Isagca Quick Start Guide Final

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

GLOBAL

CYBERSECURITY
ALLIANCE

Quick Start Guide: An Overview of ISA/IEC 62443 Standards


Security of Industrial Automation
and Control Systems
THE TIME IS NOW

June 2020

www.isa.org/ISAGCA
WWW.ISA.ORG/ISAGCA 1
Quick Start Guide:
An Overview of ISA/IEC 62443 Standards
Security of Industrial Automation
and Control Systems
Executive Summary skills, and motivation of cyberattackers have
significantly increased. The combination of
This document is intended to provide the reader these trends has made IACS more vulnerable to
with a detailed overview of the ISA/IEC 62443 cyberattack. Figure 1 shows some of the notable
Series of standards and technical reports. The cyberattacks that have impacted IACS.
ISA/IEC 62443 Series addresses the Security of
Industrial Automation and Control Systems (IACS) Initially, the ISA99 committee considered IT
throughout their lifecycle. These standards and standards and practices for use in the IACS.
technical reports were initially developed for the However, it was soon found that this was not
industrial process sector but have since been sufficient to ensure the safety, integrity, reliability,
applied to building automation, medical devices, and security of an IACS. This is because the
and transportation sectors. consequences of a successful cyberattack on
an IACS are fundamentally different. While
There are several trends that have made the primary consequences of a successful
cybersecurity an essential property of IACS, along cyberattack on IT systems is financial and
with safety, integrity, and reliability. First, over privacy loss due to information disclosure, the
the last two decades, IACS technologies have consequences for an IACS may additionally
migrated from vendor-proprietary to commercial include loss of life or health, damage to the
off-the-shelf technologies such as Microsoft environment, or loss of product integrity.
Windows™ and TCP/IP networking. Second, the There are several other differences between IT
value of data residing in the IACS for the business and IACS such as performance requirements,
has significantly increased the interconnectivity availability requirements, change management,
of IACS both internal and external to the the time between maintenance windows, and
organization. Finally, the means, resources, equipment lifetime. [1]

Date Target Method


The International Society of Automation (ISA) and
2000 Australian Sewage Plant Insider the International Electrotechnical Commission
2010 Iran Uranium Enrichment Stuxnet (IEC) have joined forces to address the need to
2013 ICS Supply Chain attack Havex improve the cybersecurity of IACS. The ISA99
2014 German Steel Mill Committee and the IEC Technical Committee 65/
2015 Ukraine Power Grid BlackEnergy, KillDisk Working Group 10 develop and publish the ISA/
IEC 62443 Series. These documents describe a
2016 Ukraine Substation CrashOverride
methodical engineered approach to addressing
2017 Global shipping company NotPetya
the cybersecurity of IACS. They can be purchased
2017 IoT DDos attack BrickerBot from either organization; the technical content is
2017 Health care, Automotive, WannaCry identical. The benefits of using a standards-based
many others approach include reducing the likelihood of a
2017 Saudi Arabia Petrochemical TRITON/TRISIS successful cyberattack, the use of a common set
2019 Norwegian Aluminum Company LockerGaga of requirements among stakeholders, security
Source: www.awa.csis.org/programs/technology-policy-program/significant-cyber-incidents
throughout the lifecycle, and a reduction in overall
lifecycle cost.
Table 1: Some notable cyberattacks impacting IACS

2 WWW.ISA.ORG/ISAGCA
Table of Contents
Executive Summary......................................................... 2

Table of Contents............................................................. 3

Introduction...................................................................... 3
Scope and Purpose.......................................................................... 3
Introduction ISA/IEC 62443 Series Standards Development
Organizations.................................................................................... 4
This document provides an overview of the ISA/IEC
Summary of ISA/IEC 62443 Series Standards and
62443 Series of standards and technical reports
Technical Reports......................................................................................4
(referred to as the ISA/IEC 62443 Series) which
specifies requirements for the Security of Industrial
Fundamental Concepts.................................................... 6
Automation and Control Systems (IACS). The goal
Security Program.............................................................................. 6
of the ISA/IEC 62443 Series is to improve the
Risk Management............................................................................. 7
safety, reliability, integrity, and security of Industrial
Automation and Control Systems (IACS) using a risk- Risk Assessment.......................................................................... 7
based, methodical, and complete process throughout Zones and Conduits................................................................... 7
the entire lifecycle. The ISA/IEC 62443 Series Cybersecurity Requirements Specification............................. 7
describes a set of common terms and requirements Threat Modeling.......................................................................... 8
that can be used by asset owners, product suppliers, Foundational Requirements........................................................... 8
and service providers to secure their Control Systems Security Levels................................................................................... 8
and the Equipment Under Control. Maturity Model.................................................................................. 9
Design Principles............................................................................... 9
Scope and Purpose Secure by Design........................................................................ 9
The scope of the ISA/IEC 62443 Series is the Security Reduce Attack Surface............................................................... 9
of Industrial Automation and Control Systems (IACS).
Defense in Depth........................................................................ 9
An IACS is defined as a:
Essential Functions..................................................................... 9
collection of personnel, hardware, software,
and policies involved in the operation of Roadmap for the ISA/IEC 62443 Series......................... 10
the industrial process and that can affect Principal Roles................................................................................. 10
or influence its safe, secure, and reliable Component, System, Automation Solution, and IACS.............. 10
operation. Hierarchical View............................................................................ 11
Lifecycle View................................................................................... 11
Note that an IACS includes more than
ISA/IEC 62443 Series for Asset Owners...................................... 12
the technology that comprises a
ISA/IEC 62443 Series for Product Suppliers.............................. 12
control system; it also includes the
people and work processes needed ISA/IEC 62443 Series for Service Providers................................ 12
to ensure the safety, integrity, Integration Service Providers................................................. 12
reliability, and security of the Maintenance Service Providers.............................................. 12
control system. Without people
Certification and Training............................................. 13
who are sufficiently trained,
ISASecure® Certification................................................................. 13
risk-appropriate technologies Security
and countermeasures, IECEE Certification.......................................................................... 13
and work processes ISA Cybersecurity Training............................................................ 13
throughout the security ISA Cybersecurity Certificates....................................................... 14
lifecycle, an IACS could Figure 1: Published Standards and Technical Reports............... 14
be more vulnerable to The Security Triad
cyberattack. References...................................................................... 14

WWW.ISA.ORG/ISAGCA 3
Because IACS are physical-cyber systems, the • International Society of Automation – ISA99
impact of a cyberattack could be severe. The Committee
consequences of a cyberattack on an IACS • International Electrotechnical Commission –
include, but are not limited to: IEC TC65/WG10 Committee
• Endangerment of public or employee safety or
health There is a formal liaison agreement between
• Damage to the environment these two standards development organizations.
• Damage to the Equipment Under Control The ISA/IEC 62443 Series of standards and
• Loss of product integrity technical reports are developed primarily by
• Loss of public confidence or company the ISA99 Committee with input, review and
reputation simultaneous adoption by both the ISA and IEC.
• Violation of legal or regulatory requirements The one exception is ISA/IEC 62443-2-4, which
• Loss of proprietary or confidential information was developed by the IEC TC65/WG10 Committee
• Financial loss and adopted by ISA. As a result, whether an
• Impact on entity, local, state, or national security ISA/IEC 62443 document is published by ISA or
IEC, the content is identical except for the non-
The first four consequences in the above list normative preface and foreword.
are unique to physical-cyber systems and are
not typically present in traditional IT systems. The United Nations Economic Commission for
Indeed, it is this difference that fundamentally Europe (UNECE) confirmed at its annual meeting
results in the need for different approaches to in late 2018 that it will integrate the widely used
securing physical-cyber systems and caused ISA/IEC 62443 Series into its forthcoming Common
standards development organizations to identify Regulatory Framework on Cybersecurity (CRF). The
the need for standards that are unique to IACS. CRF will serve as an official UN policy position
Some other characteristics of IACS that are not statement for Europe, establishing a common
typical in IT systems include: [1] legislative basis for cybersecurity practices within
• more predictable failure modes the European Union trade markets. [2]
• tighter time-criticality and determinism
• higher availability Refer to the Published Standards and Technical
• more rigorous management of change Reports section at the end of this document for
• longer time periods between maintenance a complete list of ISA and IEC cybersecurity-
• significantly longer component lifetimes related documents currently available.
• Safety, Integrity, Availability, and
Confidentiality (SIAC) instead of CIA Summary of ISA/IEC 62443 Series Standards
and Technical Reports
Cyber threat actors include but are not limited These documents are arranged in four groups,
to insiders (accidental or intentional), hacktivists, corresponding to the primary focus and
cybercriminals, organized crime, and state- intended audience. [4]
sponsored attackers. Types of cyberattacks 1. General—This group includes documents
include but are not limited to ransomware, that address topics that are common to the
destructive malware, directed remote access entire series.
attacks, and coordinated attacks on control • Part 1-1: Terminology, concepts, and
systems and associated support infrastructure. models introduces the concepts and
Table 1 lists several noteworthy directed and models used throughout the series.
non-directed cyberattacks impacting IACS.  The intended audience includes anyone
wishing to become familiar with the
ISA/IEC 62443 Series Standards fundamental concepts that form the
Development Organizations basis for the series.
There are two standards development • Part 1-2: Master glossary of terms
organizations involved in the development of the and definitions is a list of terms and
ISA/IEC 62443 Series of standards and technical abbreviations used throughout the
reports: series.

4 WWW.ISA.ORG/ISAGCA
• Part 1-3: System security conformance • Part 2-3: Patch management in the IACS
metrics describes a methodology to environment provides guidance on patch
develop quantitative metrics derived from management for IACS. The intended audience
the process and technical requirements includes anyone who has responsibility
in the standards. for the design and implementation of a
• Part 1-4: IACS security lifecycle and patch management program.
use cases provides a more detailed • Part 2-4: Security program requirements
description of the underlying lifecycle for for IACS service providers specifies
IACS security, as well as several use cases requirements for IACS service providers
that illustrate various applications. such as system integrators or maintenance
providers. This standard was developed by
2. Policies and Procedures—Documents IEC TC65/WG10.
in this group focus on the policies and • Part 2-5: Implementation guidance for
procedures associated with IACS security. IACS asset owners provides guidance on
• Part 2-1: Establishing an IACS security what is required to operate an effective
program describes what is required to IACS cybersecurity program. The intended
define and implement an effective IACS audience includes asset owners who have
cybersecurity management system. responsibility for the operation of such a
The intended audience includes asset program.
owners who have responsibility for the
design and implementation of such a 3. System Requirements—The documents in
program. the third group address requirements at the
• Part 2-2: IACS security program ratings system level.
provides a methodology for evaluating • Part 3-1: Security technologies for
the level of protection provided by an IACS describes the application of
operational IACS against the requirements various security technologies to an IACS
in the ISA/IEC 62443 Series of standards. environment. The intended audience

ISA/IEC 62443 Family of Standards

Figure 2: The ISA/IEC 62443 Series

WWW.ISA.ORG/ISAGCA 5
includes anyone who wishes to learn • Part 4-2: Technical security
more about the applicability of specific requirement for IACS components
technologies in a control systems describes the requirements for IACS
environment. Components based on security level.
• Part 3-2: Security risk assessment for Components include Embedded Devices,
system design addresses cybersecurity Host Devices, Network Devices, and
risk assessment and system design for Software Applications. The principal
IACS. The output of this standard is a audience include suppliers of Component
Zone and Conduit model and associated products that are used in control
Risk Assessments and Target Security systems.
Levels. These are documented in the
Cybersecurity Requirements Specification. Table 2 shows the complete list of ISA/IEC 62443
This standard is primarily directed at asset standards and technical reports. The Part can be
owners and system integrators. derived from the document number, for example
• Part 3-3: System security requirements ISA/IEC 62443-2-1 is referred to as Part 2-1 in this
and security levels describes the document.
requirements for an IACS system based
on security level. The principal audience The document types are:
include suppliers of control systems, • IS – International Standard
system integrators, and asset owners. • TR – Technical Report
• TS – Technical Specification
4. Component Requirements—The fourth
and final group includes documents that Finally, the publication date is shown for each
provide information about the more specific document as of the publication date of this
and detailed requirements associated with document. ISA/IEC standards are on a five-
the development of IACS products. year update cycle, so many of the published
• Part 4-1: Product security documents are currently in revision.
development life cycle requirements
describes the requirements for a product
developer’s security development Fundamental Concepts
lifecycle. The principal audience include
suppliers of Control System and Security Program
Component products. Part 2-1 specifies Asset Owner Security Program
requirements for the IACS. A Security Program
Part Type Title Date consists of the implementation and maintenance
1-1 TS Terminology, Concepts, and Models 2007
of personnel, policy & procedural, and
technology-based capabilities that reduce the
1-2 TR Master glossary of terms and abbreviations
cybersecurity risk of an IACS.
Overview

1-3 System cybersecurity conformance metrics


1-4 IACS security lifecycle and use cases
In the context of Part 2-1, the Asset Owner is
2-1 IS Establishing an IACS security program 2009 also the Operator of the IACS and the Equipment
Policies & Procedures

2-2 IACS security program ratings Under Control. The Security Program covers the
2-3 TR Patch management in the IACS environment 2015 entire lifecycle of the IACS. Because the lifetime of
2-4 IS Security program requirements for IACS service 2018 an IACS can be longer than the product supplier
providers support timeframe, the standard recognizes
2-5 TR Implementation guidance for IACS asset owners that not all requirements can be met by legacy
3-1 TR Security technologies for IACS systems, so compensating countermeasures may
Systems

3-2 IS Security risk assessment for system design 2020 be needed to secure the IACS.
3-3 IS System security requirements and security levels 2013
Although the Asset Owner is ultimately
4-1 IS Product security development life-cycle requirements 2018
Component

accountable for the secure operation of the


4-2 IS Technical security requirements for IACS components 2019
IACS, implementation of security capabilities
requires the support of product suppliers and
Table 2: ISA/IEC 62443 Series Status

6 WWW.ISA.ORG/ISAGCA
service providers. The Asset Owner must include Partitioning the System Under Consideration into
requirements for security throughout the supply Zones and Conduits can also reduce overall risk
chain to meet the overall Security Program by limiting the scope of a successful cyber-attack.
requirements. Part 3-2 requires or recommends that some
assets are partitioned as follows:
The Security Program for the IACS must be • Shall separate business and control system assets
coordinated with the overall Information Security • Shall separate safety related assets
Management System (ISMS) of the organization. • Should separate temporarily connected devices
The ISMS sets the overall security governance • Should separate wireless devices
and policies for the organization. However, • Should separate devices connected via
as mentioned above, the IACS is significantly external networks
different from IT systems, so there are additional
requirements and considerations for its Security Cybersecurity Requirements Specification
Program. Part 3-2 also requires that required security
countermeasures from the Risk Assessment as
Risk Management
Risk Assessment
Part 3-2 describes the requirements Start
for addressing the cybersecurity risks
in an IACS, including the use of Zones Initial system architecture Updated system architecture
diagrams and inventory,
and Conduits, and Security Levels. While company policies,
ZCR 1 – Identify the diagrams and inventory with
System Under IACS external services and
Part 3-2 includes the requirements for regulations, tolerable risk Consideration support identified
guidelines, etc. (SUC)
the risk assessment process, it does
not specify the exact methodology to
be used. The methodology used must Existing PHAs and other
ZCR 2 – Perform an
be established by the Asset Owner and relevant risk assessment and
initial cybersecurity risk
Initial evaluation of risk
corporate risk matrix
should be consistent with the overall assessment
risk assessment methodology of the
organization. Examples using the risk Standards and best practices,
matrix methodology are included as policies, supplier guidelines,
criticality assessments, data ZCR 3 – Partition the SUC Initial or revised zone
informative content. Figure 3 shows the flows, functional into zones and conduits and conduit diagram
specifications, etc.
risk assessment process.

Zones and Conduits


A Zone is defined as a grouping of logical ZCR 4 – Initial
No
or physical assets based upon risk or other risk exceeds
tolerable risk?
criteria such as criticality of assets, operational
function, physical or logical location, required
access, or responsible organization. Yes

Residual cybersecurity risk


ZCR 5 – Perform a and SL-Ts for each zone
A Conduit is defined as a logical grouping of detailed cybersecurity and conduit
risk assessment
communication channels that share common
security requirements connecting two or more zones.

A key step in the Risk Assessment


Company policies, Cybersecurity
process is to partition the System Under regulations, tolerable risk ZCR 4 – Document requirement
cybersecurity requirements,
Consideration into separate Zones and guidelines, etc.
assumptions, and
specification (CRS)
Conduits. The intent is to identify those constraints
assets which share common security
characteristics in order to establish a set of
ZCR 7 – Asset owner approval
common security requirements that reduce
cybersecurity risk.
Figure 3: Risk Assessment Process
www.isa.org/ISAGCA WWW.ISA.ORG/ISAGCA 7
well as security requirements based on company Foundational Requirements are used to organize
or facility-specific policies, standards, and relevant the requirements for IACS Systems (Part 3-3) and
regulations are documented in a Cybersecurity Components (Part 4-2).
Requirements Specification (CRS). The CRS does
not have to be a standalone document; it can The combination of FR 1 and FR 2 is sometimes
be included as a section in other relevant IACS called Access Control; they were split into two FRs
documents. to keep the total number of requirements at a
manageable level.
The CRS includes information such a description
of the System Under Consideration, Zone and Security Levels
Conduit drawings, threat environment, and Security Level is defined as the measure of
countermeasures from risk assessments. confidence that the System Under Consideration,
Zone, or Conduit is free from vulnerabilities and
Threat Modeling functions in the intended manner.
Part 4-1 describes the requirements for the
security development lifecycle (SDL) of Control Part 3-3 further defines the Security Level
System and Component products. One of the in terms of the means, resources, skills, and
key processes in the product SDL is threat motivation of the threat actor, as shown in Table
modeling which is a systematic process to identify 3. It is used as a means to discriminate between
data flows, trust boundaries, attack vectors, requirement enhancements for systems (Part
and potential threats to the control system. 3-3) and Components (Part 4-2).
The security issues identified in the threat
model must be addressed in the final release There are three types of Security Levels that are
of the product and the threat model itself must used throughout the ISA/IEC 62443 Series:
be periodically updated during the product’s • Capability Security Levels (SL-C) are the
lifecycle. security levels that systems (Part 3-3) or
Components (Part 4-2) can provide when
Foundational Requirements properly integrated and configured. These
Foundational Requirements (FRs) form the basis levels state that a particular system or
for technical requirements throughout the Component is capable of meeting the SL-T
ISA/IEC 62443 Series. All aspects associated with natively without additional compensating
meeting a desired IACS security level (people, countermeasures.
processes, and technology) are derived through • Target Security Levels (SL-T) are the desired
meeting the requirements associated with the level of security for a particular Automation
seven following Foundational Requirements: Solution. They are determined as the result
• FR 1 – Identification and Authentication of the Risk Assessment process (Part 3-2)
Control (IAC) and are documented in the Cybersecurity
• FR 2 – Use Control (UC) Requirements Specification. SL-T are used
• FR 3 – System Integrity (SI) to select products and design additional
• FR 4 – Data Confidentiality (DC) countermeasures during the Integration
• FR 5 – Restricted Data Flow (RDF) phase of the IACS lifecycle.
• FR 6 – Timely Response to Events (TRE) • Achieved Security Levels (SL-A) are the actual
• FR 7 – Resource Availability (RA) levels of security for a particular Automation

Security Level Definition Means Resources Skills Motivation

1 Protection against casual or coincidental violation


2 Protection against intentional violation using simple means with low simple low generic low
resources, generic skills, and low motivation
3 Protection against intentional violation using sophisticated means with sophisticated moderate IACS-specific moderate
moderate resources, IACS-specific skills, and moderate motivation
4 Protection against intentional violation using sophisticated means with sophisticated extended IACS-specific high
extended resources, IACS-specific skills, and high motivation

Table 3: Security Level Definition

8 WWW.ISA.ORG/ISAGCA
Solution. These are measured after the difficult for an attack to succeed. Reducing attack
Automation Solution is commissioned and surface includes design principles such as:
in operation. Part 2-2 combines SL-A with • Access control—restricting physical and logical
operational and maintenance policies and access to IACS systems and networks
procedures to form the Security Program • Network segmentation—segmenting IACS
Rating for a particular Automation Solution. networks and controlling the traffic between them
• Least function—hardening IACS systems and
Maturity Model networks by removing unneeded functions
While Security Levels are a measure of the • Least privilege—limiting privileges to the
strength of technical requirements, Maturity minimum necessary for the role or function
Levels are a measure of processes (people,
policies, and procedures). Parts 2-1, 2-2, 2-4, Defense in Depth
and 4-1 use Maturity Levels to measure how Defense in depth is defined as the provision of
thoroughly requirements are met. multiple security protections, especially in layers,
with the intent to delay or prevent an attack. Defense
As shown in Table 4, the Maturity Model is based on in depth implies layers of security and detection,
the Capability Maturity Model Integration (CMMI), even on single systems, and requires attackers to
with Levels 4&5 combined into Level 4. break through or bypass multiple layers without
being detected. The IACS is still protected even if a
Design Principles vulnerability in one layer is compromised. Special
Secure by Design attention must be paid to a single vulnerability that
Secure by design is a design principle where security allows the potential compromise of multiple layers.
measures are implemented early in the lifecyle of
the IACS. The intent is that robust security policies, Essential Functions
security architectures, and secure practices are Essential functions are defined as functions or
established early in development and implemented capabilities that are required to maintain health,
throughout the lifecycle. This design principle applies safety, the environment, and availability of the
to both product development and Automation Equipment Under Control. Essential functions include:
Solution development. When using a secure by • the Safety Instrumented Function (SIF)
design philosophy, security measures operate • the control function
natively within the Control System or Component • the ability of the operator to view and
without requiring the addition of compensating manipulate the Equipment Under Control
countermeasures.
The loss of essential functions is commonly termed:
Reduce Attack Surface loss of protection, loss of control, and loss of view
Reducing the attack surface is a design principle respectively. In some use cases additional functions
where the physical and functional interfaces of such as history may be considered essential.
an IACS that can be accessed and exposed to Part 3-3 requires that security measures shall not
potential attack are minimized, making it more adversely affect essential functions of a high-

Level CMMI 62443 Description

1 Initial Initial • Product development typically ad-hoc and often undocumented


• Consistency and repeatability may not be possible
2 Managed Managed • Product development managed using written policies
• Personnel have expertise and are trained to follow procedures
• Processes are defined but some may not be in practice
3 Defined Defined (Practiced) • All processes are repeatable across the organization
• All processes are in practice with documented evidence
4 Quantitively Managed Improving • CMMI Levels 4 and 5 are combined
• Process metrics are used control effectiveness and performance
5 Optimizing • Continuous improvement

Table 4: Maturity Level Definition

WWW.ISA.ORG/ISAGCA 9
availability IACS unless it is supported by a Risk support activities for an Automation Solution.
Assessment. The concept of essential functions • Integration Service Provider is the
places some design constraints on the design of organization that provides integration
IACS security measures: activities for an Automation Solution
• Access control shall not prevent the including design, installation, configuration,
operation of essential functions testing, commissioning, and handover to
• Essential functions shall be maintained if the the Asset Owner. The Integration Service
Zone boundary protection (firewall) goes into Provider may also facilitate and assist in
a fail close/island mode the activity to partition the System Under
• A denial of service event on the Control Consideration into Zones and Conduits and
System or Safety Instrumented System perform the Risk Assessment.
network shall not prevent safety • Product Supplier is the organization that
instrumented functions from acting manufactures and supports a hardware and/
or software product. Products may include
Control Systems, Embedded Devices, Host
Roadmap for the ISA/IEC 62443 Devices, Network Devices, and/or Software
Series Applications.
Principal Roles
Component, System, Automation Solution,
To understand how to use the ISA/IEC 62443
and IACS
Series it is first necessary to understand the
The right-hand side of the figure shows the
relationship between Roles, Control System,
types of systems that are identified in the ISA/IEC
Automation Solution, and IACS. Figure 4 visualizes
62443 Series:
this relationship.
• IACS Components are provided by a Product
Supplier and include the following types:
The left-hand side of the figure shows the roles
• Embedded device – special purpose device
that are identified in the ISA/IEC 62443 Series:
designed to directly monitor or control an
• Asset Owner is the organization that is
industrial process
accountable and responsible for the IACS.
• Host device – general purpose device running
The Asset Owner is also the operator of the
an operating system capable of hosting one
IACS and the Equipment Under Control.
or more software applications, data stores or
• Maintenance Service Provider isSafetythe
functions functions from one or more suppliers
individual or organization that provides
• Network device – device that facilitates data
flow between devices, or restricts the data
Roles Industrial automation and control system (IACS) flow, but may not directly interact with a
accountable for
control process
Asset Owner Operation and routine maintenance according
operates to security policies and procedures • Software application – one or more soft-
ware programs and their dependencies
Maintenance
Service Provider
maintains Automation Solution that are used to interface with the process
commissions
Essential Functions or the control system itself
and validates
Integration
Service Provider
Control
functions
Safety
functions
Complementary
functions • IACS System (or Control System) consists of
designs and
deploys an integrated set of Embedded Devices (e.g.
IACS environment PLC), Host Devices, Network Devices, and
Includes configured products
(control systems and components)
Software Applications provided by one or
more Product Suppliers.
Role Products
• Automation Solution is the realization of
Components Control systems
Supporting
(as a combination of
components)
a Control System at a particular facility. It
Product Embedded
Supplier
develops
and supports
software
applications devices
Zone Zone
includes essential functions such as safety
Network Hosted
functions and control functions and other
devices devices
supporting functions such as historization
Independent of IACS environment and engineering.
• The Industrial Automation and Control
Figure 4: Roles, Products, Automation Solution, and IACS System (IACS) includes the Automation

10 WWW.ISA.ORG/ISAGCA
Solution and the operational and Part 2-3
maintenance policies and procedures Patch management in
the IACS environment
necessary to support it. Legend
Derived Requirements
Direct References
Hierarchical View All Parts shall reference Part 1-1 Part 2-4
Security program
Figure 5 shows the hierarchical relationships requirements for IACS
service providers
among the ISA/IEC 62443 Series of standards.
A hierarchical relationship means that one
Part 1-1 Part 2-1 Part 3-2 Part 2-2
standard derives its requirements from Terminology, concepts Establishing an IACS Security risk IACS security program
and models security program assessment for ratings
the requirements in another standard. The system design

arrowhead shows the direction of derivation.


• Part 1-1 introduces the concepts and Part 3-3 Part 4-2
models that are used throughout the
System security Technical security
requirements and requirements for IACS
security levels components
ISA/IEC 62443 Series. In particular, it
describes the Foundational Requirements,
Part 4-1
which are used to organize technical Product security

requirements throughout the series. development life-cycle


requirements

• Part 2-1 sets the requirements for the


Security Program of an Asset Owner. All
of the other standards in the ISA/IEC 62443 Figure 5: ISA/IEC 62443 Standards – Hierarchical View
Series derive their requirements from Part
2-1 and expand upon them in more detail. • Part 2-4 sets the requirements for Service
• Part 3-2 sets the requirements for Providers that are involved in support of the
the partitioning of the System Under IACS. Integration Service Providers provide
Consideration into Zones and Conduits and integration services for the Automation
their Risk Assessment. The risk assessment Solution, and Maintenance Service Providers
defines the Target Security Level (SL-T), which provide maintenance services for the IACS.
is used to procure Systems and Components • Part 2-3 sets the requirements for the
that have the capabilities defined in Part patch management process, which is used
3-3, and Part 4-2 respectively. Part 3-2 also to reduce cybersecurity vulnerabilities in the
requires a Cybersecurity Requirements Automation Solution.
Specification, which is used to create the
Automation Solution. Lifecycle View
• Part 4-1 is used by the Product Supplier to Another view of the ISA/IEC 62443 Series is
establish and sustain a Security Development the lifecycle view. There are two independent
Lifecycle, which is used to create Control lifecycles described in the series: the Product
System and Component products. Development Lifecycle and the Automation

Automation Solution Lifecycle


Product Development Lifecycle
Integration Operation and Maintenance

Part 1-1: Terminology, Concepts, and Models


Part 2-1: Establishing an IACS Security Program
Part 2-2: IACS Security Program Rating
Part 2-3: Patch Management in the IACS Environment
Part 2-4: Security program requirements for IACS service providers
Part 3-2: Security Risk Assessment for System Design
Part 3-3: System security requirements and Security levels
Part 4-1: Product Security Development Lifecycle
Requirements
Part 4-2: Technical security requirements
for IACs components

Figure 6: ISA/IEC 62443 Standards - Lifecycle View


WWW.ISA.ORG/ISAGCA 11
Solution Lifecycle. The Automation Solution Security Level capabilities
Lifecycle is further divided into an Integration • Provide ongoing lifecycle support for their
Phase and an Operation and Maintenance Control System and Component products
Phase. Table 6 shows the relationship between
the Parts of the ISA/IEC 62443 Series and the Applicable ISA/IEC 62443 standards:
various lifecycles and phases. • ISA/IEC 62443-4-1, Product security
development lifecycle requirements
Note that Part 3-3 spans the Product • ISA/IEC 62443-3-3, System security
Development Lifecycle and the Integration requirements and security levels
Phase of the Automation Solution Lifecycle. • ISA/IEC 62443-4-2, Technical security
This is because while the Product Supplier requirements for IACS Components
is the main audience for Part 3-3, the • ISA/IEC 62443-3-2, Security risk assessment
Integration Service Provider may also combine for system design
Components to create Control Systems. An
example would be a SCADA system, where ISA/IEC 62443 Series for Service Providers
the Integration Service Provider integrates the Integration Service Providers
SCADA system with Embedded Devices (e.g., Integration Service Provider activities:
PLC) to create an Automation Solution. • Establish and sustain a Security Program
for Automation Solution integration
ISA/IEC 62443 Series for Asset Owners • Design and implement Automation
Asset Owner activities: Solutions that meet the requirements in the
• Establish and sustain a Security Program Cybersecurity Requirements Specification
that includes IACS-specific requirements • Apply security patches during the
• Partition Zones and Conduits and perform Integration Phase of the Automation
associated Risk Assessments Solution lifecycle
• Document IACS requirements in the
Cybersecurity Requirements Specification Applicable ISA/IEC 62443 standards:
• Procure products and services that meet • ISA/IEC 62443-2-1, Establishing an IACS
IACS requirements security program
• Operate and maintain the IACS • ISA/IEC 62443-2-3, Patch management in
• Assess the effectiveness of the IACS the IACS environment
Security Program • ISA/IEC 62443-2-4, Requirements for IACS
service providers
Applicable ISA/IEC 62443 standards: • ISA/IEC 62443-3-2, Security risk assessment
• ISA/IEC 62443-2-1, Establishing an IACS for system design
security program • ISA/IEC 62443-3-3, System security
• ISA/IEC 62443-2-2, Security Program ratings requirements and security levels
• ISA/IEC 62443-2-3, Patch management in
the IACS environment Maintenance Service Providers
• ISA/IEC 62443-2-4, Requirements for IACS Maintenance Service Provider activities:
service providers • Establish and sustain a Security Program
• ISA/IEC 62443-3-2, Security risk assessment for maintenance services
for system design • Provide services and capabilities that meet
• ISA/IEC 62443-3-3, System security the IACS security policies and procedures
requirements and security levels specified by the Asset Owner

ISA/IEC 62443 Series for Product Suppliers Applicable ISA/IEC 62443 standards:
Product Supplier activities: • ISA/IEC 62443-2-3, Patch management in
• Establish and sustain a Security the IACS environment
Development Lifecycle • ISA/IEC 62443-2-2, IACS Security Program
• Provide Control System products that ratings
meet Security Level capabilities • ISA/IEC 62443-2-4, Requirements for IACS
• Provide Component products that meet service providers

12 WWW.ISA.ORG/ISAGCA
Certification and Training • Cybersecurity awareness training for Water/
Wastewater Industry Professionals (IC31)
ISASecure® Certification • Using the ISA/IEC 62443 Standards to Secure
The ISA Security Compliance Institute is a non- Your Control System (IC32, IC32M)
profit organization that has developed several • Introduction to Industrial Automation Security
product certification programs for Controls and the ISA/IEC 62443 Standards (IC32C)
Systems and Components. Currently available • Cybersecurity for Automation, Control and
ISASecure® certification programs are: SCADA Systems (IC32E)
• Security Development Lifecycle Assurance • Assessing the Cybersecurity of New or
(SDLA) which certifies that the Security Existing IACS Systems (IC33, IC33E, IC33M)
Development Lifecycle of a Product Supplier • IACS Cybersecurity Design and
meets the requirements in Part 4-1. Implementation (IC34, IC34M)
• System Security Assurance (SSA) which certifies • IACS Cybersecurity Operation and
that Control System products have the Maintenance (IC37, IC37M)
capability to meet the requirements in Part • Overview of ISA/IEC 62443 for Product
3-3 and have been developed in accordance Suppliers (IC46C, IC46M)
with an SDLA program.
The last letter of the course code designates the
Certified System type of course as follows:
• <none> - Multi-day classroom course
• C – One-day overview course
• Component Security Assurance (CSA) which • E – Online, instructor-assisted course
certifies that Component products have the • M – On-demand, computer-based training
capability to meet the requirements in Part 4-2
and have been developed in accordance with an ISA Cybersecurity Certificates
SDLA program. Certified Component products ISA offers the following cybersecurity certificates
can be: Embedded Devices, Host Devices, for students who have completed the training
Network Devices, and Software Applications courses listed above. Certificates are not to be
confused with product certifications offered by
Certified Component
ISASecure®.
• ISA/IEC 62443 Cybersecurity Fundamentals
Specialist
ISASecure® certification programs can be found • ISA/IEC 62443 Cybersecurity Risk Assessment
at ISASecure.org. Specialist
• ISA/IEC 62443 Cybersecurity Design Specialist
IECEE Certification • ISA/IEC 62443 Cybersecurity Maintenance
IEC also offers a system of conformity assessment Specialist
schemes called IECEE. IECEE currently offers • ISA/IEC 62443 Cybersecurity Expert
conformance assessment schemes for the
following IEC 62443 standards: ISA/IEC 62443 ISA/IEC 62443 ISA/IEC 62443 ISA/IEC 62443 ISA/IEC 62443

• IEC 62443-2-4:2015/AMD1:2017 FUNDAMENTALS


SPECIALIST
RISK
ASSESSMENT DESIGN MAINTENANCE
SPECIALIST EXPERT
SPECIALIST
• IEC 62443-3-3:2013
SPECIALIST

• IEC 62443-4-1:2018
• IEC 62443-4-2:2019
Certificate 1 Certificate 2 Certificate 3 Certificate 4 Expert
IECEE can be found at IECEE.org.

ISA Cybersecurity Training


The following cybersecurity-related training
courses are offered by ISA:

WWW.ISA.ORG/ISAGCA 13
Published Standards and References
Technical Reports 1. NIST SP 800-82 REVISION 2, GUIDE TO
1. ISA-62443-1-1-2007 / IEC TS 62443-1-1:2009 INDUSTRIAL CONTROL SYSTEMS (ICS)
– SECURITY FOR INDUSTRIAL AUTOMATION AND SECURITY
CONTROL SYSTEMS, PART 1-1: TERMINOLOGY, 2. UNITED NATIONS COMMISSION
CONCEPTS AND MODELS TO INTEGRATE ISA/IEC 62443 INTO
2. ISA-62443-2-1-2009 / IEC 62443-2-1:2010 – CYBERSECURITY REGULATORY FRAMEWORK,
SECURITY FOR INDUSTRIAL AUTOMATION AND ISA INTECH MAGAZINE, JAN-FEB, 2019
CONTROL SYSTEMS, PART 2-1: ESTABLISHING 3. THE 62443 SERIES OF STANDARDS:
AN INDUSTRIAL AUTOMATION AND CONTROL INDUSTRIAL AUTOMATION AND CONTROL
SYSTEMS SECURITY PROGRAM SECURITY, ISA99 COMMITTEE
3. ANSI/ISA-TR62443-2-3-2015 / IEC TR 4. FREQUENTLY ASKED QUESTIONS: THE ISA99
62443-2-3:2015 – SECURITY FOR INDUSTRIAL COMMITTEE AND 62443 STANDARDS, ISA99
AUTOMATION AND CONTROL SYSTEMS, PART 2-3: COMMITTEE
PATCH MANAGEMENT IN THE IACS ENVIRONMENT 5. INSTRUMENTATION AND CONTROL SYSTEMS
4. ANSI/ISA-62443-2-4-2018 / IEC 62443-2- SECURITY EXPLAINED: THE WHAT AND THE
4:2015+AMD1:2017 CSV – SECURITY FOR WHY, ISA99 COMMITTEE
INDUSTRIAL AUTOMATION AND CONTROL
SYSTEMS, PART 2-4: SECURITY PROGRAM
REQUIREMENTS FOR IACS SERVICE PROVIDERS
5. IEC TR 62443-3-1:2009 - SECURITY FOR
INDUSTRIAL AUTOMATION AND CONTROL
SYSTEMS, PART 3-1: SECURITY TECHNOLOGIES
FOR INDUSTRIAL AUTOMATION AND CONTROL
SYSTEMS
6. ISA-62443-3-2-2020 – SECURITY FOR
INDUSTRIAL AUTOMATION AND CONTROL
SYSTEMS, PART 3-2: SECURITY RISK ASSESSMENT This document contains some information
FOR SYSTEM DESIGN that is based on ISA99 Committee draft
7. ANSI/ISA-62443-3-3-2013 / IEC 62443- documents. Please refer to the published
4-2:2013 – SECURITY FOR INDUSTRIAL documents for the definitive set of
AUTOMATION AND CONTROL SYSTEMS, PART 3-3: requirements currently available.
SYSTEM SECURITY REQUIREMENTS AND SECURITY
LEVELS
ANSI/ISA-62443-4-1-2018 / IEC 62443-
4-1:2018 – SECURITY FOR INDUSTRIAL
AUTOMATION AND CONTROL SYSTEMS, PART 4-1:
PRODUCT SECURITY DEVELOPMENT LIFE-CYCLE
REQUIREMENTS
8. ANSI/ISA-62443-4-2-2018 / IEC 62443-
4-2:2019 – SECURITY FOR INDUSTRIAL
AUTOMATION AND CONTROL SYSTEMS, PART 4-2:
TECHNICAL SECURITY REQUIREMENTS FOR IACS
COMPONENTS
9. IEC TR 63069:2019 – INDUSTRIAL-PROCESS
MEASUREMENT, CONTROL AND AUTOMATION
– FRAMEWORK FOR FUNCTIONAL SAFETY AND
SECURITY
10. IEC TR 63074:2019 – SAFETY OF MACHINERY
– SECURITY ASPECTS RELATED TO FUNCTIONAL
SAFETY OF SAFETY-RELATED CONTROL SYSTEMS

14 WWW.ISA.ORG/ISAGCA ©2020 International Society of Automation

You might also like