custodial duties of an organization, having either
301 a perceived or actual value to the organization
302 Note to entry: In the case of industrial automation and control systems the physical assets that have the largest directly
303 measurable value may be the equipment under control.
304 2.1.8
305 asset operator
306 individual or organization responsible for the operation of the IACS
307 2.1.9
308 asset owner
309 individual or organization that owns the IACS assets
ISA99, WG03 15 ISA-624431-1, D6E2, September 2016
310 2.1.10
311 attack
312 assault on a system that derives from an intelligent threat i.e., an intelligent act that is a
313 deliberate attempt (especially in the sense of a method or technique) to evade security serv ices
314 and violate the security policy of a system
315 Note to entry: There are different commonly recognized classes of attack:
316 An active attack attempts to alter system resources or affect their operation. A passive attack attempts to learn or
317 make use of information from the system but does not affect system resources.
318 An inside attack is an attack initiated by an entity inside the security perimeter (an insider) i.e., an entity that is
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
319 authorized to access system resources but uses them in a way no t approved by those who granted the authorization. An
320 outside attack is initiated from outside the perimeter, by an unauthorized or illegitimate user of the system (including an
321 insider attacking from outside the security perimeter). Potential outside at tackers range from amateur pranksters to
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
322 organized criminals, international terrorists, and hostile governments.
323
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
2.1.11
324 audit
325
335 2.1.13
336 authorization
337 right or a permission that is granted to a system entity t o access a system resource
338 2.1.14
339 availability
340 probability that an asset, under the combined influence of its reliability, maintainability, and
341 security, will be able to fulfill its required function over a stated period of time, or at a given point
342 in time
343 2.1.15
344 border
345 edge or boundary of a physical or logical zone
346 2.1.16
347 botnet
348 collection of software robots, or bots, which run autonomously
349 Note to entry: A botnet's originator can control the group remotely, possibly for nefarious purposes.
350 2.1.17
351 boundary
352 software, hardware, or other physical barrier that limits access to a system or part of a system
353 2.1.18
354 business system
355 collection of information technology elements (i.e., hardware, software and services) installed with
356 the intent to facilitate an organizations business process or processes (administrative or project)
ISA-62443-1-1, D6E2, September 2016 16 ISA99, WG03
357 2.1.19
358 cell
359 lower-level element of a manufacturing process that performs manufacturing, field device control,
360 or vehicle functions
361 Note to entry: Entities at this level may be connected together by an area control network and may contain information
362 systems related to the operations performed in that entity.
363 2.1.20
364 channel
365 specific communication path established within a communication conduit (See conduit).
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
366 2.1.21
367 client
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
368 device or application receiving or requesting services or info rmation from a server application
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
369 2.1.22
375 2.1.23
376 communication system
377 arrangement of hardware, software, and propagation media to allow the transfer of messages
378 (ISO/IEC 7498 application layer service data units) from one application to another
379 2.1.24
380 compromise
381 unauthorized disclosure, modification, substitution, or use of information (incl uding plaintext
382 cryptographic keys and other critical security parameters)
383 2.1.25
384 conduit
385 logical grouping of communication assets that protects the security of the channels it contains
386 Note to entry: This is analogous to the way that a physical co nduit protects cables from physical damage.
387 2.1.26
388 confidentiality
389 assurance that information is not disclosed to unauthorized individuals, processes, or devices
390 2.1.27
391 control center
392 central location used to operate a set of assets
393 Note to entry: Infrastructure industries typicall y use one or more control centers to supervise or coordinate their
394 operations. If there are multiple control centers (for example, a backup center at a separate site), they are typically
395 connected together via a wide area network. The control center contai ns the SCADA host computers and associated
396 operator display devices plus ancillary information systems such as a historian.
397 Note to entry: In some industries the term control room may be mor e commonly used.
398 2.1.28
399 control equipment
400 class that includes distributed control systems, programmable logic controllers, SCADA systems,
401 associated operator interface consoles, and field sensing and control devices used to manage and
402 control the process
403 Note to entry: The term also includes field bus networks where control logic and algorithms are executed on intelligent
404 electronic devices that coordinate actions with each other, as well as systems used to monitor the process and the
405 systems used to maintain the process.
ISA99, WG03 17 ISA-624431-1, D6E2, September 2016
406 2.1.29
407 control network
408 time-critical network that is typically connected to equipment that controls physical processes
409 Note to entry: The control network can be subdivided into zones, and there can be multiple separate control networks
410 within one company or site.
411 2.1.30
412 cost
413 value of impact to an organization or person that can be measured
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
414 2.1.31
415 countermeasure
416 action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
417 eliminating or preventing it, by minimizing the harm it can cause, or by disc overing and reporting it
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
418 so that corrective action can be taken
419 Note to entry: The term Control is also used to describe this concept in some contexts. The term countermeasure has
425 2.1.33
426 cryptographic key
427 input parameter that varies the transformation performed by a cryptographic algorithm
428 Note to entry: Usually shortened to just key.
429 2.1.34
430 data confidentiality
431 property that information is not made available or disclosed to any unauthorized system entity,
432 including unauthorized individuals, entities, or processes
433 2.1.35
434 data integrity
435 property that data has not been changed, destroyed, or lost in an unauthorized or accidental
436 manner
437 Note to entry: This term deals with constancy of and confidence in data values, not wi th the information that the values
438 represent or the trustworthiness of the source of the values.
439 2.1.36
440 decryption
441 process of changing cipher text into plaintext using a cryptographic algorithm and key (See
442 encryption)
443 2.1.37
444 defense in depth
445 provision of multiple security protections, especially in layers, with the intent to delay if not prevent
446 an attack
447 Note to entry: Defense in depth implies layers of security and detection, even on single systems, and provides the
448 following features:
449 a) attackers are faced with breaking through or bypassing each layer without being detected
450 b) flaw in one layer can be mitigated by capabilities in other layers
451 c) system security becomes a set of layers within the overall network security.
ISA-62443-1-1, D6E2, September 2016 18 ISA99, WG03
452 2.1.38
453 demilitarized zone
454 perimeter network segment that is logically between internal and external networks
455 Note to entry: The purpose of a demilitarized zone is to enforce the internal networks policy for external information
456 exchange and to provide external, untrusted sources with restricted access to relea sable information while shielding the
457 internal network from outside attacks.
458 Note to entry: In the context of industrial automation and control systems, the term internal network is typically applied
459 to the network or segment that is the primary focus of protection. For example, a control network could be considered
460 internal when connected to an external business network.
461 2.1.39
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
462 denial of service
463 prevention or interruption of authorized access to a system resource or the delaying of system
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
464 operations and functions
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
465 Note to entry: In the context of industrial automation and control systems, denial of service can refer to loss of process
466 function, not just loss of data communications.
471 2.1.41
472 distributed control system
473 type of control system in which the system elements are dispersed but operated in a coupled
474 manner
475 Note to entry: Distributed control systems may have shorter coupling time constants than those typically found in SCADA
476 systems.
477 Note 2 to entry: Distributed control systems are commonly associated with continuous processes such as electric power
478 generation; oil and gas refining; chemical, pharmaceutical and paper manufacture, as well as discrete processes such as
479 automobile and other goods manufacture, packaging, and warehousing.
480 2.1.42
481 domain
482 environment or context that is defined by a security policy, security model, or s ecurity architecture
483 to include a set of system resources and the set of system entities that have the right to access the
484 resources
485 2.1.43
486 eavesdropping
487 monitoring or recording of communicated information by unauthorized parties
488 2.1.44
489 electronic security
490 actions required to preclude unauthorized use of, denial of service to, modifications to, disclosure
491 of, loss of revenue from, or destruction of critical systems or informational assets
492 Note to entry: The objective is to reduce the risk of causing personal injury or endangering public health, losing public or
493 consumer confidence, disclosing sensitive assets, failing to protect business assets or failing to comply with regulations.
494 These concepts are applied to any system in the production process and include both s tand-alone and networked
495 components. Communications between systems may be either through internal messaging or by any human or machine
496 interfaces that authenticate, operate, control, or exchange data with any of these control systems. Electronic security
497 includes the concepts of identification, authentication, accountability, authorization, availability, and privacy.
498 2.1.45
499 encryption
500 cryptographic transformation of plaintext into ciphertext that conceals the datas original meaning
501 to prevent it from being known or used (See decryption)
ISA99, WG03 19 ISA-624431-1, D6E2, September 2016
502 Note to entry: If the transformation is reversible, the corresponding reversal process is called decryption, which is a
503 transformation that restores encrypted data to its original state.
504 2.1.46
505 enterprise
506 business entity that produces or transports products or operates and maintains infrastructure
507 services
508 2.1.47
509 equipment under control
510 equipment, machinery, apparatus or plant used for manufacturing, process, transportation, medical
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
511 or other activities
512 2.1.48
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
513 essential function
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
514 function or capability that is required to maintain health, safety, the environment and availability for
515 the equipment under control
542 2.1.53
543 industrial automation and control systems
544 collection of personnel, hardware, and software that can affect or influence the safe, secure, and
545 reliable operation of an industrial process
546 Note to entry: These systems include, but are not limited to:
547 a) industrial control systems, including distributed control systems (DCSs), programmable logic controllers (PLCs),
548 remote terminal units (RTUs), intelligent electronic devices, supervisory control and data acquisition (SCADA),
549 networked electronic sensing and control, and monitoring and diagnostic syste ms. (In this context, process
550 control systems include basic process control system and safety -instrumented system [SIS] functions, whether
551 they are physically separate or integrated.)
ISA-62443-1-1, D6E2, September 2016 20 ISA99, WG03
552 b) associated information systems such as advanced or multivariable control , online optimizers, dedicated
553 equipment monitors, graphical interfaces, process historians, manufacturing execution systems, and plant
554 information management systems.
555 c) associated internal, human, network, or machine interfaces used to provide control, safe ty, and manufacturing
556 operations functionality to continuous, batch, discrete, and other processes.
557 2.1.54
558 insider
559 trusted person, employee, contractor, or supplier who has information that is not generally known
560 to the public (See outsider)
561
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2.1.55
562 integrity
563 quality of a system reflecting the logical correctness and reliability of the operating system, the
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
564 logical completeness of the hardware and software implementing the protection mechanisms, and
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
565 the consistency of the data structures and occurrence of the stored data
566
573 2.1.57
574 interface
575 logical entry or exit point that provides access to the module f or logical information flows
576 2.1.58
577 intrusion
578 unauthorized act of compromising a system (See attack).
579 2.1.59
580 intrusion detection
581 security service that monitors and analyzes system events for the purpose of finding, and providing
582 real-time or near real-time warning of, attempts to access system resources in an unauthorized
583 manner
584 2.1.60
585 ISO
586 International Organization for Standardization
587 2.1.61
588 key management
589 process of handling and controlling cryptographic keys and related material (such as initialization
590 values) during their life cycle in a cryptographic system, including ordering, generating, distributing,
591 storing, loading, escrowing, archiving, auditing, and destroying the keys and related material
592 2.1.62
593 line
594 lower-level element of a manufacturing process that performs manufactur ing, field device control,
595 or vehicle functions
596 Note to entry: See Cell
597 2.1.63
598 local area network
599 communications network designed to connect computers and other intelligent devices in a limited
600 geographic area (typically less than 10 kilometers)
ISA99, WG03 21 ISA-624431-1, D6E2, September 2016
601 2.1.64
602 malicious code
603 programs or code written for the purpose of gathering information about systems or users,
604 destroying system data, providing a foothold for further intrusion into a system, falsifying system
605 data and reports, or providing time-consuming irritation to system operations and maintenance
606 personnel
607 Note to entry: Malicious code attacks can take the form of viruses, worms, Trojan Horses, or other automated exploits.
608 Note to entry: Malicious code is also often referred to as malware.
609 2.1.65
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
610 manufacturing operations
611 collection of production, maintenance, and quality assurance operations and their relationship to
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
612 other activities of a production facility
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
613 Note to entry: Manufacturing operations include:
614 a) manufacturing or processing facility activities that coordinate the personnel, equipment, and material involved
632 2.1.69
633 plaintext
634 unencoded data that is input to and transformed by an encryption process, or that is output by a
635 decryption process
636 2.1.70
637 privilege
638 authorization or set of authorizations to perform specific functions, especially in the context of a
639 computer operating system
640 Note to entry: Examples of functions that are controlled through the use of privilege include acknowledging alarms,
641 changing setpoints, modifying control algorithms.
642 2.1.71
643 process
644 series of operations performed in the making, treatment or transportation of a product or material
645 Note to entry: This standard makes extensive use of the term process to describe the equipment u nder control of the
646 industrial automation and control system.
ISA-62443-1-1, D6E2, September 2016 22 ISA99, WG03
647 2.1.72
648 protocol
649 set of rules (i.e., formats and procedures) to implement and control some type of association (e.g.,
650 communication) between systems
651 2.1.73
652 reference model
653 framework for understanding significant relationships among the entities of some environment, and
654 for the development of consistent standards or specifications supporting that environment.
655
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
Note to entry: A reference model is based on a small number of unifying concepts and may be used as a basis for
656 education and explaining standards to a non-specialist.
657 2.1.74
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
658 reliability
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
659 ability of a system to perform a required function under stated conditions for a specified period of
660 time
672 2.1.77
673 risk
674 expectation of loss expressed as the probability that a particular threat will exploit a particular
675 vulnerability with a particular consequence
676 2.1.78
677 risk assessment
678 process that systematically identifies potential vulnerabilities to valuable system resources and
679 threats to those resources, quantifies loss exposures and consequences based on probability of
680 occurrence, and (optionally) recommends how to allocate resources to countermeasures to
681 minimize total exposure
682 Note to entry: Types of resources include physical, logical and human.
683 Note to entry: Risk assessments are often combined with vulnerability assessments to identify vulnerabilit ies and quantify
684 the associated risk. They are carried out initially and periodically to reflect changes in the organization's risk tolerance,
685 vulnerabilities, procedures, personnel and technological changes.
686 2.1.79
687 risk management
688 process of identifying and applying countermeasures commensurate with the value of the assets
689 protected based on a risk assessment
690 2.1.80
691 router
692 gateway between two networks at OSI layer 3 and that relays and directs data packets through that
693 inter-network. The most common form of router passes Internet Protocol (IP) packets
ISA99, WG03 23 ISA-624431-1, D6E2, September 2016
694 2.1.81
695 safety
696 freedom from unacceptable risk
697 2.1.82
698 safety-instrumented system
699 system used to implement one or more safety-instrumented functions
700 Note to entry: A safety-instrumented system is composed of any combination of sensor(s ), logic solver(s), and actuator(s).
701 2.1.83
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
702 safety integrity level
703 discrete level (one out of four) for specifying the safety integrity requirements of the safety -
704 instrumented functions to be allocated to the safety-instrumented systems
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
705 Note to entry: Safety integrity level 4 has the highest level of safety integrity; safety integrity level 1 has the lowest.
706 2.1.84
710 2.1.85
711 security
712 1. measures taken to protect a system
713 2. condition of a system that results from the establishment and maintenance of measures to
714 protect the system
715 3. condition of system resources being free from unauthorized access and from unauthorized or
716 accidental change, destruction, or loss
720 5. prevention of illegal or unwanted penetration of or interference with the proper and intended
721 operation of an industrial automation and control system
722 Note to entry: Measures can be controls related to physical security (controlling physical access to computing assets) or
723 logical security (capability to login to a given system and application.)
724 2.1.86
725 security architecture
726 plan and set of principles that describe the security services that a system is required to provide to
727 meet the needs of its users, the system elements required to implement the services, and the
728 performance levels required in the elements to deal with the threat environment
729 Note to entry: In this context, security architecture would be an architecture to protect the control netwo rk from intentional
730 or unintentional security events.
731 2.1.87
732 security audit
733 independent review and examination of a system's records and activities to determine the adequacy
734 of system controls, ensure compliance with established security policy and procedures, detect
735 breaches in security services, and recommend any changes that are indicated for countermeasures
736 2.1.88
737 security control
738 See countermeasure
ISA-62443-1-1, D6E2, September 2016 24 ISA99, WG03
739 2.1.89
740 security event
741 occurrence in a system that is relevant to the security of the system
742 2.1.90
743 security incident
744 adverse event in a system or network or the threat of the occurrence of such an event
745 Note to entry: The term near miss is sometimes used to describe an event that could have been an incident under
746 slightly different circumstances.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
747 2.1.91
748 security level
749 level corresponding to the required effectiveness of countermeasures and inherent security
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
750 properties of devices and systems for a zone or conduit based on assessment of risk for the zone
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
751 or conduit
757 2.1.93
758 security perimeter
759 boundary (logical or physical) of the domain in which a security poli cy or security architecture
760 applies, i.e., the boundary of the space in which security services protect system resources
761 2.1.94
762 security policy
763 set of rules that specify or regulate how a system or organization provides security services to
764 protect its assets
765 2.1.95
766 security procedures
767 definitions of exactly how practices are implemented and executed
768 2.1.96
769 security program
770 a combination of all aspects of managing security, ranging from the definition and communication
771 of policies through implementation of best industry prac tices and ongoing operation and auditing
772 2.1.97
773 security services
774 mechanisms used to provide confidentiality, data integrity, authentication, or no repudiation of
775 information
776 2.1.98
777 security violation
778 act or event that disobeys or otherwise breaches security policy t hrough an intrusion or the actions
779 of a well-meaning insider
780 2.1.99
781 zone
782 grouping of logical or physical assets that share common security requirements
783 Note to entry: All unqualified uses of the word zone in this standard should be assumed to refer to a security zone.
784 Note to entry: A zone has a clear border with other zones. The security policy of a zone is typically enforced by a
785 combination of mechanisms both at the zone edge and within the zone. Zones can be hierarchical in the sense that they
786 can be comprised of a collection of subzones.
ISA99, WG03 25 ISA-624431-1, D6E2, September 2016
787 2.1.100
788 sensor
789 measuring element connected to process equipment and to the control system
790 2.1.101
791 server
792 device or application that provides information or services to client applications and devices
793 2.1.102
794 supervisory control and data acquisition (SCADA) system
795
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
type of loosely coupled distributed monitoring and control system commonly associated with electric
796 power transmission and distribution systems, oil and gas pipelines, and water and sewage systems
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
797 Note to entry: Supervisory control systems are also used within batch, continuous, and discrete manufacturing plants to
798 centralize monitoring and control activities for these sites.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
799 2.1.103
802 2.1.104
803 system software
804 special software designed for a specific computer system or family of computer systems to facilitate
805 the operation and maintenance of the computer system and associated programs and data
806 2.1.105
807 threat
808 potential for violation of security, which exists when there is a circumstance, capability, action, or
809 event that could breach security and cause harm
810 2.1.106
811 traffic analysis
812 inference of information from observable characteristics of data flow(s), even when the data are
813 encrypted or otherwise not directly available, including the identities and locations of source(s) and
814 destination(s) and the presence, amount, frequency, and duration of occurrence
815 2.1.107
816 trojan horse
817 computer program that appears to have a useful function, but also has a hidden and potentially
818 malicious function that evades security mechanisms, sometimes by exploiting legitimate
819 authorizations of a system entity that invokes the program
820 2.1.108
821 unit
822 lower-level element of a manufacturing process that performs manufacturing, field device control,
823 or vehicle functions
824 Note to entry: See Cell
825 2.1.109
826 use case
827 technique for capturing potential functional requirements that employs the use of one or more
828 scenarios that convey how the system should interact with the end user or another system to
829 achieve a specific goal
830 Note to entry: Typically use cases treat the system as a black box, and the interactions with the system, including system
831 responses, are as perceived from outside of the system. Use cases are popular because they simplify the description of
832 requirements, and avoid the problem of making assumptions about how this functionality will be accomplished.
ISA-62443-1-1, D6E2, September 2016 26 ISA99, WG03
833 2.1.110
834 user
835 person, organization entity, or automated process that accesses a system, whether authorized to
836 do so or not
837 2.1.111
838 virus
839 self-replicating or self-reproducing program that spreads by inserting copies of itself into other
840 executable code or documents
841
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2.1.112
842 vulnerability
843 flaw or weakness in a system's design, implementation, or operation and management that could
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
844 be exploited to violate the system's integrity or security pol icy
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
845 2.1.113
846
849 2.1.114
850 wiretapping
851 attack that intercepts and accesses data and other information contained in a f low in a
852 communication system
853 Note to entry: Although the term originally referred to making a mechanical connection to an electrical conductor that
854 links two nodes, it is now used to refer to reading information from any sort of medium used for a link or even directly
855 from a node, such as a gateway or subnetwork switch.
856 Note to entry: Active wiretapping attempts to alter the data or otherwise affect the flow; passive wiretapping only
857 attempts to observe the flow and gain knowledge of information it con tains.
858 2.1.115
859 worm
860 computer program that can run independently, can propagate a complete working version of itself
861 onto other hosts on a network, and may consume computer resources destructively
868 shall: The word shall, equivalent to "is required to", is used to indicate mandatory
869 requirements, to be followed strictly in order to confor m to the standard and from which
870 no deviation is permitted.
871 must: The use of the word must is depreciated and shall not be used when stating mandatory
872 requirements. The word must is only used to describe unavoidable situations.
873 should: The word should, equivalent to "is recommended that", is used to indicate
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
874 Among several possibilities one is recommended as particularly suitable, without
875 mentioning or excluding others.
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
876 That a certain course of action is preferred but not required.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
877 That (in the negative form) a certain course of action is depreciated but not
886
ISA-62443-1-1, D6E2, September 2016 28 ISA99, WG03
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
896 fragile to another. Such a trade-off is the subject of profiles, which others can derive from the
897 ISA62443 requirements and guidelines.
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
898 The goal in developing the ISA62443 series is to improve the availability, integrity and
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
899 confidentiality of components or systems used for industrial automation and control, and to provide
900
904 The concept of industrial automation and control systems electronic security is applied in the
905 broadest possible sense, encompassing all types of plant s, facilities, and systems in all industries.
906 Automation and control systems include, but are not limited to:
907 hardware and software systems such as DCS, PLC, SCADA, networked electronic sensing, and
908 monitoring and diagnostic systems
909 associated internal, human, network, or machine interfaces used to provide control, safety, and
910 manufacturing operations functionality to continuous, batch, discrete, and other processes
911 The requirements and guidance are directed towards those responsible for designing,
912 implementing, or managing industrial automation and control systems. This information also applies
913 to users, system integrators, security practitioners, and control systems manufacturers and
914 vendors.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
925
926 Figure 1 ISA62443 Series Elements
930 The first or general group includes elements that address t opics that are common to the entire
931 series. These are:
932 ISA62443-1-1 (This document) introduces the concepts and models used throughout the
933 series.
934 ISATR62443-1-2 is a master glossary of terms and abbreviations used throughout the series.
935 ISA62443-1-3 describes a series of quantitative metrics derived from the foundational
936 requirements, system requirements and associated.
937 ISA-TR62443-1-4 provides a more detailed description of the underlying life cycle for IACS
938 security, as well as several use cases that illustrate various applications.
939 The elements in the second group focus on the policies and procedures associated with IACS
940 security. These are:
941 ISA62443-2-1 describes what is required to define and implement an effective IACS cyber
942 security management system.
943 ISA62443-2-2 provides specific guidance on what is required to operate an effective IACS
944 cyber security management system.
945 ISATR62443-2-3 provides guidance on the specific subject of patch manageme nt for IACS.
946 ISA62443-2-4 (adopted from IEC 62433-2-4) specifies requirements for suppliers of IACS.
947 The elements in the third group address requirements at the system level. These are:
ISA-62443-1-1, D6E2, September 2016 30 ISA99, WG03
955 ISA62443-4-1 describes the derived requirements that are applicable to the development of
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
956 products.
957 ISA62443-4-2 contains sets of derived requirements that provide a detailed mapping of the
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
958 system requirements to subsystems and components of the system under consideration.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
959 3.5 Applying the Standards
960
2- 4 2- 1 3- 2 2- 1
2- 1 2- 3
3- 2 2- 3
3- 3 2- 4 3- 3 2- 4
963
964 Figure 2 Application of the ISA62443 Series
968
978 Although technology changes and partner relationships may be good for business, they increase
979 the potential risk of compromising security. As the threats to businesses increas e, so does the need
980 for security.
981 Because industrial automation and control systems equipment connects directly to a process, loss
982 of sensitive information or interruption in the flow of information are not the only consequences of
ISA99, WG03 31 ISA-624431-1, D6E2, September 2016
983 a security breach. The potential loss of life or production, environmental damage, regulatory
984 violation, and compromise to operational safety are far more serious consequences. These may
985 have ramifications beyond the targeted organization; they may grievously damage the infrastru cture
986 of the host region or nation.
987 External threats are not the only concern. Knowledgeable insiders with malicious intent or even an
988 innocent unintended act can pose a serious security risk. Additionally, industrial automation and
989 control systems are often integrated with other business systems. Modifying or testing operational
990 systems has led to unintended effects on system operations. Personnel from outside the control
991 systems area increasingly perform security testing on the systems, exacerbating the n umber and
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
992 consequence of these effects. Combining all these factors, it is easy to see that the potential of
993 someone gaining unauthorized or damaging access to an industrial process is not trivial.
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
994 4.3 Current Systems
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
995 Industrial automation and control systems have evolved from individual, isolated computers with
996 proprietary operating systems and networks to interconnected systems and applications employing
1002 Increased visibility of industrial control system activities (work in process, equipment status,
1003 production schedules) and integrated processing systems from the business level, contributing
1004 to the improved ability to conduct analyses to drive down production costs and improve
1005 productivity.
1006 Integrated manufacturing and production systems have more direct access to business level
1007 information, enabling a more responsive enterprise.
1008 Common interfaces that reduce overall support costs and permit remote support of production
1009 processes.
1010 Remote monitoring of the process control systems that reduces support costs and allows
1011 problems to be solved more quickly.
1012 4.3.2 Security Considerations
1013 There are definite security related considerations associat ed with each of these benefits.
1014 Devices, open networking technologies and increased connectivity provide increased
1015 opportunities for cyber-attack against control system hardware and software. That weakness
1016 may lead to health, safety and environmental (HSE), financial and/or reputational consequences
1017 in deployed control systems.
1018 Organizations deploying general commodity information technology (IT) cyber security solutions
1019 to address IACS security may not fully comprehend the results of this decision. While many
1020 business IT applications and security solutions can be applied to IACS, they need to be applied
1021 in an appropriate way to eliminate inadvertent consequences. For this reason, the approach
1022 used to define system requirements needs to be based on a combination of functional
1023 requirements and risk assessment, often including an awareness of operational issues as well.
1024 It is possible to define standards for models and information exchanges that allow the industrial
1025 automation and control systems community to share information in a consistent way. However,
1026 this ability to exchange information increases vulnerability to misuse and attack by individuals
1027 with malicious intent and introduces potential risks to the enterprise using industrial automation
1028 and control systems.
ISA-62443-1-1, D6E2, September 2016 32 ISA99, WG03
1029 Industrial automation and control systems configura tions can be very complex in terms of
1030 physical hardware, programming, and communications. This complexity can often make it
1031 difficult to determine:
1032 who is authorized to access electronic information,
1033 when a user can have access to the information,
1034 what data or functions a user should be able to access,
1035 where the access request originates, and
1036 how the access is requested.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1037 4.4 Current Trends
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1038 Several trends contribute to the increased emphasis on the security of industrial automation and
1039 control systems:
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
1040 Businesses have reported more unauthorized attempts (either intentional or unintentional) to
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1083 focus on control system availability, plant protection, plant operations (even in a degraded mode)
1084 and time-critical system response. General purpose security goals often do not place the same
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1085 emphasis on these factors and may be more concerned with protecting information rather than
1086
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
physical assets. These different goals need to be clearly stated as secur ity objectives regardless
1087 of the degree of plant integration achieved.
1108 Access Controls (IAC and UC) shall not prevent the operation of essential functions, including:
1109 Accounts used for essential functions shall not be locked out, even temporarily.
1110 Verifying and recording operator actions to enforce non-repudiation shall not add significant
1111 delay to system response time.
1112 For high availability control systems, the failure of the certificate authority shall not interrupt
1113 essential functions.
1114 Identification and authentication shall not prevent the initiation of the SIF. Similarly for
1115 authorization enforcement.
1116 Incorrectly time stamped audit records shall not adversely affect essential functions.
1117 Essential functions of an IACS shall be maintained if zone boundary protection goes into fail-
1118 close and/or island mode.
ISA-62443-1-1, D6E2, September 2016 34 ISA99, WG03
1119 A denial of service (DoS) event on the control system or safety instrumented system (SIS)
1120 network shall not prevent the SIF from acting.
1121 4.7.2 GEN x.x Compensating countermeasures
1122 4.7.2.1 Requirement
1123 Compensating countermeasures shall be applied as necessary to improve the security of existing
1124 systems.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1127 provide the capability to support some specific security requirement. If the control system does not
1128 have the inherent capability to meet such a requirement it is acceptable to employ an ex ternal
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1129 component. In such a case, the control system shall provide an interface to that external
1130
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
component. Some examples of compensating countermeasures include user identification
1131 (including centralized versus distributed), password strength enforcemen t, signature validity
1142
ch
es
no
oc
Pr
log
Security
y
People
1148
1149 Figure 3 Security Elements Grouping
1162 Relationships Make a concerted effort to break down the traditional relationship barriers
1163 between the Control and Business IT groups at all management levels of the organization. The
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1164 goal is to have cooperative relationships across the different functional areas of t he company,
1165 and organizational levels. This also applies to the relationship between the Asset Owner and
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1166 the Vendor or Integrator responsible for installing and maintaining the IACS.
1167 Intent, Buy-In, Support Ensure that all personnel have the intent and m otivation to uphold
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
1168 cyber security policies, practices, and ensure continual improvement. People must be entirely
1169
1190 Processes may be implemented in several ways, but are built upon smaller components of
1191 documentation.
1192 Policy This is a formal, brief, and high-level statement or plan that embraces an organization's
1193 general beliefs, goals, objectives, and acceptable procedures for a specified subject area.
1194 Standard This is a formal document that establishes mandatory requirements, engineering,
1195 technical criteria, methods, etc. A standard is meant to convey a mandatory acti on or rule and
1196 is written in conjunction with a policy.
1197 Process A process typically describes the act of taking something through an established
1198 and usually routine set of procedures or steps to convert it from one form to another, such as
1199 processing paperwork to grant physical or cyber access, or converting computer data from one
1200 form to another.
1201 Guideline These are not required as part of a policy framework, but they can play an important
1202 role in conveying best practice information to the user commun ity. Guidelines are meant to
ISA-62443-1-1, D6E2, September 2016 36 ISA99, WG03
1203 guide users to adopt behaviors which increase the security posture of a network, but are not
1204 yet required (or in some cases, my never be required).
1205 Definition of the specific structure and content of policies, standards, processes and guidelines is
1206 the responsibility of the IACS asset owner. The ISA62443 addresses the following subjects in this
1207 category:
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1211 Human Resources Security
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1212 Physical and Environmental Security
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
1213 Communications and Operations Management
1214 Access Control
1229 Within the ISA62443 series, the technical security controls are grouped into a set of foundational
1230 requirements. These are described briefly in a later section of this standard. Additional detail is
1231 provided in ISA62443-3-3 (System Security Requirements and Security Levels). These
1232 foundational requirements are expressed in terms of IACS, and are robust enough c ategories to
1233 allow any security control or setting (e.g., firewall rules, running services) to have an appropriate
1234 category.
Category Application
People It is recommended that this subject is started first to have the greatest success.
- Obtain Senior Management support that all IACS changes must be authorized
and the adoption of security risk assessment into the change control process
is required.
- Identify those individuals in the organization who are accountable for ens uring
their business unit adheres to the change control process.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
- Identify those responsible in the organization for supporting the change
control process and their respective roles.
- Communicate to and provide training to all participants of the change cont rol
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
process.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
Processes This subject is started once strategies for people are in progress.
- Document the appropriate policy that all staff and contractors must follow
1244 This example is not a detailed plan for improving change control an d configuration management
1245 processes, but it effectively summarizes the importance of the people -process-technology triad.
1246 The three aspects of people, process and technology must be addressed simultaneously in order
1247 to have the greatest success.
1248 In the following sections each of the principles of people, process and technology are further
1249 defined and their subjects identified.
C)
ol (A
o ntr
Fo
sC
un
s
ce
da
Ac
tio
a nd
na
ion
lR
s
t
e
tica
us
eq
Or Se
ga en
Cla
uir
niz cu uth
em
ati ri ty A
Co on Po n,
en
Ph o
mm Hu As of licy ati
ts
ysi
u nic ca
la
ma
nR
se
tM Se
cu n tific C )
Sy a Ide
st tio nd es an rity l (U
em ns En ou a ge tro )
s ac an
dO vir rce me C on (SI
qu on sS nt se ri ty
isit pe me ec U eg )
ion rat nta uri Int DC
i on lS ty y(
,d
ev s e st em alit
elo Ma cu
rity Sy nti )
na ide F
Te
pm Ac ge f RD
n
w( E)
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
en ce me Co
ss
ta s ta lo (TR
ch
Bu s n t t
sin nd Co Da aF en
e
Inc ma t
es ntr Da Ev
no
ide
oc
sC nt int ol ict to
on Ma en str se
an n )
Re
Pr
tin
log
uit n ce po RA
yM ag es (
em R ility
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
an en Security ely ilab
y
ag t Tim
em A va
Co en
mp t rce
lian ou
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
s
Re
ce
People
Resourcing
Relationships
1256 The technical requirements associated with IACS security are prescribed by the ISA62443
1257 standards commensurate with the Security Level (SL) assigned to each zone and conduit. The
1258 Foundation Requirements defined in ISA62443-1-1 are the categories used to organize these
1259 technical security controls, and set the foundation for other ISA62443 normative requirements.
1260 The policy and procedure (process) requirements build on those containe d in the ISO/IEC 27000
1261 series, with specific requirements unique to IACS.
1262 The personnel and resource (people) requirements associated with an IACS Security Management
1263 System are outside the scope of ISA62443. Although it is considered extremely important, the
1264 outputs of ISA62443 shall continue to be focused on technical and process requirements. Readers
1265 are advised to research and study topics such as organizational behavior, instituting change, and
1266 other business sociology and leadership materials.
1267 Each of these essential elements are reflected in a description of cyber security related concepts.
1268 These concepts in turn are broken into two groups. The first group includes the concepts that are
1269 applicable to virtually any cyber security response, while the second group includes concepts that
1270 are specific or unique to the industrial automation and control systems environment. Each of these
1271 groups are described in subsequent clauses.
1272
1274 In order to fully articulate the systems and components the ISA62443 standards address, the range
1275 of coverage may be described from several perspectives, including:
1286 This standard is focused primarily on industrial automation and control, as described in a reference
1287 model. Industrial automation and control includes the supervisory control components typically
1288 found in process industries, as well as SCADA (supervisory control and data acquisition) systems
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1289 that are commonly used by organizations that operate in critical infrastructure in dustries. These
1290 include:
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1291 a) electricity transmission and distribution
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
1292 b) gas and water distribution networks
1297 While business planning and logistics systems are not explicitly addressed within the scope of this
1298 standard, the integrity of data exchanged between business and industrial systems is considered.
1304 1) Industrial control systems and their associated communications networks, including
1305 distributed control systems (DCSs), programmable logic controllers (PLCs), remote
1306 terminal units (RTUs), intelligent electronic devices, SCADA systems, networked electronic
1307 sensing and control, metering and custody transfer systems, and monitoring and diagnostic
1308 systems. In this context, industrial control systems include basic process control system
1309 and safety-instrumented system (SIS) functions, whether they are physically separate or
1310 integrated.
1311 2) Associated systems at level 3 or below of the Reference Model. Examples include advanced
1312 or multivariable control, online optimizers, dedicated equipment monitors , graphical
1313 interfaces, process historians, manufacturing execution systems, pipeline leak detection
1314 systems, work management, outage management, and electricity energy management
1315 systems.
1316 3) Associated internal, human, network, software, machine or device in terfaces used to
1317 provide control, safety, manufacturing, or remote operations functionality to continuous,
1318 batch, discrete, and other processes.
1319 6.3 Activity-Based Criteria
1320 The ANSI/ISA-95.00.03 standard defines a set of criteria for defining activities associ ated with
1321 manufacturing operations. A similar list has been developed for determining the scope of this
1322 standard. A system should be considered to be within the range of coverage of these standards if
1323 the activity it performs is necessary for any of the fo llowing:
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1334 The coverage of this standard includes industrial automation and control systems that has -assets
1335 that meet any of the following criteria, or whose security is essential to the protection of other
1336
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
assets that meet these criteria:
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
1337 1) The asset is necessary to maintain the economic value of a manufacturing or operating
1338 process.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1375 6.6.1.2 Rationale
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1376 The output from this determination shall include sufficient information to help the ordinary user (not
1377 necessarily security-conscious ones) to identify and determine the releva nt security properties.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
1378 The method of determination shall include a decomposition of a system under consideration in
1384
maintains
Maintenance Provider Maintenance policies and procedures
+
Automation Solution
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
designs and deploys
Integration Provider
BPCS SIS HW/SW
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
IACS environment (product specific)
develops capabilities
Service Provider to provide Integration and Maintenance Services
1399 Asset Owner This is the person or organization that has primary accountability for the IACS and
1400 its security. Responsibilities include the identification of the consequence component of risk, and
1401 the consistent operation of the cybersecurity management system.
1402 Asset Operator This is the person or organization that is accountable for the operation of the
1403 system under consideration. This may or may not be the same entity as the Asset Owner. For
1404 example, the Asset Owner may be different in situations involving some sorts of joint ventures or
1405 similar business structures.
1407
1408 Integration provider It is common for an automation solution to be designed and configured by
1409 an independent or external system integrator, according to specifications and requirements
1410 provided by the asset owner.
1411 Product Supplier The principal responsibility of the product supplier is to design and provide the
1412 specific components that are used to assemble the IACS.
1413 Service Supplier Ensuring the security of an IACS also requires services throughout the life
1414 cycle, including regular maintenance and system updates.
ISA99, WG03 43 ISA-624431-1, D6E2, September 2016
1420 Compliance Authority Organizations in this role include government agencies and regulators
1421 with the legal authority to perform audits to verify compliance with governing laws and regulations.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1422 7.2.3 Asset owner functions
1423 Within an asset owner organization there are several functions or departments that may play a role
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1424 in the identification, specification, operation and support of the IACS. These are described in the
1425 following paragraphs.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
1426 Asset owner and asset operator may be very different. The main distinction may be in ultimate accountability for
1428 Business defines case for investment and tangible asset owner of record
1432 Operations asset custodian which uses equipment to convert materi als into finished goods
1439 Administrator
1440 Planner/Developer
1441 Visitor
1442 Supervisor
1444 IT specialist
1454
1455 8 Models
1456 8.1 General
1457 The basis for identifying the security needs and important characteristics of the environment at a
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1458 level of detail necessary to address security issues can expressed as a series of models, each of
1459 which is described in the following paragraphs.
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1460 8.2 Reference Model
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
1461 A reference model establishes a frame of reference for the more detailed information that follows.
Enterprise Systems
Level 4
(Engineering, Business Planning & Logistics)
Operations / Systems
Level 3 Management
Supervisory Control
Level 2
Site Monitoring & Local Display
Industrial Automation
and Control Systems
Level 0 Process
(Equipment Under Control)
1466
1467 Figure 6 Reference Model
ISA99, WG03 45 ISA-624431-1, D6E2, September 2016
1468 Detailed descriptions of each of the levels in this model are provided in ANSI/ISA-95.00.01-2000,
1469 Enterprise-Control System Integration Part 1: Models and Terminology, and summarized in the
1470 following paragraphs.
1471 Level 4 (Enterprise Business Systems) This level includes the functions involved in the
1472 business-related activities needed to manage a manufacturing organization. For the purposes
1473 of this standard, engineering systems are also considered to be in this level.
1474 Level 3 (Operations Management) This level includes the functions involved in managing
1475 the work flows to produce the desired end products. Examples include dispa tching production,
1476 detailed production scheduling, reliability assurance, and site -wide control optimization.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1477 Level 2 (Supervisory Control) This level includes the functions involved in monitoring and
1478 controlling the physical process. There are typically multiple production areas in a plant or
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1479 facility.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
1480 Level 1 (Local or Basic Control) This level includes the functions involved in sensing and
1481 manipulating the physical process. Process monitoring equipment reads data from sensors,
2 These systems are referred to as safety instrumented systems in standards such as the ANSI/ISA-84 series.
ISA-62443-1-1, D6E2, September 2016 46 ISA99, WG03
Enterprise
Laptop
Workstation Mainframe Server Server
computer
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
File/Print App. Data File/Print App. Data File/Print App. Data
Server Server Server Server Server Server Server Server Server
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
Firewall Firewall Firewall
Internet
Enterprise
Enterprise Infrastructure
Zone Web Server
Enterprise WLAN
uit
File Server
Cond
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
Inventory
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
Terminal Services / Management
Data Historian Mirror Router/
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
Firewall
PLC Router/
Firewall Local
Switch
Industrial
Network #1 HMI
Legacy/Fieldbus
...
Field Devices
1510
1511 Figure 8 Zone Model Example
1512 This model provides the context for assessing common threats, vulnerabilities, and the
1513 corresponding countermeasures needed to attain the level of security required to protect the
1514 grouped assets. After grouping assets in this manner, a security policy is defined for all assets that
1515 are members of the zone. This results of this analysis is used to determine the appropriate
1516 protection required based on the activities performed in the zone.
1517 The ISA62443-3-2 standard describes the above process in more detail.
ISA-62443-1-1, D6E2, September 2016 48 ISA99, WG03
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1525 The use of known or established reference models as the basis for the logical design aids in
1526 communication or concepts and requirements with stakeholders.
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1527 8.5.2 GEN x.x Physical Architecture Model
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
1528 8.5.2.1 Requirement
1542
1553 The context of security is based on the concepts of threats, risks, and countermeasures, as w ell as
1554 the relationships between them. The relationship between these concepts can be shown in a model
1555 such as the one described in the international standard ISO/IEC 15408 -1 (Common Criteria) [2]. It
1556 is reproduced in Figure 9.
ISA99, WG03 49 ISA-624431-1, D6E2, September 2016
value
Owners wish to minimize
impose
Countermeasures
Threat Agents To
reduce
Risk
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
to
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
that increase
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
Threats to Assets
give rise to
1559 A different view of the relationship is shown in Figure 10, which shows how an expanded set of
1560 concepts are related within the two interconnected proc esses of information security assurance
1561 and threat-risk assessment.
Information Security
Assurance
Assurance
Evaluation
Techniques
Threat-Risk
produce gives evidence of Assessment
Assurance
Owners Threats
require
Confidence using
Vulnerabilities
in
require
Countermeasures
to minimize
Risk
to
Assets
1562
1563 Figure 10 Context Model
1570 In the industrial automation and control systems environment, the general priority of these
1571 objectives is often different. Security in these systems is primarily concerned with maintaining the
ISA-62443-1-1, D6E2, September 2016 50 ISA99, WG03
1572 availability of all system components. There are inherent risks associated with industrial machinery
1573 that is controlled, monitored, or otherwise affected by industrial automation and control systems.
1574 Therefore, integrity is often second in importance. Usual ly confidentiality is of lesser importance,
1575 because often the data is raw in form and must be analyzed within context to have any value.
1576 The facet of time responsiveness is significant. Control systems can have requirements of system
1577 responsiveness in the 1 millisecond range, whereas traditional business systems are able to
1578 successfully operate with single or multiple second response times.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1580 The principle of least privilege means giving a user or application only those privileges which are
1581 essential to complete the necessary tasks. When applied to users, the terms least user access or
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1582 least-privileged user account (LUA) are also used, referring to the concept that all user accounts
1583 at all times should run with as few privileges as possible, an d also launch applications with as few
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
1584 privileges as possible.
1602 Security policies enable an organization to follow a consistent program for maintaining an
1603 acceptable level of security. Policies are defined at different levels in an organization, ranging from
1604 governance or management policies established at the enterprise level to operation policies
1605 defining the details of security administration. Policies at the most specific level are the
1606 organization's standard against which security audits can measure compliance.
1607 A security policy is a formal, brief, and high-level statement or plan that embraces an organizations
1608 general beliefs, goals, objectives, and acceptable procedures that specify or regulate how an
1609 organization protects sensitive and critical system resources. Policies unambiguously state what is
1610 mandatory. Because policies are mandatory and unambiguous, they make audits possible. The
1611 organization's security policies also take into account legal, regulatory, and contractual obligations.
1612 They are the measuring stick against which audits test the actual practices of the organization.
1613 Complementing policies are standards and procedures. A standard is a formal document that
1614 establishes mandatory requirements, engineering, technical criteria, methods, etc. A standard is
1615 meant to convey a mandatory action or rule and is writt en in conjunction with a policy. A process
1616 or procedure document may also be called a standard, which typically describes the act of taking
1617 something through an established and usually routine set of procedures or steps to convert it from
1618 one form to another, such as processing paperwork to grant physical or cyber access, or converting
ISA99, WG03 51 ISA-624431-1, D6E2, September 2016
1619 computer data from one form to another. Security procedures define in detail the sequence of steps
1620 necessary to provide a certain security measure.
1621 Contrasting with policies, standards and procedures are guidelines. Guidelines are not mandatory.
1622 They are intended to describe a way to do something that is desirable but not mandatory and are
1623 not a required element of a policy framework; however, they can play an important role in conveying
1624 best practice information to the user community. Guidelines are meant to guide users to adopt
1625 behaviors which increase the security posture of a network, but are not yet required (or in some
1626 cases, my never be required). Because guidelines are not mandatory and may be ambiguous,
1627 practices cannot be audited against guidelines. Guidelines are sometimes written by a group that
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1628 does not have the authority to require them to be followed. Guidelines are inappropriate to describe
1629 practices that are mandatory.
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1630 In an attempt to reduce the size of this section, the following paragraph could be discarded.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
1631 Because the policies, standards and procedures for different parts of an organization are often
1632 different, it is important that they be adequately coor dinated. Specifically, the security policy for
1637 Some consistency to the structure of the various policies, standards and procedures increases the
1638 coherence of the overall set of policies and procedures. Each policy or procedure document has a
1639 short but precise statement of its purpose. It also has a statement of scope that defines where the
1640 document applies. It has a description of the risks that it is intended t o reduce and of the key
1641 principles of the document. These common items guide the reader by providing more information
1642 about the intention of the policy or procedure. They also describe the intent of the document to
1643 provide guidance, which is useful when the document needs to be revised.
1644 In an attempt to reduce the size of this section, the following paragraph could be discarded.
1645 Different phases in a systems life cycle have different profiles of security issues. Security policies
1646 and procedures may address only certain life cycle phases. Some policies and procedures may
1647 specify that they only pertain to certain phases. All of the security concerns from all of the various
1648 phases are addressed in corresponding places in the set of security policies and proced ures.
1649 Security policies, standards and procedures contain instructions on how the organization will
1650 measure compliance and update the policies. Organizations often recognize that policies need to
1651 be updated when performing or evaluating audits. Audits may identify ambiguities in policies and
1652 procedures as well as parts of policies and procedures that do not make the required process or
1653 outcome clear. Audits can identify issues that should be added to policies and procedures. Audits
1654 may also identify requirements that should be reevaluated and adjusted or possibly retracted.
1655 Policies, standards and procedures should allow for unforeseen circumstances that make it
1656 infeasible to follow them. Policies should also state how to document and approve exceptions to
1657 policies and procedures. Documenting approved exceptions leads to a clearer state of security than
1658 leaving imprecision and ambiguity in the policies and procedures.
1659 In addition, organizations should be unambiguous about what is a requirement versus what is
1660 optional advice in a policy or standard. Precise use of words like shall, must, may, and is
1661 removes the ambiguity. Policy statements can define these words in their introduction sections to
1662 be more precise. Shall and must are used for requireme nts. May is used for advice that is
1663 optional, and therefore is not used in the mainstream of policies and procedures. It can be
1664 appropriate to provide options for addressing a requirement. Phrases like when possible or
1665 unless necessary introduce ambiguity unless the statement also describes how to determine
1666 whether the case is possible or necessary.
ISA-62443-1-1, D6E2, September 2016 52 ISA99, WG03
1667 Responsibilities are not always found in policy documents. They may be found in standards and procedures, as well as
1668 stand-alone RACI charts.
1669 In an attempt to reduce the size of this section, the following paragraph could be discarded.
1670 Policies, standards and procedures identify who is responsible for what. Is the process control staff
1671 responsible for the control network? Is it responsible for a demilitar ized zone (DMZ) between the
1672 control network and the enterprise network? If an enterprise information systems department is
1673 responsible for conditions that require the process control staff to perform certain operations, then
1674 these operations should be described.
1675 For an organization that is just starting to create its security program, policies and standards are a
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1676 good place to begin. Initially, they can be written to cover the set of security practices that the
1677 organization is equipped to handle in the nea r term. Over time they can be revised and tightened
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1678 as the organization's capability grows. They can be put in place without the lead time of procuring
1679 and installing systems and devices.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
1680 9.6.2 Enterprise Level
1682 The policy at the enterprise level mandates the security program and sets the direction. It states
1683 the organization's overall security objectives.
1684 The policy statement of top management should be circumspect enou gh to remain pertinent and
1685 accurate through changes in the structure of the organization, changes in system and security
1686 technology, and changes in the kinds of security threats. By being circumspect, the policy can be
1687 stable and will need to be rewritten only when the organization's basic position on security changes.
1688 However, the policy statement is also unambiguous; it clearly identifies what is required.
1689 The enterprise level policy identifies areas of responsibility and assigns accountability for those
1690 areas. The policy can define the relationship between the enterprise IT department and plant
1691 operations and identify their different responsibilities. The policy can differentiate security
1692 objectives of the control system from those of the enterprise netwo rk. For example, maintaining
1693 confidentiality may be a top consideration of security for the enterprise network, whereas
1694 maintaining continuous operation may be a top consideration for the control system.
1695 In addition, the policy identifies particular standa rds and regulations that apply to the organization.
1696 It may identify training as an important component of the security program. The policy may also
1697 indicate the consequences for policy violations.
1698 Management should communicate the policy throughout the org anization so that all employees
1699 understand it.
1702 Operational policies, standards and procedures are developed at lower levels of the organization
1703 to specify how the enterprise level policy is implemented in a specific set of circumstances. Security
1704 standards and procedures put the policy into effect. They define what the organization will do to
1705 achieve the objectives and to meet the requirements of the policy. The procedures establish
1706 processes that will address all the concerns of the policy.
1707 The standards and procedures address all components needed in a security program, including:
1718 The written procedures describe the process by which they will be changed when th e situation
1719 changes. Each policy, standard or procedure has an identified owner responsible for recognizing
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1720 when updates are needed and for ensuring they are made.
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1721 The effectiveness of policies, standards and procedures should be measured to check whether they
1722 serve their intended purpose. The cost to the organization should also be measured, so the
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
1723 organization can determine whether the balance of risk reduction aligns with the cost to implement
1724 the policies. If the balance is unacceptable, the policy and procedures may have to be adjusted.
1726 Procedures are able to support audits. A security audit compares the observed actions of the
1727 organization against the written procedures.
1733 There are several topics that policies and procedures can cover. Every organization is different and
1734 should determine the appropriate policies and procedures that are applicable for its industrial
1735 automation and control systems. Possible topics include:
1736 Risk Management Risk management is vital to developing a cost-effective security program that
1737 provides a uniform layer of adequate security, but that does not require equipment or procedures
1738 that are too costly and significantly beyond the range of adequate security. However, risk
1739 management is complex and needs to be tailored to the organization. The policy on risk
1740 management defines how an acceptable level of risk is determined and how to control the risk. This
1741 level varies depending upon the goals and circumstances for a particular organization. The process
1742 for determining risk level should be repeated periodically in order to accommodate changes to the
1743 environment.
1744 Access Management Security is improved in a system by restricting access to only those users
1745 who need and are trusted with the access. Access management policy identifies different roles of
1746 users and what kind of access each role needs to each class of asset (physical or logical). It
1747 specifies the responsibilities of employees to protect the assets and of administrators to maintain
1748 access management procedures. Authorization for these access privileges should have well -
1749 documented approval by management and be periodically reviewed. Access management may be
1750 as important or even more important to system integrity and availability as the need to protect data
1751 confidentiality.
1752 Availability and Continuity Planning Policies in this area provide the necessary framework and
1753 requirements expectations for backup and recovery, as well as business continuity and disaster
1754 recovery planning. They also define archiving characteristics (e.g., how long must data be
1755 retained).
1756 Physical Security The security of the control system depends upon the physical security of the
1757 space that contains the control system. The plant site may already have a physical security policy
1758 before the security policy is written for the control system. However, policies related to systems
ISA-62443-1-1, D6E2, September 2016 54 ISA99, WG03
1759 physical access may differ from those involving non-systems assets. For instance, all oil refinery
1760 personnel may have general access to almost all facilities within the plant fences, but IT
1761 infrastructure rooms may need to have access limited to only IT -related personnel if for no other
1762 reason than to prevent accidental damage. The control system security policy should include a
1763 reference to the physical security policy and state its dependency. The security policy for the control
1764 system must contain enough specifics on physical security to make any specific application of the
1765 site physical security policy to the control system. For example, some equipment must be in locked
1766 cabinets, and the keys must be kept in a restricted place.
1767 Architecture Policies and procedures describe secure configurations of control systems including
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1768 such issues as:
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1770 b) recommended firewall configuration
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
1771 c) user authorization and authentication
1788 Wireless Devices and Sensors Control equipment using radio frequency transmission in place of
1789 wires has been widely used in certain control system applications for many years. As costs
1790 decrease and new standards emerge, potential applications in automation and control systems
1791 continue to expand, in part due to lower installation costs. A key difference between wired and
1792 wireless devices is that in the latter case signals are not confined wit hin a physical security
1793 boundary, making them more prone to interception and corruption. Therefore, a security policy
1794 specific to wireless devices is appropriate for organizations that currently use or may in the future
1795 deploy wireless devices or sensors in their operations. The policy may specify which applications
1796 can use wireless devices, what protection and administrative methods are required, and how wired
1797 and wireless networks are interconnected.
1798 Remote Access Remote access bypasses the local physic al security controls of the boundaries
1799 of the system. It extends access to the trusted zone to a completely different geographic location
1800 and includes a computer that may not have undergone the security checks of the computers that
1801 are physically in the area of the trusted zone. Different mechanisms are required to provide the
1802 same level of security as the trusted zone.
1803 Personnel Personnel issues are likely to be defined in the enterprise personnel and IT security
1804 policies. The control system security policy provides specifics, whereas the more general policies
1805 do not include control system aspects. For example, the control system security policies coordinate
1806 control system access roles with personnel screening and monitoring practices.
ISA99, WG03 55 ISA-624431-1, D6E2, September 2016
1807 Subcontractor Policy Security issues include work that may involve subcontractors in roles such
1808 as supplier, integrator, maintenance service provider, or consultant. A security policy that covers
1809 subcontractors addresses the interactions with the subcontractor that could o pen vulnerabilities.
1810 The policy identifies the responsibilities of the different parties. It addresses the changing
1811 responsibilities as projects progress through their phases and as materials and systems are
1812 delivered. The policy may require certain terms to be written into contracts with subcontractors.
1813 Without proper management of contract programmers, application integrity may be compromised
1814 or programming code may not be maintainable. It is important to find well -qualified contract
1815 programmers who will follow your programming and documentation standards and perform
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1816 adequate testing, as well as being trustworthy and timely.
1817 Auditing The security of the system is audited regularly to measure the degree of compliance with
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1818 the security policies and practices. The security policy addresses the need for audits and specifies
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
1819 the responsibility, the regularity, and the requirement for corrective action. A comprehensive
1820 auditing process may address aspects other than security, such as process efficiency and
1822 Security Policy Updating The security policy is monitored to determine changes needed in the
1823 policies themselves. Monitoring security policy is a part of each policy and procedure document,
1824 and the enterprise security policy sets forth the overall approach. Each operational policy and
1825 procedure document contains a statement of when and by whom the policy or procedure itself is to
1826 be reviewed and updated.
1827 Training Training programs should be in place for new hires, o perations, maintenance, upgrades
1828 and succession planning. Training programs should be well documented, structured, and updated
1829 at regular intervals to incorporate changes in the operating environment.
1833 Supply chain cybersecurity refers to efforts to enhance cybersecurity within the supply chain. It is
1834 a subset of supply chain security and is focused on the management of cybersecurity requirements
1835 for information technology systems, software and networks, which are driven by threats such as
1836 cyber-terrorism, malware, data theft and the advanced persistent threat (A PT). Typical supply chain
1837 cyber security activities for minimizing risks include buying only from trusted vendors, disconnecting
1838 critical machines from outside networks, and educating users on the threats and protective
1839 measures they can take. 3
1840 Examples of supply chain cyber security issues include, but are not limited to the following:
1841 Network or computer hardware that is delivered with malware installed on it already.
1842 Malware that is inserted into software or hardware (by various means).
1843 Vulnerabilities in software applications and networks within the supply chain that are discovered
1844 by malicious threat agents
1845 Counterfeit computer hardware
1846 For example, without practicing security due diligence at all levels in the supply chain, an attacker
1847 with malicious intent could build into the hardware a Trojan that triggers digital and analog actions
1848 targeting the payload of data processed by that hardware. The following figure is an example of a
1849 Trojan's capability to impact the proper operation of a hardware compone nt.
3 https://en.wikipedia.org/wiki/Supply_chain_cyber_security
ISA-62443-1-1, D6E2, September 2016 56 ISA99, WG03
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
1850
1852 Most IACS components and subsystems that comprise an IACS system include parts manufactured
1853 by suppliers to the original equipment manufacturer (OEM), or to an integrator. Some of These
1854 suppliers may operate low cost businesses to compete in the market place. Their business model
1855 may have a lower priority on building security into their processes to avoid substantial increases in
1856 cost. The ISA62443 standards attempt to improve this situation by imposing cybersecurity
1857 requirements for people, process and technology that flows down to subordinate levels in the supply
1858 chain.
1859 As part of their U.S. Resilience Project, NIST offers three recommendations th at should be included
1860 in managing supply chain risk.
1861 1. Securing IT and OT systems against malicious codes that exploit unknown vulnerabilities (zero
1862 day vulnerabilities)
1863 2. Narrowing the time to trace and close supply chain breaches from 230 days to days or ev en
1864 hours.
1865 3. Integrating hardware development and manufacturing operations under a single executive and
1866 physical and cybersecurity under a single executive for "two in a box" risk management.
1867 These recommendations are addressed in the ISA62443 standards.
1868 One of the goals of ISA62443 is to prioritize the potential supply chain risk:
1878 There are several fundamental concepts that are essential to the formu lation and execution of an
1879 Industrial Automation and Control Systems security program.
ISA99, WG03 57 ISA-624431-1, D6E2, September 2016
1880 Security Life Cycles This life cycle is focused on the security level of a portion of the system over
1881 time. A change to a physical asset may trigger a set of security level activities, or a change in
1882 security vulnerabilities or an asset may trigger a change in the physical asset.
1883 Security Program Maturity A mature security program integrates all aspects of cyber security,
1884 incorporating desktop and business computing s ystems with industrial automation and control
1885 systems. The development of a program shall recognize that there are steps and milestones in
1886 achieving this maturity
1887 Zone and Conduits Segmenting or dividing a system under consideration for the purpose of
1888 assigning security levels and associated measures is an essential step in the development of the
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1889 program.
1890 Security Levels Assets that make up the system under consideration shall be assigned desired
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1891 security levels using the mechanism defined in ISA62443-3-2.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
1892 Foundational Requirements The full scope of detailed technical and program requirements shall
1893 be derived from a small set of foundational requirements.
1899
1900 10.1 Security Life Cycle
1901 10.1.1 Introduction
1902 This section explains the different security a spects in the relevant life cycles of an IACS and
1903 outlines which parts of the ISA62443 series provide guidance for the security aspects of the
1904 respective life cycle. The entities of these relevant life cycles and the respective main responsible
1905 role are shown in table 2.
1906 Table 2 Entities with relevant life cycles and the respective main responsible role
1907 For each entity and the associated life cycle, the security aspects are defined and implemented in
1908 a security process model, often referred to as the Plan -Do-Check-Act (PDCA) cycle. For each of
1909 these PDCA cycles, a different role is mainly responsible to ensure that all the cyber security
1910 aspects are properly addressed.
ISA-62443-1-1, D6E2, September 2016 58 ISA99, WG03
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
1911
1912 Figure 12 Life Cycle Steps
1913
1914 The Association of German Engineers (Verein Deutscher Ingenieure or VDI) described relationship
1915 between the three lfe cycles in a guideline designated VDI/VDE Guideline 2182, as shown in the
1916 following figure. 4
1917 When integrating this into the final -1-1 document, please add reference to VDI 2182 into the bibliography
4 http://www.vdi.eu/guidelines/vdivde_2182_blatt_22 -
informationssicherheit_in_der_industriellen_automatisierung_anwendungsbeispiel_des/
ISA99, WG03 59 ISA-624431-1, D6E2, September 2016
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
1918
1919 Figure 13 Life Cycle Relationships
1920 Revise this figure to expand the role abbreviations, and change all text to the proper font and size.
1921 An editable version of this figure can be found in the presentation for WG3 TG3.
1922 As also shown in Figure 13, there are a number of interdependencies between these PDCA cycles.
1923 While Figure xx shows a role centric view on the security aspects in IACS environments, Figure xx
1924 shows a life cycle centric view.
1925 The product life cycle must address the security aspects of the product. Product development is
1926 usually done independent of any specific project instead products are developed for a perceived
1927 market. Therefore, the product PDCA cycle is fairly decoupled from the others. However, past and
1928 current project requirements and feedback from the installed base are a source for market
1929 requirements. After a product is released into the market, it needs to be maintained. At the same
1930 time, the product PDCA cycle needs to continuously support projects and the installed base
1931 throughout the life cycle of the product with product security documentation and operational
1932 guidelines. Eventually the product will be taken off the market.
1933 The IACS life cycle addresses the security aspects of the project in which an automation solution
1934 is designed and commissioned as well as the continuous operation and maintenance of the solution
1935 and its eventual decommissioning. Integration projects are dependent on informa tion from the
1936 various product suppliers feeding into the project and in return provide requirements and feedback
1937 for consideration in future updates and new products. At the same time, based on the project
1938 requirements and in particular the security targets specified by the asset owner, the design of the
1939 automation solution done in the integration project largely determines how the IACS will be
1940 operated. Therefore, the integration projects PDCA cycle must supply appropriate information in
1941 particular the solution security documentation to the operations PDCA cycle.
1942 Asset owners operations teams provide requirements both to integration projects as well as to
1943 product suppliers. In return they depend on initial documentation and continuous support
1944 throughout the solutions lifecycle. Hence it is obvious that the life cycle of the integration project
1945 and the operations are tightly intertwined. In fact, usually the integration project activity is not
1946 started unless the eventual asset owner issued a request for b ids.
ISA-62443-1-1, D6E2, September 2016 60 ISA99, WG03
Assess Phase
High-Level Cyber Risk
Assessment
1 (ISA 62443-3-2)
Allocation of IACS
Assets to Security
Zones or Conduits
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2 (ISA 62443-3-2)
Cyber Security Management System: Policies, Procedures, Training & Awareness
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
Detailed Cyber Risk
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
Assessment
Develop &
Implement
Phase
(ISA 62443-2-1)
(ISA 62443-2-1)
4
of other means of risk
reduction
Design and engineering of
cybersecurity
countermeasures
5
Maintain
Maintain
Cybersecurity Maintenance, Phase
Phase
Monitoring and Management of
Change
7 (ISA 62443-2-1)
Cyber Incident
Response & Recovery
8 (ISA 62443-2-1)
1947
1948 Figure 14 Life Cycle
ISA99, WG03 61 ISA-624431-1, D6E2, September 2016
1949 There is another view of this life cycle that appeared in previous versions. (and shown in IC32C
1950 training).
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
Establish Zones &
Repeat until security risk =< tolerable risk
1951
1952 Figure 15 Alternate View of Life Cycle
ISA-62443-1-1, D6E2, September 2016 62 ISA99, WG03
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
1953
1954 Figure 16 Life Cycle Interdependencies
1955 The following subsections provide more detail on the PDCA cycles shown in Figure xx and the
1956 corresponding security aspects and explain how the different parts of the ISA62443 series
1957 correlate to them.
1972 On one side the product suppliers organization should estab lish a product development process
1973 ensuring that all measures to avoid the creation of vulnerabilities are addressed. In ISA62443-4-1
1974 the product supplier will find process requirements which help him to systemat ically address the
1975 security issues from specification phase throughout design, implementation, verification and
1976 validation and release until phase out. The purpose of this part is to improve the quality of product
1977 development process and to include securit y specific measures in the organizational as well in the
1978 technical area. On the other side ISA62443-3-3 and ISA62443-4-2 specify security capabilities
1979 which should be fulfilled by the control system or components of the control system to support a
1980 defense in depth strategy when deploying an automation solution. A product supplier may choose
1981 to integrate a given set of functionalities depending on the security level expe cted in the target
ISA99, WG03 63 ISA-624431-1, D6E2, September 2016
1982 industries of the product. To achieve the required security level of the automation solution additional
1983 compensating countermeasures may be necessary.
1984 In addition, product suppliers should consider ISATR62443-2-3 for the patch management
1985 process. ISATR62443-3-1 provides assessments of current cyber security tools, mitigation
1986 counter-measures, and technologies that may be applied to products and solutio ns.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
1990 specification uses some material from previous projects that might be applicable or reusable, e.g.
1991 a set of user needs. Based on that, the asset owner then begins work on identifying the relevant
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1992 security targets and the corresponding risks. This part is also known as a high level risk
1993
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
assessment. Hence the risk identification as part of the overall system specification takes into
1994 account lessons learned, existing checklists and brainstorming to identify known or new risks.
1997 The asset owner describes the security related requirements for the construction and operation of
1998 the plant (target security level, SLT) in the form of the tender requirements specification of the
1999 potential integrators The asset owner also describes which strategic or company internal
2000 requirements have to be considered (e.g., security policies, physical constrains) during the overall
2001 project. System integrators responding to the tender create the functional specifications of the
2002 automation solution as part of their offer based on the tender specification and mainly the external
2003 technical documentation of all the eligible solutions/ components from one or more product
2004 suppliers. The asset owner has to check this functional specification to ensure, that all requirements
2005 will be addressed by the automation solution. If the functional specification is accepted by the asset
2006 owner, a contract will be negotiated and the collaborat ive project will be started.
2007 ISA62443-2-1 defines the requirements for an industrial automation and control system (IACS)
2008 security management system (IACS-SMS) and provides guidance on how to develop it. Specifically,
2009 for the patch management aspect of an IACS-SMS, ISATR62443-2-3 provides detailed guidance.
2010 Finally, ISA62443-3-2 establishes requirements for defining the zones a nd conduits of the system
2011 under consideration, assessing risk, establishing a target security level (SL -T), providing informal
2012 guidance on how to verify these requirements.
2017 using the zone and conduit model to design a secure automation infrastructure,
2018 selecting and integrating products from the product supplier(s) according their security
2019 capabilities (taking into account the product security documentation/ guidelines/ support),
2020 configuration and parameterization of all products (not limited to products with dedicated
2021 security capabilities),
2022 providing evidence during the commissioning, and in the final application of the asset owner,
2023 that the final integrated solution fulfils all require ments appropriately,
2024 supporting the final integrated solution along the asset owners life cycle (operation,
2025 maintenance, decommissioning),
2026 In the end of the integration and commissioning phase the system integrator must ensure that all
2027 the measures implemented for the achieved Security Level (SL -A) are efficient, suitable and match
2028 the target Security Level (SL-T).
ISA-62443-1-1, D6E2, September 2016 64 ISA99, WG03
2029 As part of the result of the project the system integrator should provide the asset owner with
2030 external technical documentation and support such that the asset owner will then:
2031 be able to operate, maintain and decommission the automation solution securely within its
2032 specification,
2033 be able to find all IT security-relevant information necessary for future changes of the
2034 solution,
2035 be able to regularly check the implemented countermeasures for their effectiveness, and
2036 be able to adapt the implemented countermeasures when the threat situ ation changes
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2037 Furthermore, the documentation should also provide information concerning the operating and
2038 maintenance of the overall automation solution which is also a basis for the training the asset
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2039 owners personnel.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
2040 ISA62443-2-4 specifies capabilities for IACS Solution Suppliers, especially system integration
2041 service providers. ISA62443-3-2 provides requirements how to determine the achieved security
2051 In general, the security properties of each IACS will change over time due to the following changes
2052 in the primary or initial security milieu. Those changes can be the following:
2053 The confidence in the security capabilities of the ICAS components is reduced due to
2054 discovered vulnerabilities.
2055 The security requirements of the IACS are changed e.g. due to changes of the threat
2056 situation.
2057 Technical, organizational and/or operational changes impacting the se cure operation of the
2058 IACS.
2059 The security properties relevant to the IACS must be audited and/or tested at regular intervals or
2060 whenever a new vulnerability is discovered to ensure that SL(Achieved) matches SL(Target). The
2061 product supplier and the system integrator have to inform the asset owner or operator whenever
2062 they have discovered any change in the security capabilities of their products or systems leading
2063 to a degradation of their associated security capabilities.
2064 The central document in the standardization series ISA62443 describing the process of operating
2065 and maintaining the achieved security capabilities is the part ISA62443-2-1: Industrial automation
2066 and control system security management system. That document describes among other topics
2067 also the maintenance and improvement steps of a cyber security management system (CSMS)
2068 following the outline of the ISO standard 27001 and 27002. The asset owner should cont inuously
2069 monitor, review and audit the selected security controls and measures and their effectiveness. It
2070 should implement decided upon improvements and adjustments and communicate those actions to
2071 all involved parties.
2072 Further attention should be given the technical report on patch management (ISATR62443-2-3),
2073 one of the important tasks to keep the level of security (SL achieved) of implemented SW
2074 applications to its originally implemented level. The asset owne r should specifically monitor and
2075 assess maintenance providers development in respect to the defined maturity levels during his
ISA99, WG03 65 ISA-624431-1, D6E2, September 2016
2076 involvement with the IACS (see ISA62443-2-4), possibly involving IACS service providers. Re-
2077 assessing previous risk assessments can have an impact on the design of the security zones and
2078 conduits (ISA62443-3-2) and the choice of mitigation measures to meet the selected technical or
2079 organizational setup of an IACS the system (ISA62443-3-3).
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2085 of security compromise stems from the potential disclosure of data or information which may be left
2086 on the assets in a format that may be useful for an attacker (e.g. encryption keys, authentication
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2087 credentials, architecture information). It is the responsibility of the asset owner to ensure to an
2088 appropriate level that such information is removed or otherwise rendered useless during the
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
2089 decommissioning. To live up to this responsibility, the asset owner depends on documentation from
2090 the system integrator and the product suppliers on where such information may be located and how
2094
2095 10.2 Maturity Levels
2096 Driven by increasing cyber security risks, many organizations have taken a proactive approach
2097 towards addressing the security risks of their information technology systems and networks. They
2098 are beginning to realize that addressing cyber security is a continuous activity or process and not
2099 a project with an identified start and stop.
2100 Historically organizations providing and supporting business information systems and industrial
2101 automation and control systems operated in two mutually exclusive areas. The expertise and
2102 requirements of each organization were not understood or appreciated by the other. Issues arose
2103 as organizations tried to employ common IT security practices to industrial automation and control
2104 systems.
2105 In some cases, the security practices were in opposition to normal production practices designed
2106 to maximize safety and continuity of production. Because todays open information technologies
2107 are used extensively in industrial automation and control systems, additional knowledge is required
2108 to safely employ these technologies. The IT and manufacturing or production organizations should
2109 work together and bring their knowledge and skills together t o tackle security issues. In industries
2110 with a high potential for health, safety, and environmental incidents, it is important to involve
2111 Process Safety Management (PSM) and physical security personnel as well.
2112 The goal is a mature security program that integrates all aspects of cyber security, incorporating
2113 desktop and business computing systems with industrial automation and control systems. Many
2114 organizations have fairly detailed and complete cyber security programs for their business
2115 computer systems, but cyber security management practices are not as fully developed for IACS.
2116 A common mistake is to address cyber security as a project with a start and end date. When this
2117 occurs, the security level often declines over time. Cyber security risks constant ly change as new
2118 threats and vulnerabilities surface along with ever -changing technology implementations. A
2119 different approach is needed to sustain the security gains and hold risk to an acceptable level.
2125 Every organizations journey to implement a cyber security management system will be different
2126 based on the organizations objectives and tolerance for risk. Integrating cyber securi ty into an
2127 organizations standard practices is a cultural change that takes time and resources. As the figures
2128 suggest, it cannot be achieved in one step. It is an evolutionary process that standardizes on the
2129 approach to cyber security. The security prac tices to be implemented must be proportionate to the
2130 risk level and will vary from one organization to another, and may even be different for various
2131 operations within the same organization based on global needs and requirements. Individual
2132 policies and procedures may also be different for each class of system within an organization
2133 because the level of risk and security requirements may be different. A cyber security management
2134 system establishes the overall program that accommodates these differences.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2135 Education and awareness are critical for successfully addressing IACS cyber security risks as noted
2136 above. There are several options to consider:
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
2137 a) Training the IACS personnel to understand the current information technology and cyber
2138 security issues.
2155 Portions of the industrial automation and control system, or control zones within a control system
2156 can be at different phases of maturity. There are several reasons for this situation, including
2157 budgetary constraints, vulnerability and threat assessments, schedules placed against ri sk analysis
2158 results, automation upgrades, plans for dissolution or replacement, plans to sell a segment of the
2159 facility or business, or availability of other resources to upgrade the security systems to a more
2160 mature phase.
2161 Organizations can achieve a more detailed evaluation of security maturity by assessing
2162 achievements within portions of the industrial automation and control system in terms of the phases
2163 and steps shown in the following table.
ISA99, WG03 67 ISA-624431-1, D6E2, September 2016
Phase Step
Concept Identification
Concept
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
Construction
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
Operations Operations
Compliance Monitoring
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
Recycle and Disposal Disposal
2165 The tables that follow provide general descriptions for each of the phases and steps in the maturity
2166 life cycle.
Step Description
Identification Recognize need for protection of property, assets, services, or personnel
Start developing the security program
Concept Continue developing the security program
Document assets, services, and personnel needing some level of protection
Document potential internal and external threats to the enterprise
Establish security mission, visions, and values
Develop security policies for industrial automation and control systems and
equipment, information systems and personnel
Step Description
Definition Continue developing the security program
Establish security functional requirements for industrial automation and
control systems and equipment, production systems, information systems,
and personnel
Perform vulnerability assessment of facilities and associated services against
the list of potential threats
Discover and determine legal requirements for industrial automation and
control systems
Perform a risk analysis of potential vulnerabilities and threats
Categorize risks, potential impacts to the enterprise, and potential
mitigations
Segment security work into controllable tasks and modules for development
of functional designs
Establish network functional definitions for security portions of industrial
automation and control systems
ISA-62443-1-1, D6E2, September 2016 68 ISA99, WG03
Step Description
Functional Design Development of the security program is completed in this phase
Define functional security requirements for enterprise zones, plant zones,
and control zones. Potential activities and events are defined and
documented to perform the functional requirements and implement plans
for a secured enterprise.
Define functional security organization and structure
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
Define functions required in the implementation plan
Define and publish security zones, borders, and access control portals
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
Complete and issue security policies, and procedures
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
Detailed Design Design physical and logical systems to perform the functional requirements
previously defined for security
Step Description
Operations Security equipment, services, applications and configurations are completed
and accepted by operations and maintenance
Personnel are trained, and continued training is provided on security
matters
Maintenance monitors security portions of enterprise, plant, or control
zones and keeps them functioning properly
Asset management and change management is operational and maintained
Compliance Monitoring Internal audits
Risk reviews
External audits
Step Description
Disposal Obsolete security systems are properly disassembled and disposed of
Security borders are updated or recreated for zone protection
Access control portals are created, redefined, reconfigured, or closed
Personnel are briefed about changes in the security systems and items along
with the impact to associated security systems
ISA99, WG03 69 ISA-624431-1, D6E2, September 2016
2172
2173
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2174 10.3 Zones and Conduits
2175 10.3.1 Introduction
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2176 Every situation has a different acceptable level of security. For large or complex systems, it may
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
2177 not be practical or necessary to apply the same level of security to all components. Differenc es can
2178 be addressed by using the concept of a zone, defined as a logical or physical grouping of physical,
2182 A conduit is a particular type of zone that groups communications that can be logically organized
2183 into a grouping of information flows within and also external to a zone. Channels are the specific
2184 communication links established within a communication conduit.
2190 Zones can be defined in physical terms (i.e., a physical zon e), in logical terms (i.e., virtual zone),
2191 or in some combination. Physical zones are defined by grouping assets by physical location. In this
2192 type of zone, it is easy to determine which assets are within each zone. Virtual zones are defined
2193 by grouping assets, or parts of physical assets, into security zones based on functionality or other
2194 characteristics, rather than the actual location of the assets.
2195 There can also be zones within zones that provide layered security, giving defense in depth and
2196 addressing multiple levels of security requirements. Defense in depth can also be accomplished by
2197 assigning different properties to security zones.
2204 A conduit can be a single service (i.e., a single Ethernet network) or can be made up of multiple
2205 data carriers (multiple network cables and direct physical accesses). As with zones, it can be made
2206 of both physical and logical constructs. Conduits may connect entities within a zone or may connect
2207 different zones.
2208 As with zones, conduits may be either trusted or untrusted. Conduits that do not cross zone
2209 boundaries are typically trusted by the c ommunicating processes within the zone. Trusted conduits
2210 crossing zone boundaries must use an end-to-end secure process.
ISA-62443-1-1, D6E2, September 2016 70 ISA99, WG03
2211 Untrusted conduits are those that are not at the same level of security as the zone endpoint. In this
2212 case the security of the communication becomes the responsibility of the individual channel.
2213 Further information on this scenario is available in the Annex.
2216 Channels inherit the security properties of the conduit used as the communication media (i.e., a
2217 channel within a secured conduit will maintain the security level of the secured conduit). Channels
2218 may be trusted or untrusted.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2219 Trusted channels are communication links that allow secure communi cation with other security
2220 zones. A trusted channel can be used to extend a virtual security zone to include entities outside
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2221 the physical security zone.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
2222 Untrusted channels are communication paths that are not at the same level of security as the
2223 security zone under study. The communications to and from the reference zone (the zone that
2227 When organizing a system into zones and conduits an organization must first assess the security
2228 requirements (security goals) and then determine the positioning of asset within the zone structure.
2229 The security requirements can be broken down into the following types:
2230 Communications Access For a group of assets within a security border to provide value, there
2231 must be links to assets outside the security zone. This access can be in many forms, including
2232 physical movement of assets (products) and people (employees and vendors) or electronic
2233 communication with entities outside the security zone.
2234 Remote communication is the transfer of information to and from entities that are not in proximity
2235 to each other. For purposes of this document, remote access is defined as communication with
2236 assets that are outside the perimeter of the security zone being addressed.
2237 Local access is usually considered communication between assets within a single security zone.
2238 Physical Access and Proximity Physical security zones are used to limit access to a particular
2239 area because all the systems in that area require the same level of trust of their human operators,
2240 maintainers, and developers. This does not preclude having a higher -level physical security zone
2241 embedded within a lower-level physical security zone or a higher-level communication access zone
2242 within a lower-level physical security zone. For physical zones, locks on doors or other physical
2243 means protect against unauthorized access. The boundary is the wall or cabinet that restricts
2244 access. Physical zones should have physical boundaries commensurate with the level of security
2245 desired, and aligned with other asset security plans.
2246 One example of a physical security zone is a typical manufa cturing plant. Authorized people are
2247 allowed into the plant by an authorizing agent (security guard or ID), and unauthorized people are
2248 restricted from entering by the same authorizing agent and by fences.
2249 Assets that are within the security border are those that must be protected to a given security level,
2250 or policy. All devices that are within the border must share the same minimum level of security
2251 requirements. In other terms, they must be protected to meet the same security policy. Protection
2252 mechanisms can differ depending on the asset being protected.
2253 Assets that are outside the security zone are by definition at a lesser or different security level.
2254 They are not protected to the same security level, and by definition cannot be trusted to the same
2255 security level or policy.
ISA99, WG03 71 ISA-624431-1, D6E2, September 2016
2262 When different level activities are performed within one physical device, an organization can either
2263 map the physical device to the more stringent security requirements, or create a separate zone
2264 with a separate zone security policy that is a blended policy between the two zon es. A typical
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2265 example of this occurs in process historian servers. To be effective, the server needs access to the
2266 critical control devices that are the source of the data to be collected. However, to meet the
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2267 business need of presenting that data to super visors and process optimization teams, a more liberal
2268 access to the device is required than typical control system security requirements allow.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
2269 If multiple applications involving different levels of activities are running on a single physical device,
2300 g) the types of activities that are permitted within the zone
2301 h) the types of communication allowed access to the zone
2302 i) documentation of the zone attributes.
2303 All of the above are documented and combined into the zone security policy, which is used to guide
2304 and measure the construction and maintenance of the assets contained within the zone.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2308 appropriate security measures required to meet the goals of the security policy. Inventory acc uracy
2309 is a key factor in meeting the security goals set forth in the security policy. The list must be updated
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2310 when assets within the zone change, or their electronic connections change, as well as when new
2311
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
assets are added to the zone to ensure that the s ecurity goals are met.
2312 Physical assets and components are the physical devices contained within the zone. Some
2314 a) computer hardware (e.g., workstations, servers, instruments, controls, power supplies, disk
2315 drives, or tape backups)
2316 b) network equipment (e.g., routers, switches, hubs, firewalls, or physical cables)
2317 c) communications links (e.g., buses, links, modems, and other network interfaces, antennas)
2318 d) access authentication and authorization equipment (e.g., domain controllers, radius servers,
2319 readers, and scanners)
2320 e) development system hardware
2321 f) simulation and training system hardware
2322 g) external system hardware
2323 h) spare parts inventories
2324 i) monitoring and control devices (e.g., sensors, switches, and controllers)
2325 j) reference manuals and information.
2326 Logical assets include all the software and data used in the zone. Some examples are:
2327 a) computer system software (e.g., applications, operating systems, communication interfaces,
2328 configuration tables, development tools, analysis tools, and utilities)
2329 b) patches and upgrades for operating systems and application tool sets
2330 c) databases
2331 d) data archives
2332 e) equipment configuration files
2333 f) copies of software and data maintained for backup and recovery purposes
2334 g) design basis documentation (e.g., functional requirements including information and assets,
2335 security classification and levels of protection, physical and software design, vulnerability
2336 assessment, security perimeter, benchmark tests, assembly, and installation documents)
2337 h) supplier resources (e.g., product updates, patches, service packs, utilities, and validation
2338 tests).
2339 10.3.7.1.3 Access Requirements and Controls
2340 By its nature, a zone implies that access is limited to a small set of all the possible entities that
2341 could have access. A security policy for a zone must then articulate th e access required for the
2342 zone to meet its business objectives, and how this access is controlled.
ISA99, WG03 73 ISA-624431-1, D6E2, September 2016
2349 Many possible countermeasures exist to reduce the risk of a threat exploiting a given vulnerability
2350 within a zone. The security policy should outline what types of countermeasures are appropriate to
2351 meet the Target Security Level for the zone, within the cost versus risk trade-off.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2352 10.3.7.1.5 Authorized Technology
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2353 As industrial automation and control systems evolve to meet changing business needs, the
2354
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
technology used to implement the changes needs to be controlled. Each of the technologies used
2355 in these systems brings with it a set of vulnerabilities and corresponding risks. To minimize the
2356
2377 Conduits can be considered pipes that contain data and/or provide physical connections for
2378 communication between zones. A conduit can have sub conduits to provide a one-to-one or one-
2379 to-many zone communication. Providing secure communication for the conduit can be
2380 accomplished by implementing the appropriate zone security policy.
2383 A conduit is a type of zone that cannot have subzones; that is, a conduit is not made up of sub
2384 conduits. Conduits are defined by the list of all zones that share the given communication channels.
2385 Both physical devices and applications that use the channels contained in a conduit define the
2386 conduit end points.
2387 Like a zone, each conduit has a set of characteristics and security requirements that are its
2388 attributes. These take the form of:
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2397 10.3.8.1.1 Security Attributes
2398 Each conduit has a controlling document that describes the overall security goals and how to ensure
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2399 the Target Security Level is met. This document includes:
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
2400 a) the conduit scope
2422 Many possible countermeasures exist to reduce the risk of a threat exploiting a given vulnerability
2423 within a conduit. The security policy should outline what types of countermeasures are appropriate
2424 within the cost versus risk trade-off.
2438
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2439 10.4 Security Levels
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2440 10.4.1 Introduction
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
2441 Safety systems have used the concept of safety integrity levels (SIL) for almost two decades. This
2442 allows the safety integrity capability of a component or the safety integrity level of a deployed
2450 Security systems have much broader application, a much broader set of consequences and a much
2451 broader set of possible circumstances leading up to a possible event. Security systems are still
2452 meant to protect HSE, but they are also meant to protect the industrial process itself, company -
2453 proprietary information, public confidence and national security among other things in situations
2454 where random hardware failures may not be the root cause. In some cases, it may be a well -
2455 meaning employee that makes a mistake, and in other cases it may be a devious attacker bent on
2456 causing an event and hiding the evidence. The increased complexity of secur ity systems makes
2457 compressing the protection factor down to a single number much more difficult.
2467 The asset owner will be required to come up with their own definition of what those classifications
2468 mean for their particular application. The long-term goal is to move as many of the security levels
2469 and requirements to quantitative descriptions, requirements and metrics as possible to establish
2470 repeatable applications of the standard across multiple companies and industries. Achieving this
2471 goal will take time, since more experience in applying the standards and data on industrial security
2472 systems will need to be acquired to justify the quantitative approach.
2473 When mapping requirements to the different Security Levels, standard developers need some
2474 frame of reference describing what the different Security Levels mean and how they differ from
2475 each other. The goal is to propose such a frame of reference.
ISA-62443-1-1, D6E2, September 2016 76 ISA99, WG03
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2486 defined for that SL.
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2487 The language used for each of the Security Levels uses terms like casual, coincidental, simple,
2488 sophisticated, and extended. This language is intentionally vague to allow the same b asic language
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
2489 to be used for all of the standards in the ISA62443. Each of the individual standards in the series
2490 will define the requirements for the Security Levels that apply to their particular purpose.
2512 A simple example would be an operator able to change a set point on the engineering station
2513 in the BPCS zone to a value outside certain conditions determined by the engineering staff.
2514 The system did not enforce the proper authentication and use control restrictions to disallow
2515 the change by the operator. Another example would be a password being sent in clear text
2516 over the conduit between the BPCS zone and the DMZ zone, allowing a network engineer
2517 to view the password while troubleshooting the system. The system did not enforce proper
2518 data confidentiality and authenticator protection to protect the password. A third example
2519 would be an engineer that means to access the PLC in Industrial Network #1 but actually
2520 accesses the PLC in Industrial Network #2. The system did not enforce the proper restriction
2521 of data flow preventing the engineer from accessing the wrong system.
2522 Security Level 2: Protection against intentional violation using simple means with low
2523 resources, generic skills and low motivation
2524 Simple means do not require much knowledge on the part of the attacker. The attacker does
2525 not need detailed knowledge of security, the domain or the particular system under attack.
ISA99, WG03 77 ISA-624431-1, D6E2, September 2016
2526 These attack vectors are well known and there may be automated tools for ai ding the
2527 attacker. They are also designed to attack a wide range of systems instead of targeting a
2528 specific system, so an attacker does not need a significant level of motivation or resources
2529 at hand.
2530 An example would be a virus that infects the maintenanc e workstation in the Plant DMZ
2531 zone spreading to the BPCS engineering workstation since they both use the same general
2532 purpose operating system. Another example would be an attacker compromising a web
2533 server in the enterprise network by an exploit download ed from the Internet for a publicly
2534 known vulnerability in the general purpose operating system of the web server. The attacker
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2535 uses the web server as a pivot point in an attack against other systems in the enterprise
2536 network as well as the industrial network. A third example would be an operator that views
2537 a website on the HMI located in Industrial Network #1 which downloads a Trojan that opens
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2538 a hole in the routers and firewalls to the Internet.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
2539 Security Level 3: Protection against intentional violation u sing sophisticated means
2548 An example of sophisticated means could be passwor d or key cracking tools based on hash
2549 tables. These tools are available for download, but applying them takes knowledge of the
2550 system (such as the hash of a password to crack). Another example would be an attacker
2551 that gains access to the FS- PLC through the serial conduit after gaining access to the
2552 control PLC through a vulnerability in the Ethernet controller. A third example would be an
2553 attacker that gains access to the data historian by using a brute -force attack through the
2554 industrial/enterprise DMZ firewall initiated from the enterprise wireless network.
2555 Security Level 4: Protection against intentional violation using sophisticated means
2556 with extended resources, IACS specific skills and high motivation
2557 Security Level 3 and Security Level 4 are very similar in that they both involve sophisticated
2558 means used to violate the security requirements of the system. The difference comes from
2559 the attacker being even more motivated and having extended resources at their disposal.
2560 These may involve high-performance computing resources, large numbers of computers or
2561 extended periods of time.
2562 An example of sophisticated means with extended resources would be using super
2563 computers or computer clusters to conduct brute-force password cracking using large hash
2564 tables. Another example would be a botnet used to attack a system using multiple attack
2565 vectors at once. A third example would be an organized crime organization that has the
2566 motivation and resources to spend weeks attempting to analyze a system and develop
2567 custom zero-day exploits.
2571 Target Security Levels (SL-T) are the desired level of security for a particular system. This
2572 is usually determined by performing a risk assessment on a system and determining that it
2573 needs a particular level of security to ensure its correct operation.
ISA-62443-1-1, D6E2, September 2016 78 ISA99, WG03
2574 Achieved Security Levels (SL-A) are the actual level of security for a particular system.
2575 These are measured after a system design is available or when a system is in place. They
2576 are used to establish that a security system is meeting the goals that were originally s et out
2577 in the target Security Levels.
2578 Capability Security Levels (SL-C) are the security levels that component or systems can
2579 provide when properly configured. These levels state that a particular component or system
2580 or component is capable of meeting the target Security Levels natively without additional
2581 compensating controls when properly configured and integrated.
2582 Each of these Security Levels is intended to be used in different phases of the security life cycle
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2583 according the ISA62443 series of standards. Starting with a target for a particular system, an
2584 organization would need to build a design that included the capabilities to achieve the desired
2585 result. In other words, the design team would first develop th e target Security Level necessary for
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2586 a particular system. They would then design the system to meet those targets, usually in an iterative
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
2587 process where after each iteration the achieved Security Levels of the proposed design are
2588 measured and compared to the target Security Levels. As part of that design process, the designers
2597 When designing a new system (green field) or revising the security of an existing system (brown
2598 field), the first step is to break the system into different zones and define conduits connecting these
2599 zones where necessary. Details on how to accomplish this are given in ISA62443-3-2. Once a
2600 zone model of the system is established each zone a nd conduit is assigned a target SAL, based
2601 on a risk analysis, which describes the desired security for the respective zone or conduit. During
2602 this initial zone and conduit analysis, it is not necessary to have completed a detailed system
2603 design. It is sufficient to describe the functionality that should be provided by assets in a zone and
2604 the connections between zones in order to meet the security objectives.
2605 Figure 17 and Figure 18 show high-level examples of systems broken down into zones connected
2606 by conduits. Figure 17 is a graphical representation of a control system for a chlorine truck loading
2607 station. The full use-case that accompanies this figure will be discussed in ISA-TR62443-1-4. It has
2608 five zones shown: the basic process control system (BPCS), the SIS, the control center, the plant
2609 DMZ, and the enterprise. The BPCS and the SIS both use PLCs to operate different aspects of the
2610 loading station with the SIS using a special functional safety PLC (FS -PLC) rated for use in safety
2611 systems. The two PLCs are connected via a non-routable serial or Ethernet connection using a
2612 boundary protection device. Each of the PLCs is connect ed to a local switch with an engineering
2613 workstation for programming and HMI for operating. The BPCS and SIS zones also contain an
2614 instrument asset management system (IAMS) to measure and test the instruments. A control center
2615 containing multiple workstations and the BPCS are both connected to the plant DMZ. A plant DMZ
2616 can house a variety of components and systems, for example a data historian and a maintenance
2617 workstation as shown in the figure. The plant DMZ is shown connected to the enterprise systems,
2618 which contain the corporate wireless local area network (WLAN) and web server. Multiple domain
2619 controllers and boundary protection devices are shown in the figure to indicate some of the
2620 countermeasures that may be applied to improve security.
ISA99, WG03 79 ISA-624431-1, D6E2, September 2016
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
2621
2622 Figure 17 High-level process-industry example showing zones and conduits
2623 Figure 18 is a graphical representation of a manufacturing plant. It has four zones defined: the
2624 enterprise network, the industrial/enterprise DMZ, and two industrial networks. The enterprise
2625 infrastructure has a wireless local area network (WLAN) and a connection to the Internet. Many
2626 companies use a DMZ between important parts of their systems to isolate the network traffic. In
2627 this particular example, each industrial network operates relatively independent of each other with
2628 its own PLC, field devices, and HMI.
ISA-62443-1-1, D6E2, September 2016 80 ISA99, WG03
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
2629
2630 Figure 18 High-level manufacturing example showing zones and conduits
2631 After determining the target Security Levels, the system can be designed (green field) or redesigned
2632 (brown field) to try to meet those target Security Levels. The design process is usually an iterative
2633 approach where the system design is checked against the target multiple times throughout the
2634 process. Multiple parts of the ISA62443 series of standards contain guidance on different aspects
2635 of the programmatic and technical requirements that go into the design process. ISA62443-2-1
2636 provides guidance on the programmatic aspects of the design process while ISA62443-3-3 and
2637 ISA62443-4-2 define system-level and component-level technical security requirements and relate
2638 them to different capability Security Levels.
2639 During the design process for a system, it is necessary to evaluate the security capabilities of
2640 different components and subsystems. Product suppliers will have to provide these as capability
2641 Security Levels for their components or systems by comparing product features and capabilities
2642 with the requirements defined in the ISA62443 series for the different capability Security Levels.
2643 These capability Security Levels can be used to determine whether a given component or system
2644 is capable of meeting the target Security Level for the system. The product supplier or system
2645 integrator will also have to provide guidance on how to configure the component or subsystem to
2646 meet the claimed Security Levels.
2647 It is likely that in a particular design there will be som e components or systems that cannot fully
2648 meet the target SAL. Where the capability Security Level of a component or system is lower than
2649 the target SAL, compensating controls need to be considered to meet the desired target SAL.
2650 Compensating controls may include changing the design of the component or system to increase
2651 its capabilities, choosing another component or system to meet the target Security Level or adding
2652 additional components or systems to meet the target SAL. After each iteration in the desig n
2653 process, the system designs achieved Security Levels should be reevaluated to see how they
2654 compare to the target Security Levels for the system.
2655 Once the system design is approved and implemented, the system needs to be evaluated to prevent
2656 or mitigate deterioration of the systems security level. It should be evaluated during or after system
2657 modifications and on a regular schedule. ISA62443-2-1 and ISA62443-2-2 provide guidance on
ISA99, WG03 81 ISA-624431-1, D6E2, September 2016
2658 the steps necessary to operate the security program and how to evaluate its effectiveness. After
2659 the achieved Security Levels have been determined, it will be necessary to evaluate whether the
2660 system is still meeting the original target Security Levels (for example, using the system
2661 requirements from ISA62443-3-3). If the system is not meeting those requirements, there may be
2662 multiple reasons including the lack of maintenance of the program or the need to redesign parts of
2663 the system.
2664 In essence, the control system security capabilities are determined independent from a given use
2665 context, but are used in a given context in order to achieve the target SL of the respective system
2666 architecture, zones and/or conduits (see Figure refernce).
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
2667
2668 Figure 19 High-level manufacturing example showing zones and conduits
2682 This language can be based on the additional consequences associated with security systems or
2683 different attacks against the security objectives addressed by the FRs. The language used in the
2684
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
Security Level definitions can contain practical explanations of how one system is more secure
2685 than another without having to relate everything to HSE consequences.
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2686 10.4.7 Security Level Vector Format
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
2687 A vector can be used to describe the security requirements for a zone, conduit, component or
2688 system better than a single number. This vector may conta in either a specific Security Level
2691 Where;
2692 SL-? = (Required) The Security Level type (see 10.3.3). The possible formats are:
2698 domain = (Required) The applicable domain that the Security Level applies. Domains can
2699 refer to zones, control systems, subsystems or components. Some examples of different
2700 domains from Figure A.1 are SIS zone, BPCS zone, BPCS HMI, Plant DMZ domain
2701 controller, Plant DMZ to Control Center conduit and SIS to BPCS serial conduit. In this
2702 particular standard, all requirements refer to a control system, so the domain term is not
2703 used as it would be by other documents in the ISA62443.
2708
2709 10.5 Foundational Requirements
2710 As noted in the discussion of fundamental concepts (see n.n), there are basic or Foundational
2711 Requirements (FRs) that form the basis for subsequent requirements in this standard as well as
2712 other standards in the ISA62443 series. All aspects associated with meeting a desired IACS
2713 security level (people, processes and technology) are derived through meeting the requirements
2714 associated with the following Foundational Requirements:
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2725 associated with an often complex security or protection level. This vector of security levels allows
2726 definable separations between security levels on a requirement by requirement basis.
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2727 10.5.1 FR 1 Identification and authentication control (IAC)
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
2728 10.5.1.1 Requirement
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2773 10.5.4 FR 4 Data confidentiality (DC)
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2774 10.5.4.1 Requirement
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
2775 Based on the target security level (SL-T) determined using the processes defined in ISA62443-3-
2776 2, the IACS shall provide the necessary capabilities to ensure the confidentiality of information on
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2815 levels. In particular, security incidents in the control system should not affect SIS or other safety-
2816 related functions.
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2817
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
2818 10.6 Security and Safety
2821 Safety Instrumented Systems (SIS), represent one layer of protection that may be implemented in
2822 order to reduce risks associated with Industrial Automation Control Systems. Traditional risk
2823 assessment methodologies in the past, have generally excluded the potential for cyber related
2824 attacks to cause safety related incidents. Given that targeted attacks on Industrial Automation
2825 Control Systems have occurred and these systems are increasingly being connected to other
2826 business systems, they represent a significant potential for common mode failure. As a result, it is
2827 necessary in today's world to include cyber security in the overall Risk Assessment.
2828 Without addressing cyber security throughout the entire safety lifecycle, it is imposs ible to
2829 adequately understand the relative integrity of the various layers of protection that involve
2830 instrumented systems, including the SIS.
2831 The underlying premise of this standard is that the means to implement, operate, and maintain
2832 system security should not compromise the performance of the safety instrumented systems (SIS).
2833 It should also be understood that achieving higher security levels may result in less convenience
2834 to the end user.
2835 Note- the ISA84 Technical Report would like to use a modified ve rsion of the first 2 paragraphs that is specific to the
2836 process industry, but probably not the Rationale section. I also have reservations about including the Rationale section.
2837 We can discuss if the first 2 paragraphs have enough content for the Foundatio nal Clause, or if the Rationale section
2838 should also be included and/or edited down.
2839 Note update Jun 06, 2015. The wording of the first 2 paragraphs has been modified, and a third paragraph has been
2840 added. These changes align with the ISA84 Technical Report , yet maintains a generic approach to safety & security (in
2841 contrast to ISA84's process specific approach).
2842 10.6.1 Rationale
2843 To take advantage of digital advances, Industrial Control Systems have changed dramatically in
2844 the last two decades. Once isolated and proprietary, ICS today are part of a converged network
2845 that connects plant operations to the administrative environment. The migration from single -
2846 purpose supervisory control and data acquisition (SCADA) systems to industry standard, network -
2847 based systems provided numerous benefits, including increased information -sharing across the
2848 operation, and remote (Internet and wireless) access to Industrial Control Systems.
2849 But those advances also created security gaps. By connecting to the larger web of networks, w ater-
2850 control systems are exposed to the myriad threats that lurk in cyber space, including viruses, worms
2851 and Trojans. Poor control-system architecture, unfettered user access, and lax oversight of security
2852 policies and procedures have all combined to heighten the risk.
2853 Meanwhile, manuals and training videos on ICS are publicly available, and many hacker tools can
2854 be downloaded or purchased on the Internet. Cyber criminals need little systems knowledge to
ISA-62443-1-1, D6E2, September 2016 86 ISA99, WG03
2855 infiltrate ICS operations. For all these reasons, the number of control-system cyber-security
2856 incidents has escalated sharply.
2857 According to RISI, almost half of all cyber incidents across all industries were caused by malware,
2858 including viruses, worms and Trojans. But unauthorized access or sabotage by internal sources,
2859 such as disgruntled workers or contractors using access privileges to cause harm, rose
2860 considerably at the same time. Network anomalies also triggered failures in control -system
2861 equipment.
2862 The increasing inter-connectivity of control systems is equally important to industry since new
2863
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
benefits also bring new challenges. Open industrial networks that seamlessly coexist in broader
2864 Ethernet systems are being used to link various plant -wide control systems together and connect
2865 these systems into expansive, enterprise-level systems via the Internet. As the pace of control
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2866 system and enterprise network architecture convergence quickens, industrial security depends on
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
2867 staying both flexible and vigilant and successfully controlling the space. What may be considered
2868 adequate protection today should evolve as vulnerabilities are identified and new threats emerge.
2873
2876
2875
2874
ISA99, WG03
87
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA-62443-1-1, D6E2, September 2016 88 ISA99, WG03
2877 BIBLIOGRAPHY
2878 NOTE This bibliography includes references to sources used in the creation of this standard as well as references to
2879 sources that may aid the reader in developing a greater understanding of cyber security as a whole and developing a
2880 management system. Not all references in this bibliography are referred to throughout the text of this standard. The
2881 references have been broken down into different categories depending on the type of source they are.
2882 [1] ISO/IEC Directives, Part 2, Rules for the structure and drafting of International Standards
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2885 Terminology, Clause 5 (Hierarchy Models)
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2886
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
ISA99, WG03 89 ISA-624431-1, D6E2, September 2016
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2893 is illustrated in Figure xx.
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
Enterprise Zone
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
Laptop computer Workstation Mainframe Server Server
App. Data Maint. Firewall App. Data Maint. Firewall App. Data Maint. Firewall
Server Server Server Server Server Server Server Server Server
2896 This figure represents a three-plant organization with a separate corporate headquarters. The three
2897 plants are connected to the enterprise network to allow communications to headquarters and the
2898 other plants. Four possible conduits are defined in the drawing (others would also be defined, but
2899 are skipped for brevity). The first is the enterprise conduit, shown at the top of the figure. It connects
2900 multiple plants at different locations to the corporate data center. If the wide area netwo rk (WAN)
2901 is constructed using leased or private communications, then it could be considered a trusted
2902 conduit. If it uses both public and private networks, then it may be classified as untrusted. Included
2903 in the conduit is all of the communications equipment and firewalls that make up the plant links.
2904 Instances of the second conduit class are shown in each plant. Here each of the plants has its own
2905 trusted conduit to allow control communication.
2909 I believe that the notion of parent and child only applies to the Plant zones and to the Plant Control zones.
2910 NOTE: There is a distinct advantage to aligning zones with physical areas or zones in a facility for example, aligning
2911 a control center with a control zone.
Enterprise Zone
Laptop computer Workstation Mainframe
Server Server
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
Plant A Zone Plant B Zone Plant C Zone
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
Router Router Router
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
File/Print App. Data File/Print App. Data File/Print App. Data
Server Server Server Server Server Server Server Server Server
2912
2913 Figure A-2 Multi-plant Zone Example
Enterprise Zone
Laptop computer Workstation Mainframe Server Server
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
Laptop computer Workstation Laptop computer Workstation Laptop computer Workstation
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
File/Print App. Data File/Print App. Data File/Print App. Data
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
Server Server Server Server Server Server Server Server Server
Enterprise Zone
Laptop computer Workstation Mainframe
Server Server
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
WAN
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
App. SCADA SCADA App. SCADA
SCADA
Server Server Server
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
Server Server Server
Site A Control Zone Site B Control Zone Site X Control Zone Site Y Control Zone
2922
2923 Figure A-4 SCADA Zone Example
ISA99, WG03 93 ISA-624431-1, D6E2, September 2016
Enterprise Zone
Laptop computer Workstation Mainframe
Server Server
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
WAN
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
App. SCADA SCADA App. SCADA
SCADA
Server Server Server Server Server
Server
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
SCADA System Zone
Site A Control Zone Site B Control Zone Site X Control Zone Site Y Control Zone
2924
2925 Figure A-5 SCADA Separate Zones Example
Enterprise Zone
Laptop computer Workstation Mainframe Server Server
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
Laptop computer Workstation Laptop computer Workstation Laptop computer Workstation
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
File/Print App. Data File/Print App. Data File/Print App. Data
Server Server Server Server Server Server
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
Server Server Server
2929 Just as with zones, a similar view can be constructed for use in SCADA applications. An example
2930 is shown in Figure xx.
2933
2932
2931
ISA99, WG03
95
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA-62443-1-1, D6E2, September 2016 96 ISA99, WG03
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2942 A system architecture diagram is shown below in Figure B-1. The architecture selected is means
2943 to represent a fairly modern design that is typical of what is found in many plants today. There are
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2944 some cybersecurity controls in place but there are int entionally several vulnerabilities in the design.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
IT Data Center
Corporate
Business LAN
Business
LAN
PCN
Equipment Room
SIS
Engineering DCS Server DCS Server
Workstation BPCS
Engineering
Workstation
PCN
` `
PCN
Field
BPCS HMI
2945
2946 Figure B-1 Chemical Truck Loading Control System Architecture Diagram
2949 Figure B-2 is an illustration of the system delineating the boundary of the SUT.
IT Data Center
Corporate
Domain
Data Controller WAN
Historian
Enterprise
Firewall
Business LAN
Business
LAN
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
Control Room Operator Operator
Consoles Consoles
Equipment Room
SIS
Engineering DCS Server DCS Server
Workstation BPCS
Engineering
Workstation
PCN
` `
PCN
Field
BPCS HMI
2950
2951 Figure B-2 Chemical Truck Loading System with Definition of SUT Boundary
2952 The organization shall perform a high-level risk assessment of the assets within the SuC (per
2953 ISA99.02.01:2009 Clause 4.2.3.1-4) to determine financial and health, safety and environmental
2954 (HSE) impact based on function, location, and potential consequences.
2955 Based upon the risk assessment (HAZOP) performed on the chemic al truck loading facility, the
2956 worst-case credible scenario is that the system attempts to fill a truck when there is not one present
2957 which would result is a large release of hazardous and flammable material. Under certain
2958 conditions, it is possible for the vapor cloud to ignite and explode. Fire suppression systems in the
2959 facility may be able to prevent the explosion and mitigate the damage if they react in time. While
2960 there are several interlocks in place designed to prevent this scenario, they are all ca pable of being
2961 bypassed by the control or safety system. A local operator or truck driver has the ability to initiate
2962 an emergency-stop that is hard-wired to interrupt power to the system. However, there are several
2963 scenarios where the local operator or truck driver fails or is unable to react in time to prevent the
2964 worst case consequence.
ISA-62443-1-1, D6E2, September 2016 98 ISA99, WG03
2965 There are several more scenarios that can result in lower category consequences such as:
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2972 control system.
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2974
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
If required in the final document, this table will be redrawn to confirm to the necessary conventions.
2978
2979 Figure B-3 shows a diagram of the major components of a chemical truck loading station to illustrate
2980 how the requirements related to the zones and conduits concepts can be used for doing risk
2981 assessments or consequence analyses. This figure also is intended to clarify some of the
2982 terminology used.
ISA99, WG03 99 ISA-624431-1, D6E2, September 2016
2983 If required in the final document, this figure will be redrawn to confirm to the necessary conventions.
2984
2985 Figure B-3 Diagram of major components for chemical truck loading example
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
2986
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2987 We start by creating a table of the assets in the control system
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
2988 Table B-3 Table of Assets
FS-PES A L Med
Firewall B M Med
2989
ISA-62443-1-1, D6E2, September 2016 100 ISA99, WG03
2990 If required in the final document, this table will be redrawn to confirm to the necessary conventions.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
2991
2992
2993 Table B-4 Typical Risk Level Matrix
2994 If required in the final document, this table will be redrawn to confirm to the necessary conventions.
2995
2996 NOTE: The External Network shown in the diagram above represents all networks external to the SuC, so could be a
2997 companys enterprise network, which in turn would be connected to external networks, including the Internet. The SuC
2998 shown here encompasses all parts of the plant that are to be modeled using zone s and conduits.
2999 In order to provide clearer descriptions of concepts and boundaries that are significant for
3000 explaining security issues and areas of responsibility, the following hierarchy is proposed.
3001 Significant networks in a company can be arranged with the enterprise network at the highest level.
3002 This network serves the entire company and includes office automation support and
3003 communications needed for the business side and managed by the Information Technology (IT)
3004 Department. The business side includes financial, procurement, legal, and administrative activities.
3005 An Office Automation Network (OAN) supports these office automation activities.
3006 The technical operations part of the company includes the industrial automation and control
3007 systems (IACS) support, most of which is managed by an Industrial Automation (IA) Department or
3008 control systems group. The IACS includes the system under consideration (SuC) and technical
3009 support for it. Both the SuC and additional organizational support (policies, guidelines , operator
3010 training activities, etc.) which all combine to make up the IACS are also connected to the enterprise
3011 network through a firewall.
ISA99, WG03 101 ISA-624431-1, D6E2, September 2016
3012 As a practical matter the IACS should include all assets needed to maintain normal plant operations
3013 in stand-alone mode should it be necessary to disconnect the IACS from all external networks
3014 during a sustained cyber attack (a period of time that could last weeks).
3015 The system under consideration (SuC) consists of the control system zone and everything
3016 contained in it, the router or firewall conduit separating the control system zone and plant network
3017 zone, the plant network zone, and the router/firewall separating the plant network from the company
3018 enterprise network. The SuC in this example shows a hierarchy of zones contained in zones (zone
3019 nesting is allowed) and conduits within zones.
3020
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
An initial high level risk assessment identifies the most significant vulnerabilities at the SuC level
3021 affecting the station as a whole such as a large catastrophic release of chlori ne gas (a very bad
3022 leak), physical damage from a large explosion or major rupture of a tank, and access restrictions
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
3023 to support maintaining the physical integrity of the station and its operation.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
3024 The control system (PLC) network is isolated from the plant network by a router/firewall, even
3025
3027 In the example considered here activities supported on the plant network are mo deled using zones
3028 and conduits and are included in the consequence assessment (risk analysis) with associated
3029 assignment of security assurance levels (SALs) that must be met. Once the facility is in operation,
3030 management of the plant network activities could be done either by the IT or IA parts of the
3031 organization. A major IT objective is usually protection of information while a major objective for an
3032 industrial automation application (control system) is protection of and availability of the plant (in
3033 this example the ability at all times to control operation of the loading station). A control system
3034 often has hazardous energy sources which are not part of an office automation environment.
3035 It will be important to have IT participation at some level in the z ones and conduits modeling and
3036 consequence assessment activities. Roles and responsibilities of plant personnel in both areas (IT
3037 and IA) need to be clearly defined. Network monitoring and management goals may be different,
3038 so need to be defined. Likewise, things like patch management, system testing, and upgrades to
3039 software and operating systems.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA99, WG03 103 ISA-624431-1, D6E2, September 2016
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
3053 Security Level Target
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
3054 Applicable security policies
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
3055 Assumptions and external dependencies
Logical boundary This zone interfaces with the Process Information Zone,
Process Safety Zone and Process Measurement Zone
through 3 distinct conduits
Physical boundary, if applicable The Process Control Zone is physically located within the
equipment room
List of all access points and associated boundary devices Logical Access Points:
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
Assumptions and external dependencies
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
3057 Figures B-17 and B-18 show high-level examples of systems broken down into zones connected
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
3058 by conduits. Figure B-17 is a graphical representation of a control system for a chlorine truck
3059 loading station. It has three zones defined: the control system, the safety integrated system (SIS),
3063
3064 Figure B-5 Process Industry Example Showing Zones and c\Conduits
3065 Figure B-18 is a graphical representation of a manufacturing plant. It has four zones defined: the
3066 enterprise network, the industrial/enterprise demilitarized zone (DMZ), and two industrial networks.
3067 The enterprise infrastructure has a wireless local area network (WLAN) and a conn ection to the
3068 Internet. Many companies use a DMZ between important parts of their systems to isolate the
3069 network traffic. In this particular example, each industrial network operates relatively independent
3070 of each other with its own PLC, field devices, and human-machine interface (HMI).
ISA99, WG03 105 ISA-624431-1, D6E2, September 2016
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
3071
3072 Figure B-6 Manufacturing Example Showing Zones and Conduits
3073 After determining the target SALs, the system can be designed (green field) or redesigned (brown
3074 field) to try to meet those target SALs. The design process is usually an iterative approach where
3075 the system design is checked against the target multiple tim es throughout the process. Multiple
3076 parts of the ISA99 series of standards contain guidance on different aspects of the programmatic
3077 and technical requirements that go into the design process. ISA62443-2-1 provides guidance on
3078 the programmatic aspects of the design process while ISA62443-3-3 and ISA62443-4-2 define
3079 system-level and component-level technical security requirements and relate them to different
3080 capability SALs.
3081 During the design process for a system, it is necessary to evaluate the security capabilities of
3082 different components and subsystems. Vendors will have to provide these as capability SALs for
3083 their products by comparing product features and capabilities with the requirements defined in the
3084 ISA62443 series for the different capability SALs. These capability SALs can be used to determine
3085 whether a given system or component is capable of meeting the target SAL for the system. The
3086 vendor or system integrator will also have to provide guidance on how to configure the component
3087 or subsystem to meet the claimed SALs.
3088 It is likely that in a particular design there will be some components or systems that cannot fully
3089 meet the target SAL. Where the capability SAL of a component or system is lower than the target
3090 SAL, compensating controls need to be consider ed to meet the desired target SAL. Compensating
3091 controls may include changing the design of the component or system to increase its capabilities,
3092 choosing another component or system to meet the target SAL, or adding additional components
3093 or systems to meet the target SAL. After each iteration, the system design SALs should be
3094 reevaluated to see how they compare to the target SALs for the system.
3095 Once the system design is approved and implemented, the system needs to be evaluated to prevent
3096 or mitigate deterioration of the systems security level. It should be evaluated during or after system
3097 modifications and on a regular schedule. ISA62443-2-1 and ISA62443-2-2 provide guidance on
3098 the steps necessary to operate the security program and how to evaluate its effectiveness. After
ISA-62443-1-1, D6E2, September 2016 106 ISA99, WG03
3099 the achieved SALs have been determined, it will be necessary to evaluate whether the system is
3100 still meeting the original target SALs (e.g. using th e system requirements from ISA62443-3-3). If
3101 the system is not meeting those requirements, there may be multiple reasons including the lack of
3102 maintenance of the program or the need to redesign parts of the syste m.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
3107 removed, it would automatically shut off the pumps. There is also a high -level protection switch that
3108 assures that if the chemical tank is at a certain level that is automatic shuts off the pumps. Th ere
3109 is also gas detection a truck unloading area and any place along the injection lines to the equipment
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
3110 that will use the chemical. If there is an alert, it will automatically shut down the pumps and signal
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
3111 the operator. In some processes where the chemical is being injected into a burning process for
3112 example, the emissions are monitored. This would be the case when a hazardous chemical is being
3114 The safety system must be tested prior to commissioning of the system b y circulation and injection
3115 of water to determine if there are any leaks. Otherwise, the hazardous chemical or gases could
3116 escape and create a unsafe condition for personnel the system should also have a flush cycle to
3117 inject water once again to flush the hazardous chemical out of the lines. This system must all be
3118 tested to assure proper operation. Emissions monitoring is extremely important in these types of
3119 applications where the gases can be released into the air, into the ground, or nearby bodies of
3120 water. This would put the plant at risk for OSHA or MSHA violation including EPA emissions
3121 violation, which all would be punishable by fines. Personal injury prevention is important so if any
3122 action has consequence that would expose personnel or if release i nto the air or water it may affect
3123 people many miles from the facility. Spill control is also important safety relevant condition so run
3124 off monitor and positioning of eyewash stations must be monitored and provide alerts to operations,
3125 which may include key personnel. Personal training is done for safety conditions including lockout
3126 and wearing proper safety gear but there is no explanation of security concerns other than potential
3127 limitation of use of cell phones and other radios in a particular area. The re is always a need to have
3128 an emergency shutdown and those conditions must be evaluated since immediate shutdown of a
3129 control system must be able to recover form unexpected or an emergency shutdown.
3130 In some process these alerts may extend to monitor when the take is low since a hazardous
3131 chemical may be an integral part of a production process to reduce NOX emissions for example. In
3132 these situations, the monitoring of a 30-day average may be important to maintain EPA compliance.
3133 Process operation many need to be changed to assure the long-term accumulation of release of
3134 toxic gases into the air many mean that there will be an even wider effect related to use of
3135 hazardous chemicals, which are needed as part of a productions process. There may be other
3136 instruments including sensors that may exist to detect unsafe conditions and can provide
3137 notification to operator.
3138 The use of hazardous chemicals in a process requires that all aspects of a system must operate
3139 perfectly since they cannot be allowed to operate i n a reduced capacity. Consequently, the system
3140 will have interlocks that prevent startup and will force a shutdown if those permissive are lost or
3141 changed. There are other conditions such as power and water supplies that now become critical
3142 which under normal operation they could be operated at a reduced capability.
3143 The backup power systems should be monitored. Sufficient water and air for pneumatic devices
3144 must be monitored and frequently checked to assure that they are operating properly. There is
3145 limited leeway and having an ample supply of power, water, and air are essential for plant
3146 operations especially if used in safety operations. Generally, physical security was the only
3147 consideration and there is no requirement or standard to provide assurance tha t restriction of
3148 packets that could adversely affect operations and impact safety of those systems.
ISA99, WG03 107 ISA-624431-1, D6E2, September 2016
3149 It is important to define the safety aspects to recognize what can be the impact. The security
3150 aspects need to provide protection against intrusion and alte ration of operations. This may include
3151 confidentiality if knowledge of those conditions or restriction to access of that system needs further
3152 restriction. The end devices are generally vulnerable since the protection against cyber
3153 infringement due not exists. Consequently, new capabilities are need to isolate those operations
3154 yet providing a means to facilitate a dialog with other devices, user, and applications that are trusted
3155 to view or control operations of security-safety related systems.
3156
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
ISA-62443-1-1, D6E2, September 2016 108 ISA99, WG03
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
3164 If required in the final document, this figure will be r edrawn to confirm to the necessary conventions.
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
3165
3166 Figure C-1 Example application - Chemical truck loading station
3168 Field instruments such as flow sensors and transmitters, valves, motor control for pumps.
3169 PLC system including power supplies, CPU, and interface modules for field signals.
3170 Workstations for operation, supervision, maintenance and engineering.
3171 Communication infrastructure including switches and firewalls.
3172 C.1.2 Technical Approach
3173 Objective
3174 The objective of this example is show how the foundational requirements are applied to an example
3175 problem - in this case, the chemical loading truck station.
3176 Assumptions
ISA99, WG03 109 ISA-624431-1, D6E2, September 2016
3177 It was assumed that ISA62443-3-3 is applied throughout the life-cycle of the security architecture.
3178 Therefore, the target, design, achieved and measured system security assurance level needed to
3179 be addressed. At each stage in the life-cycle, all 4 levels are included to provide a comparison and
3180 basis for system security assurance level selection.
3181 In C.1.2.3, the selection is based on reviewing company policy and the AC guideline provided in
3182 ISA62443-3-3.
3183 In C.2.1 the selection is based on FR1 AC3 and the add ed security strength requirements to
3184 discriminate between system security assurance levels. System security assurance is designated
design because the additional detail provides information needed for the build -to decision.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
3185
3186 In C.2.2 and C.3 the selection is based on the same information described previously, but now
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
3187 given an installed security architecture which has been validated after site acceptance testing and
3188 commissioning. This is designated time t0 and the system security assurance is now lab eled
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
3189 achieved.
3193 It is interesting to note that the selected requirements from does not mention consequence
3194 analysis per se. This example assumes that consequence analysis occurs throughout the life -
3195 cycle. It is not a one-time analysis. Each time it is performed the parameters of the consequence
3196 analysis are somewhat different.
3197 For example, when developing a company policy, a consequence analysis of sufficient depth is
3198 needed to establish the policies and procedures and provided sufficient guidance to establish the
3199 target security assurance level for the SuC.
3200 When the security architecture is selected (design), a consequence analysis is repeated with
3201 parameters that reflect the capability of enabling security mechanisms.
3202 When installed and commissioned (achieved) at time t0, a consequenc e analysis is repeated to
3203 account for any variance between design expectations and real capability that has been verified by
3204 testing & analysis for commissioning.
3205 Lastly, during maintenance of the installed security architecture, a consequence analysis is
3206 repeated based on collected measurements of performance and other reports required by
3207 ISA62443-1-3. Practical experience has shown that deviations from the norm (what was expected)
3208 may or may not have an impact on the assessed consequence.
3210 ISA62443-3-3 defines the guidelines to apply assessment criteria. Fo r this example (Figure C-1),
3211 tailored for IACS application, the AC-3 guideline is prescribed in terms of control with supplemental
3212 guidance.
3213 Control: The Industrial Automation Control System shall provide the capability to en force assigned
3214 authorizations for controlling access to the system in accordance with applicable policy.
3215 Supplemental guidance: Access control policies (e.g., identity-based policies, role-based policies,
3216 rule-based policies) and associated access enforcement mechanisms (e.g., access control lists,
3217 access control matrices, cryptography) are employed by organizations to control access between
3218 users (or processes acting on behalf of users) and objects (e.g., devices, files, records, processes,
3219 programs, domains) in the IACS. In addition to controlling access at the information system level,
3220 access enforcement mechanisms are employed at the application level, when necessary, to provide
3221 increased information security for the organization. Consideration is given to the implementation of
ISA-62443-1-1, D6E2, September 2016 110 ISA99, WG03
3222 a controlled, audited, and manual override of automated mechanisms in the event of emergencies
3223 or other serious events. If encryption of stored information is employed as an access enforcement
3224 mechanism, the cryptography used is FIPS 140-2 (as amended) compliant.
3225 For this example, a review of company policies and procedures determined that the organization
3226 explicitly defines privileged functions and security-relevant information for the IACS. Furthermore,
3227 the organization explicitly authorizes personnel access to privileged functions and security-relevant
3228 information in accordance with organizational policy. And, the IACS restricts access to privileged
3229 functions (deployed in hardware, software, and firmware) and security -relevant information to
3230 explicitly authorized personnel (e.g., security administrators). Lastly, automated test mechanism
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
3231 implementing access enforcement policies are widely deployed.
3232 For these reasons, access enforcement requires security assurance which is constrai ned by the
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
3233 need to ensure IACS operational availability, comply with the need to ensure public and
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
3234 environmental safety, guard against total system failure and to guard against the possibility of loss
3235 of life. Based on the installed operational concept, th e asset owners senior management states
3251 An example of mapping this methodology to the IACS security requirements for Figure C -1 is
3252 described in this clause. For the purpose of this example, the design security assurance levels
3253 S_system^design are based on selected (build-to) security architecture.
3256 Requirement: The IACS shall provide the capability to enforce assigned authorizations for
3257 controlling access to the system in accordance with applicable policy.
3258 Rationale/Supplemental Guidance: Access control policies (e.g., identity-based policies, role-
3259 based policies, rule-based policies) and associated access enforcement mechanisms (e.g., access
3260 control lists, access control matrices, cryptography) are employed by organizations to control
3261 access between users (or processes acting on behalf of users) and objects (e.g., devices, files,
3262 records, processes, programs, domains) in the IACS. In addition to controlling access at the system
3263 level, access enforcement mechanisms are employed at the application level, when necessary, to
3264 provide increased information security for the organization. Consideration is given to the
3265 implementation of a controlled, audited and manual override of automated mechanisms in event of
3266 emergencies or other serious events. The organization ensures that access enforcement
3267 mechanisms do not adversely impact the operation performance of the IACS.
ISA99, WG03 111 ISA-624431-1, D6E2, September 2016
3268 Requirement Enhancement (RE-1): The IACS shall provide the capability to restrict access to
3269 privileged functions (deployed in hardware, software, and firmware) and security -relevant
3270 information to explicitly authorized personnel.
3276
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
Requirement Enhancement (RE-2): The IACS shall provide the capability for dual authorization,
3277 based on approved organization procedures, to privileged functions that have impacts on facility,
3278 human, and environmental safety.
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
3279
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
RE-2 Security Strength 0: No explicit security strength is mandated.
3280 RE-2 Security Strength 1: Organization with functional responsibility shall sign -off (approval) on
3282 RE-2 Security Strength 2: Senior management with oversight responsibility of the functional
3283 organization responsible shall sign-off (approval) on access privileges.
3284 Enhancement Rationale/Supplemental Guidance: The organization does not employ dual-
3285 approved mechanisms when an immediate response is necessary to ensure human and
3286 environmental safety.
3310 For these reasons, access enforcement requires secur ity assurance which is constrained by the
3311 need to ensure IACS operational availability, comply with the need to ensure public and
ISA-62443-1-1, D6E2, September 2016 112 ISA99, WG03
3312 environmental safety, guard against total system failure and to guard against the possibility of loss
3313 of life. Based on the installed security architecture, the asset owner now states for the example,
3314 the following achieved system target security levels ( ) which are subject to verification:
3315 = 1: IACS security functions are not mission critical and are not the target of
3316 adversarial threats.
3317 = 2: IACS security functions are not mission critical, but are the target of
3318 adversarial threats.
3319 = 3: IACS security functions are mission critical, are the target of adversarial
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
3320 threats, do not require immediate response, but disruption could result in significant
3321 performance and financial impact resulting from the total failure of IACS operating
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
3322 capability.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
3323 = 4: IACS functions are mission critical, are the target of adversarial threats, but
3324 require immediate response to ensure public and environmental safety resulting from
3338 In retrospect, the Asset Owners senior management could have stated that their goal was to design
3339 and install a security architecture that could be rated (t 0 ) = 4. Then, when the design was
3340 complete, by analysis the system integrator could state that the build -to system security assurance
3341 is (t 0 ) = 4. As a cross check the system integrator could sum the contribution of each zone
3342 and conduit security assurance using the calculation procedure specified in ISA -99.03.02.
3351
ISA99, WG03 113 ISA-624431-1, D6E2, September 2016
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
3360 A life cycle may begin with a crypto-period for the keys which describes the life stages (key states)
3361 from creation to revocation and disposal. IACS operations run 24/7 which depends on continuous
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
3362 availability of critical communication resources. For this reason, special attention needs to be given
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
3363 to the requirements for timely disposition of keys described by the system triggers shown in Figure
3364 1.
3366
3367 Figure D-1 Key management life cycle
3371 effective if something (usually the key but could be an encryption algorithm) is secret. How to
3372 maintain the secret across widely geographically dispersed IACS operational entities and unknown
3373 entities becomes the challenge for a key management design. So, generating a key for which that
3374 key may have a wide breath of use or a very narrow use leads to defining an effective distribution
3375 channel. The channel can be a physical channel such as a courier or equivalent, the channel can
3376 be an electronic channel such as the Internet which should not be trusted. The means used to
3377 distribute the keys is largely determined by the timeliness requirements imposed by critical IACS
3378 operations that require high security.
3379 Except in simple IACS operations where key components remain fixed for all time, crypto -periods
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
3380 are needed for keys, and these keys need to be updated periodically. The time frame for a key to
3381 be used varies. The crypto-period of a key is the time period during which the key is valid for use
3382 by legitimate human and non-human entities. Crypto-periods serve to:
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
3383 Limit the information (related to a specific key) available for cryptanalysis;
3384 Limit exposure in the case of compromise of a single key;
3394
3397
3396
3395
ISA99, WG03
115
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA-62443-1-1, D6E2, September 2016 116 ISA99, WG03
3398 Developing and promulgating technically sound consensus standards and recommended practices
3399 is one of ISA's primary goals. To achieve this goal, the Standards and Practices Department relies
3400 on the technical expertise and efforts of volunteer committee members, chairmen, and reviewers.
3401 ISA is an American National Standards Institute (ANSI) accredited organization. ISA administers
3402 United States Technical Advisory Groups (USTAGs) and provides secretariat support for
3403 International Electrotechnical Commission (IEC) and International Organization for Standardization
3404 (ISO) committees that develop process measurement and contr ol standards. To obtain additional
3405 information on the Society's standards program, please write:
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
3406
3407 ISA
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
3408 Attn: Standards Department
3409 67 Alexander Drive
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
3410 P.O. Box 12277
3411 Research Triangle Park, NC 27709
3414