kupdf.net isa-62443-2-2-wd

THIS COPY OF A FULL OR ABRIDGED ISA PUBLICATION IS TO BE USED SOLELY FOR THE PURPOSES OF
FURTHER DEVELOPMENT OF ISA STANDARDS. IT MAY NOT BE OFFERED FOR FURTHER REPRODUCTION
OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
Copyright © by the International Society of Automaton. All rights reserved. Not for resale. Printed in
the United States of America. No part of this publication may be reproduced, stored in a retrieval
system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording, or
otherwise), without the prior written permission of the Publisher.
ISA
67 Alexander Drive
P. O. Box 12277
Research Triangle Park, North Carolina 27709
USA
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
FOR USE AND REVIEW ONLY BY MEMBERS OF ISA99 AND APPROVED PARTIES:
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This page intentionally left blank
ISA‑62443-2-2, D1E4, April 2013
–3–
ISA99, WG02, TG02
1
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
ISA‑62443-2-2
Security for industrial automation and control systems
Implementation Guidance for and IACS Security Management System
Draft 1, Edit 4
April 2013
Text appearing red italics should be considered editorial comments,
provided as an aid in the preparation of the document. It will be
removed before the draft is completed.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2
ISA
67 Alexander Drive
P. O. Box 12277
Research Triangle Park, NC 27709 USA
–4–
ISA
Security for industrial automation and control systems
<Document Title>
ISBN: -to-be-assigned-
Copyright © 2011 by ISA. All rights reserved. Not for resale. Printed in the United States of
America.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
ISA99, WG02, TG02
21
22
23
–5–
ISA99, WG02, TG02
24
PREFACE
25
26
This preface, as well as all footnotes and annexes, is included for information purposes and is not
part of ISA-62443.02.02.
27
28
29
30
31
32
This document has been prepared as part of the service of ISA, the International Society of
Automation, toward a goal of uniformity in the field of instrumentation. To be of real value, this
document should not be static but should be subject to periodic review. Toward this end, the
Society welcomes all comments and criticisms and asks that they be addressed to the Secretary,
Standards and Practices Board; ISA; 67 Alexander Drive; P. O. Box 122 77; Research Triangle
Park, NC 27709; Telephone (919) 549-8411; Fax (919) 549-8288; E-mail: standards@isa.org.
33
34
35
36
37
38
39
40
41
42
The ISA Standards and Practices Department is aware of the growing need for attention to the
metric system of units in general and the Internatio nal System of Units (SI) in particular, in the
preparation of instrumentation standards. The Department is further aware of the benefits to USA
users of ISA standards of incorporating suitable references to the SI (and the metric system) in
their business and professional dealings with other countries. Toward this end, this Department
will endeavor to introduce SI-acceptable metric units in all new and revised standards,
recommended practices and technical reports to the greatest extent possible. Standard f or Use of
the International System of Units (SI): The Modern Metric System, published by the American
Society for Testing and Materials as IEEE/ASTM SI 10-97, and future revisions, will be the
reference guide for definitions, symbols, abbreviations, and co nversion factors.
43
44
45
46
47
It is the policy of ISA to encourage and welcome the participation of all concerned individuals and
interests in the development of ISA standards, recommended practices and technical reports.
Participation in the ISA standards-making process by an individual in no way constitutes
endorsement by the employer of that individual, of ISA or of any of the standards, recommended
practices and technical reports that ISA develops.
48
49
50
51
52
CAUTION – ISA adheres to the policy of the American National Standa rds Institute with
regard to patents. If ISA is informed of an existing patent that is required for use of the
standard, it will require the owner of the patent to either grant a royalty -free license for use
of the patent by users complying with the standard or a license on reasonable terms and
conditions that are free from unfair discrimination.
53
54
55
56
57
58
59
60
Even if ISA is unaware of any patent covering this Standard, the user is cautioned that
implementation of the standard may require use of techniques, processes or materials
covered by patent rights. ISA takes no position on the existence or validity of any patent
rights that may be involved in implementing the standard. ISA is not responsible for
identifying all patents that may require a license before implementati on of the standard or
for investigating the validity or scope of any patents brought to its attention. The user
should carefully investigate relevant patents before using the standard for the user’s
intended application.
61
62
63
However, ISA asks that anyone reviewing this standard who is aware of any patents that
may impact implementation of the standard notify the ISA Standards and Practices
Department of the patent and its owner.
64
65
66
67
68
69
70
Additionally, the use of this standard may involve hazardous materials, operat ions or
equipment. The standard cannot anticipate all possible applications or address all possible
safety issues associated with use in hazardous conditions. The user of this standard must
exercise sound professional judgment concerning its use and applic ability under the
user’s particular circumstances. The user must also consider the applicability of any
governmental regulatory limitations and established safety and health practices before
implementing this standard.
71
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
ISA‑62443-2-2, D1E4, April 2013
72
73
–6–
ISA99, WG02, TG02
The following people served as active members of ISA99, Working Group 02, Task Group 02 for
the preparation of this document:
Name
Company
Contributor
<WG/TG Leader’s Name>, WG/TG
Chair
<WG/TG Leader’s Company>
X
<Editor’s Name>, Lead Editor
<Editor’s Company>
X
Reviewer
74
75
76
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
<Member & Reviewer Names >
ISA‑62443-2-2, D1E4, April 2013
–7–
ISA99, WG02, TG02
CONTENTS
77
79
PREFACE ............................................................................................................................... 5
80
FORWORD ........................................................................................................................... 12
81
INTRODUCTION ................................................................................................................... 13
82
83
84
1
Context ........................................................................................................................... 13
Audience ........................................................................................................................ 13
Scope ............................................................................................................................. 15
85
2
Normative references ..................................................................................................... 15
86
3
Terms, definitions, abbreviated terms, acronyms, and conventions ................................. 16
4
3.1 Terms and definitions ............................................................................................ 16
3.2 Abbreviated terms and acronyms ........................................................................... 18
3.3 Conventions .......................................................................................................... 19
Overview ........................................................................................................................ 21
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
4.1
4.2
5
Structure ............................................................................................................... 21
Information security management in IACS ............................................................. 21
4.2.1 Goal .......................................................................................................... 21
4.2.2 IACS assets to be protected ...................................................................... 21
4.2.3 Establishment of information security management.................................... 22
Security Policy ................................................................................................................ 23
5.1
6
Introduction ........................................................................................................... 23
5.1.1 {Requirement} ........................................................................................... 23
Organization of Security ................................................................................................. 23
6.1
6.2
7
Introduction ........................................................................................................... 23
Internal Organization ............................................................................................. 23
6.2.1 {Requirement} ........................................................................................... 23
6.3 External Parties ..................................................................................................... 23
6.3.1 {Requirement} ........................................................................................... 23
Asset Management ......................................................................................................... 24
7.1
7.2
8
Introduction ........................................................................................................... 24
Responsibility for Assets ....................................................................................... 24
7.2.1 {Requirement} ........................................................................................... 24
7.3 Information Classification ...................................................................................... 24
7.3.1 {Requirement} ........................................................................................... 24
Human Resources Security ............................................................................................ 24
8.1
8.2
Prior to Employment .............................................................................................. 24
8.1.1 Roles and responsibilities .......................................................................... 24
8.1.2 Screening .................................................................................................. 25
8.1.3 Terms and conditions of employment ......................................................... 26
During Employment ............................................................................................... 27
8.2.1 Management responsibilities ...................................................................... 27
8.2.2 Information security awareness, education, and training ............................ 28
8.2.3 Disciplinary process ................................................................................... 29
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
78
ISA‑62443-2-2, D1E4, April 2013
ISA99, WG02, TG02
8.3
9
Termination or Change of Employment .................................................................. 29
8.3.1 Termination responsibilities ....................................................................... 29
8.3.2 Return of assets ........................................................................................ 29
8.3.3 Removal of access rights ........................................................................... 29
Physical and Environmental Security .............................................................................. 30
125
126
127
128
129
130
131
132
133
134
135
136
9.1
9.2
Introduction ........................................................................................................... 30
Secure Areas ........................................................................................................ 30
9.2.1 {Requirement} ........................................................................................... 30
9.3 Equipment Security ............................................................................................... 30
9.3.1 Physical Access Authorizations ................................................................. 30
9.3.2 Physical Access Control ............................................................................ 31
9.3.3 Access Control for Communication Medium ............................................... 31
9.3.4 Access Control for Display Medium ............................................................ 32
9.3.5 Monitoring Physical Access ....................................................................... 32
9.3.6 Visitor Control ............................................................................................ 32
9.3.7 Access Records ......................................................................................... 32
10 Communications and Operations Management ............................................................... 33
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
10.1 Introduction ........................................................................................................... 33
10.2 Operational Procedures and Responsibilities ......................................................... 33
10.2.1 Automated Marking .................................................................................... 33
10.3 Third Party Service Delivery Management ............................................................. 33
10.3.1 {Requirement} ........................................................................................... 33
10.4 System planning and acceptance .......................................................................... 33
10.4.1 {Requirement} ........................................................................................... 33
10.5 Protection against malicious and mobile code ....................................................... 34
10.5.1 Malicious Code Protection ......................................................................... 34
10.5.2 Security Alerts and Advisories ................................................................... 34
10.6 Backup .................................................................................................................. 34
10.6.1 {Requirement} ........................................................................................... 34
10.7 Network Security Management .............................................................................. 35
10.7.1 {Requirement} ........................................................................................... 35
10.8 Media Handling ..................................................................................................... 35
10.8.1 Media Protection Policy and Procedures .................................................... 35
10.8.2 Media Access ............................................................................................ 35
10.8.3 Media Labeling .......................................................................................... 36
10.8.4 Media Storage ........................................................................................... 36
10.8.5 Media Transport ........................................................................................ 37
10.8.6 Media Sanitization and Disposal ................................................................ 38
10.8.7 Access Control for Display Medium ............................................................ 38
10.8.8 Public Key Infrastructure Certificates ......................................................... 38
10.9 Exchange of Information ........................................................................................ 39
10.9.1 {Requirement} ........................................................................................... 39
10.10 Electronic Commerce Services .............................................................................. 39
10.10.1 {Requirement} ........................................................................................... 39
10.11 Monitoring ............................................................................................................. 39
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
120
121
122
123
124
–8–
–9–
ISA99, WG02, TG02
165
166
167
168
169
10.11.1 Audit and Accountability Policy and Procedures ......................................... 39
10.11.2 Auditable Events........................................................................................ 40
10.11.3 Audit Monitoring, Analysis and Reporting ................................................... 40
10.11.4 Audit Record Retention .............................................................................. 40
11 Access Control ............................................................................................................... 41
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
11.1 Introduction ........................................................................................................... 41
11.2 Business Requirement ........................................................................................... 41
11.2.1 Access Control Policy and Procedures ...................................................... 41
11.2.2 System and Information Integrity Policy and Procedures ............................ 41
11.2.3 Flaw Remediation ...................................................................................... 42
11.3 User Access Management ..................................................................................... 42
11.3.1 Account Management ................................................................................ 42
11.3.2 Separation of Duties .................................................................................. 43
11.4 User Responsibilities ............................................................................................. 43
11.4.1 {Requirement} ........................................................................................... 43
11.5 Network Access Control ........................................................................................ 44
11.5.1 Least Privilege ........................................................................................... 44
11.5.2 Permitted Actions Without Identification or Authentication ......................... 44
11.5.3 Remote Access.......................................................................................... 44
11.5.4 Use of External Information Systems ......................................................... 45
11.6 Operating System Access Control ......................................................................... 45
11.6.1 {Requirement} ........................................................................................... 45
11.7 Application and Information Access Control ........................................................... 46
11.7.1 {Requirement} ........................................................................................... 46
11.8 Mobile Computing and Teleworking ....................................................................... 46
11.8.1 Wireless Access Restrictions ..................................................................... 46
11.8.2 Use Control for Portable and Mobile Devices ............................................. 46
11.8.3 Mobile Code .............................................................................................. 47
11.8.4 Supervision and Review – Use Control ...................................................... 47
11.8.5 Identification and Authentication Policy and Procedures ............................ 47
11.8.6 Identifier Management ............................................................................... 48
11.8.7 Authenticator Management ........................................................................ 48
11.8.8 Software and Information Integrity ............................................................. 49
11.8.9 Information Input Restrictions .................................................................... 49
11.8.10 Error Handling ........................................................................................... 49
11.8.11 Information Output Handling and Retention ............................................... 50
11.8.12 Boundary Protection .................................................................................. 50
12 Systems acquisition, development and maintenance ...................................................... 51
203
204
205
206
207
208
209
12.1 Introduction ........................................................................................................... 51
12.2 Security requirements of information systems ........................................................ 51
12.2.1 {Requirement} ........................................................................................... 51
12.3 Correct Processing in Applications ........................................................................ 51
12.3.1 {Requirement} ........................................................................................... 51
12.4 Cryptographic Controls .......................................................................................... 51
12.4.1 Cryptographic Module Validation ............................................................... 51
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
– 10 –
ISA99, WG02, TG02
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
12.5 Security of System Files ........................................................................................ 51
12.5.1 {Requirement} ........................................................................................... 51
12.6 Security in development and support processes .................................................... 52
12.6.1 {Requirement} ........................................................................................... 52
12.7 Technical vulnerability management ...................................................................... 52
12.7.1 Configuration Management Policy and Procedures .................................... 52
12.7.2 Baseline Configuration ............................................................................... 52
12.7.3 Configuration Change Control .................................................................... 53
12.7.4 Monitoring Configuration Changes ............................................................. 53
12.7.5 Access Restrictions for Change ................................................................. 54
12.7.6 Network and Security Configuration Settings ............................................. 54
12.7.7 IACS Component Inventory ........................................................................ 54
12.7.8 System Maintenance Policy and Procedures .............................................. 55
12.7.9 Controlled Maintenance ............................................................................. 55
12.7.10 Maintenance Tools .................................................................................... 56
12.7.11 Remote Maintenance ................................................................................. 56
12.7.12 Maintenance Personnel ............................................................................. 57
12.7.13 Timely Maintenance ................................................................................... 57
13 Incident Management ..................................................................................................... 58
229
230
231
232
233
234
235
236
237
238
239
240
241
13.1 Introduction ........................................................................................................... 58
13.2 Reporting Security Events and Weaknesses .......................................................... 58
13.2.1 {Requirement} ........................................................................................... 58
13.3 Management of Incidents and Improvements ......................................................... 58
13.3.1 Incident Response Policy and Procedures ................................................. 58
13.3.2 Incident Response Training ....................................................................... 58
13.3.3 Incident Response Testing and Exercises .................................................. 59
13.3.4 Incident Handling ....................................................................................... 59
13.3.5 Incident Monitoring .................................................................................... 59
13.3.6 Incident Reporting ..................................................................................... 60
13.3.7 Incident Response Assistance ................................................................... 60
13.3.8 IACS Monitoring Tools and Techniques ..................................................... 60
14 Business Continuity Management ................................................................................... 62
242
243
244
245
246
247
248
249
250
251
252
253
254
14.1 Introduction ........................................................................................................... 62
14.2 Security Aspects.................................................................................................... 62
14.2.1 Contingency Planning Policy and Procedures ............................................ 62
14.2.2 Contingency Plan ...................................................................................... 62
14.2.3 Contingency Training ................................................................................. 63
14.2.4 Contingency Plan Testing and Exercises ................................................... 63
14.2.5 Contingency Plan Update .......................................................................... 64
14.2.6 Alternate Storage Site ............................................................................... 64
14.2.7 Alternate Control Site ................................................................................ 64
14.2.8 IACS Backup ............................................................................................. 65
14.2.9 IACS Recovery and Reconstruction ........................................................... 65
14.2.10 Power Equipment and Cabling ................................................................... 66
14.3 Telecommunications Services ............................................................................... 66
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
ISA‑62443-2-2, D1E4, April 2013
– 11 –
ISA99, WG02, TG02
14.3.1
14.3.2
14.3.3
14.3.4
14.3.5
14.3.6
15 Compliance
Emergency Shutoff .................................................................................... 66
Emergency Power...................................................................................... 67
Emergency Lighting ................................................................................... 67
Fire Protection ........................................................................................... 67
Temperature and Humidity Controls ........................................................... 68
Water Damage Protection .......................................................................... 68
.................................................................................................................... 68
262
263
264
15.1 General ................................................................................................................. 68
15.1.1 {Requirement} ........................................................................................... 68
Annex A (informative) Foundational Requirements ................................................................ 70
265
266
267
268
269
270
271
272
273
A.1
A.2
A.3
A.4
A.5
A.6
A.7
A.8
Annex B
274
275
B.1 Overview ............................................................................................................... 72
BIBLIOGRAPHY ................................................................................................................... 73
Overview ............................................................................................................... 70
FR1 A CCESS C ONTROL ............................................................................................ 70
FR2 U SE C ONTROL ................................................................................................. 70
FR3 D ATA I NTEGRITY .............................................................................................. 70
FR4 D ATA C ONFIDENTIALITY .................................................................................... 70
FR5 R ESTRICT D ATA F LOW ...................................................................................... 71
FR6 T IMELY R ESPONSE TO AN E VENT ....................................................................... 71
FR7 R ESOURCE A VAILABILITY ................................................................................... 71
(informative) - Mapping Controls to Foundational Requirements ............................. 72
276
277
No table of figures entries found.
278
No table of figures entries found.
279
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
255
256
257
258
259
260
261
ISA‑62443-2-2, D1E4, April 2013
– 12 –
ISA99, WG02, TG02
280
FORWORD
281
282
283
284
This standard is part of a series that addresses the issue of security for industrial automation and control systems. It
has been developed by Working Group 02, Task Group 02 of the ISA99 committee.
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
SKELETON NOTE The forward should only be a few lines and should indicate the basic premise of the document and
why it is important. It should also indicate if this document supersedes or modifies any other document.
The following information comes from the IEC Directives.
The foreword shall appear in each document. It shall not contain requirements, recommendations, figures or tables.
It consists of a general part and a specific part. The general part (supplied by the Central Secretariat of ISO or by the
Central Office of the IEC, as appropriate) gives information relating to the organization responsible and to
International Standards in general, i.e.
a) the designation and name of the committee that prepared the document,
b) information regarding the approval of the document, and
c) information regarding the drafting conventions used, co mprising a reference to this part of the ISO/IEC Directives.
The specific part (supplied by the committee secretariat) shall give a statement of significant technical changes from
any previous edition of the document and as many of the following as are appropriate:
d) an indication of any other international organization that has contributed to the preparation of the document;
e) a statement that the document cancels and replaces other documents in whole or in part;
f) the relationship of the document to other documents (see 5.2.1.3);
g) in IEC, an indication of the next stability date (see ISO/IEC Directives, IEC Supplement, 2010, 3.4).
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
302
This standard addresses the requirements for the operation of an effective cyber security program within the context of
the foundational requirements defined in ISA‑62443-1-1.
ISA‑62443-2-2, D1E4, April 2013
– 13 –
ISA99, WG02, TG02
INTRODUCTION
303
The format of this document follows the ISO/IEC requirements discussed in ISO/IEC Directives, Pa rt 2. [12] 1
The ISO/IEC Directives specify the format of this document as well as the use of terms like “shall”, “should”,
and “may”. The use of those terms for the requirements specified in Clause Error! Reference source not f
ound. of this document use the conventions discussed in the ISO/IEC Directives, Appendix H.
304
305
306
307
308
309
NOTE
310
Context
311
312
313
314
315
Industrial automation and control system (IACS) organizations increasingly use commercial -offthe-shelf (COTS) networked devices that are inexpensive, efficient and highly automated. These
devices and networking technologies provide an increased opportunity for cyber attack against
the IACS equipment. This weakness may lead to health, safety and environmenta l (HSE)
consequences in deployed systems.
316
317
318
319
320
321
Organizations deploying pre-existing information technology (IT) and business cyber security
solutions to address IACS security may not fully comprehend the results of this decision. While
many business IT applications and security solutions can be applied to IACS, they need to be
applied in the correct way to eliminate inadvertent consequences. For this reason, the approach
used to define system requirements needs to be based on a combination of functional and
consequence analysis, and often an awareness of operational issues as well.
322
323
324
325
326
327
328
The primary goal of the ISA‑99 series is to provide a flexible framework that facilitates
addressing current and future vulnerabilities in IACS and applying necessary mitigations in a
systematic, defensible manner. It is important to understand that the intention of the ISA ‑99
series is to build extensions to enterprise security that adapt the requirements for IT business
systems and combine them with the unique requirements that embrac e the strong availability
needed by IACS. The ISA‑99 committee has made every effort to avoid building unique stovepipe
security architectures for IACS.
329
330
331
332
This International Standard provides interpretation guidelines for the implementation and
management of information security management for Industrial Automation and Control Systems
(IACS). The approach used is consistent with ISO/IEC 27002 (Code of practice for information
security management).
333
334
335
336
337
IACS security goals focus on system availability, plant prote ction, plant operations (even if in a
degraded mode), and time-critical system response. IT security goals often do not place the same
emphasis on these factors. They may be more concerned with protecting information rather than
physical assets. These different goals need to be clearly stated as security objectives regardless
of the degree of plant integration achieved.
338
339
340
This document assumes that a security program has been established in accordance with
ISA‑99.02.01 and that patch management is implemented consistent with the recommendations
detailed in ISA‑TR99.02.03.
341
Audience
342
343
344
345
346
The audience for the information in this standard includes asset owners, those responsible for
information security; system vendors, auditors, and application content providers, with a common
set of general security control objectives based on ISO/IEC 27002, IACS specific controls, and
information security management guidelines allowing for the selection and implementation of
such controls.
347
—————————
1 Numbers in square brackets refer to the Bibliography.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
The initial content of this section is based on similar material from other standards in the ISA99 series. This is provided
only as a starting point.
ISA‑62443-2-2, D1E4, April 2013
368
369
ISA99, WG02, TG02
SKELETON NOTE For most documents in the ISA-99 series, the Introduction will probably be labeled as Clause 0,
since there are sub-clauses included. This is common. The Introduction should be limited to no more than 2
pages and should contain no figures. If figures are needed, then that section sh ould be moved to Clause 4+ or
an Annex. If you need a Clause 0, you will need to edit the “iecstd_us.dotm” and change starting number for
the Heading style to start at 0. After that, make sure that the styles reload into the Skeleton file and change
the style of the Introduction section header to Heading instead of Heading (Nonumber).
The Introduction should indicate major similarities or relationships between the document and existing ISO/IEC
documents. It does not have to include detailed explanations, bu t should give the reader some context in
relation to other documents.
The following information comes from the IEC Directives.
The introduction is an optional preliminary element used, if required, to give specific information or commentary about
the technical content of the document, and about the reasons prompting its preparation. It shall not contain
requirements.
Whenever alternative solutions are adopted internationally in a document and preferences for the different alternatives
provided, the reasons for the preferences shall be explained in the introduction [see A.6 d)]. Where patent
rights have been identified in a document, the introduction shall include an appropriate notice. See Annex F
for further information.
The introduction shall not be numbered unless there is a need to create numbered subdivisions. In this case, it shall be
numbered 0, with subclauses being numbered 0.1, 0.2, etc. Any numbered figure, table, displayed formula or
footnote shall be numbered normally beginning with 1.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
– 14 –
ISA‑62443-2-2, D1E4, April 2013
– 15 –
ISA99, WG02, TG02
1
371
372
The initial content of this section is based on similar material from other standards in the ISA99 series. This is provided
only as a starting point.
373
374
375
376
377
378
This standard addresses the operation of an effective IACS cyber security program. Aspects of
this operation are examined in the context of the foundational requirements (FRs) described in
ISA‑99.01.01. The requirements and controls would be used by various members of the industrial
automation and control systems (IACS) community along with the defined zones an d conduits for
the system under consideration (SuC) while developing the appropriate technical system target
security assurance level (SAL), SAL-T(system), for a specific asset.
379
380
381
382
383
384
385
386
387
388
389
390
391
SKELETON NOTE Clause 1 shall always be the Scope. This is a short statement that describes the scope of this
document only. It does not list the overall scope of ISA -99. That has been described in other documents and
does not need to be repeated here.
The following information comes from the IEC Directives.
This element shall appear at the beginning of each document and define without ambiguity the subject of the document
and the aspects covered, thereby indicating the limits of applicability of the document or particular parts of it.
It shall not contain requirements.
In documents that are subdivided into parts, the scope of each part shall define the subject of that part of the document
only.
The scope shall be succinct so that it can be used as a summary for bibliographic purposes.
This element shall be worded as a series of statements of fact. Forms of expression such as the following shall be
used:
“This International Standard
the dimensions of … "
- specifies {a method of … "
the characteristics of … "
a system for … "
- establishes {
general principles for … "
392
393
394
395
396
397
398
399
Scope
— gives guidelines for …”
— defines terms …”
Statements of applicability of the document shall be introduced by wording such as:
“This International Standard is applicable to …”
The wording shall be altered as a function of the document type concerned, i.e. International Standard, Technical
Specification, Publicly Available Specification, Technical Report or Guide.
400
2
Normative references
401
402
403
The following referenced documents are indispensable for the application of this document. For
dated references, only the edition cited applies. For undated references, the latest edition of the
referenced document (including any amendments) applies.
404
405
406
The following referenced documents are indispensable for the application of this document. For
dated references, only the edition cited applies. F or undated references, the latest edition of the
referenced document (including any amendments) applies.
407
408
ISA‑99.01.01 – Security for industrial and automation control systems: Terminology, concepts
and models
409
410
ISA‑99.02.01 – Security for industrial and automation control system: Establishing an industrial
automation and control systems security program
411
412
ISA‑99.03.02 – Security for industrial and automation control system: Security assurance levels
for zones and conduits
413
414
SKELETON NOTE Generally, in the ISA-99 series, there is only 1 completely normative document, ISA -99.01.01. If
there are others, put them here as well. Normative references shall be International Standards documents of
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
370
ISA‑62443-2-2, D1E4, April 2013
415
416
– 16 –
ISA99, WG02, TG02
some sort. Even though a document gets listed here, it will also be liste d in the Bibliography along with all the
other documents.
417
3
Terms, definitions, abbreviated terms, acronyms, and conventions
418
419
The initial content of this section is based on similar material from other standards in the ISA99 series. This is provided
only as a starting point.
420
3.1
421
422
For the purposes of this document, the terms and definitions given in ISA‑62443-1-1 and the
following apply.
423
424
425
426
3.1.1
authentication
verifying the identity of an IACS user, often as a prerequisite to allowing access to resources in
an information system
427
428
429
3.1.2
authenticity
property of being genuine and being able to be verified and trusted
430
NOTE
431
432
433
434
3.1.3
automatic
pertaining to a process or equipment that, under specified conditions, functions without human
intervention
435
[IEV number 351-21-40]
436
437
438
3.1.4
availability
ensuring timely and reliable access to and use of information
439
[FIPS 199]
440
441
442
443
3.1.5
communication channel
logical or physical point-to-point or point-to-multipoint data flow between components in one zone
to one or more components in another zone
444
445
446
447
3.1.6
confidentiality
preserving authorized restrictions on information access and disclosure, including means fo r
protecting personal privacy and proprietary information
448
[FIPS 199]
449
450
451
452
3.1.7
connection
association established between two or more endpoints which supports the transfer of IACS specific data
453
454
455
3.1.8
consequence
outcome of an event
456
457
458
459
3.1.9
environment
aggregate of external procedures, conditions, and objects affecting the development, operation
and maintenance of IACS
It may also be defined as confidence in the validity of a transmission, a message, or message o riginator.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
Terms and definitions
– 17 –
ISA99, WG02, TG02
460
461
462
3.1.10
event
occurrence or change of a particular set of circumstances
463
464
465
466
3.1.11
external information systems
hardware, software components and repositories that are connecte d by some means or
embedded within the component
467
468
469
470
3.1.12
IACS user
entity (including human users, processes and devices) that performs a function in the IACS or a
component used by the IACS
471
472
473
3.1.13
impact
evaluated consequence of a particular event
474
475
476
3.1.14
industrial automation and control system
system which controls the manufacturing process within a defined set of operational limits
477
478
479
480
3.1.15
integrity
guarding against improper information modification or destruction, and includes ensuring
information non-repudiation and authenticity
481
[FIPS 199]
482
483
484
485
486
3.1.16
local access
any access to an organizational IACS by an IACS user communicating through an internal,
organization-controlled network (such as a local area network) or directly to the IACS without the
use of a network
487
488
489
490
491
3.1.17
non-repudiation
assurance that the sender of information is provided with proof of delivery and all recipients are
provided with proof of the sender’s identity, so the sender cannot deny having sent the
information and the recipient cannot deny having received the information
492
493
494
495
3.1.18
remote access
any access to an IACS by an IACS user communicating through an external, non -organizationcontrolled network (such as the Internet)
496
497
498
499
3.1.19
remote session
session initiated whenever an IACS is accessed by a human user communicating across the
boundary of a zone defined by the asset owner based on their risk assessment
500
501
502
503
3.1.20
role
set of connected behaviors, privileges and obligations associated to IACS users in a given
situation
504
NOTE 1
The privileges to perform certain operations are assigned to specific ro les.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
ISA‑62443-2-2, D1E4, April 2013
– 18 –
ISA99, WG02, TG02
505
506
507
508
NOTE 2
509
510
511
512
513
3.1.21
security assurance level
measure of confidence that computer systems and data are free from vulnerabilities, either
intentionally designed computer components or accidently inserted at any time during its
lifecycle, and that the computer systems functions in the intended manner
514
515
516
517
3.1.22
session
semi-permanent, stateful,
communicating devices
518
NOTE
519
520
521
522
523
3.1.23
threat
any circumstance or event with the potential to adversely affect organizational operations
(including mission, functions, image or reputation), organizational assets, IACS or individuals via
unauthorized access, destruction, disclosure, modification of dat a and/or denial of service
524
525
526
527
3.1.24
trust
belief that an operation or data transaction source or process is secure and will perform as
intended
528
529
530
3.1.25
untrusted
entity that has not met predefined requirements to be trusted
531
532
533
534
535
536
537
538
3.1.26
vulnerability
539
3.2
540
This subclause defines the abbreviated terms and acronyms used in this document.
Role definitions must be distinguished in infrastructure role definitions (within a process), functional role
definitions (part of an entity functions) or organizational role definition (a person position). A functional role
may be associated with privileges and confer responsibility and authority on a user assigned to that role
interactive
information
interchange
between
two
or
more
Typically a session has a clearly defined start process and end process.
weakness in an IACS function, procedure, internal control or implementation that could be exploited or triggered by a
threat source
SKELETON NOTE Only add in the reference at the end of the term if it relates directly to something from an
international standard. IEC seems to dislike referencing national standards documents (ISA, NIST, NERC,
NEMA, etc.). Only include these references if there is an ISO/IEC, NATO, etc. reference. Also, if the reference
is not exactly from the reference, indicate something like “Adapted from … ”.
Abbreviated terms and acronyms
AC
Access Control
AES
Advanced encryption standard
API
Application programming interface
CA
Certification authority
CIP
Critical infrastructure protection
COTS
Commercial-off-the-shelf
DC
Data confidentiality
DI
Data integrity
DMZ
Demilitarized zone
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
Adapted from [ISO/IEC 1st WD 24760: 2005 -10-01]
– 19 –
DoS
Denial of service
FR
Foundational requirement
FTP
File transfer protocol
HSE
Health, safety, and environmental
HTTP
Hypertext transfer protocol
IACS
Industrial automation and control system(s)
ID
Identifier
IDS
Intrusion detection system
IEC
International Electrotechnical Commission
IEEE
Institute of Electrical and Electronics Engineers
IM
Instant messaging
IPS
Intrusion prevention system
ISO
International Organization for Standardization
IT
Information technology
NERC
North American Electric Reliability Corporation
NIST
U.S. National Institute of Standards and Technology
PDF
Portable document format
RA
Resource availability
RDF
Restrict data flow
RE
Requirement enhancement
SAL
Security assurance level
SIS
Safety instrumented system
SP
Special Publication (from NIST)
SR
System requirement
SuC
System under consideration
TRE
Timely response to an event
UC
Use control
US-CERT
U.S. Computer Emergency Readiness Team
USB
Universal serial bus
VoIP
Voice over internet protocol
ISA99, WG02, TG02
541
3.3
Conventions
542
543
544
545
546
Much of the content of this standard is expressed in the form of specific requirements or controls.
Each of these has a baseline requirement and zero or more requirement enhancements to
strengthen security assurance. Rationale and supplemental guidance may be provided for each
baseline requirement, and for any associated enhancement as is deemed necessary, to provide
clarity to the reader.
547
548
SKELETON NOTE This sub-clause is where specific conventions used in the document, like specific clause/sub clause formatting, special text conventions, or any other things that the reader should know in order to read
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
549
550
– 20 –
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
ISA99, WG02, TG02
the document. The reader may still need some introduction to conventions used throughout the document, but
this sub-clause allows for a greater explanation in one place.
551
ISA‑62443-2-2, D1E4, April 2013
– 21 –
ISA99, WG02, TG02
552
4
Overview
553
4.1
554
555
556
The content of this standard has been organized in a manner similar to that used in ISO/IEC
27002. In cases where objectives and controls specified in ISO/IEC 27002 are applicable without
a need for any additional information, only a reference is provided to ISO/IEC 27002.
557
558
559
560
In cases where controls need additional guidance spec ific to IACS, the ISO/IEC 27002 control
and implementation guidance is repeated without modification, followed by the IACS specific
guidance related to this control. IACS specific guidance and information is included in the
following clauses:
561
– Organization of information security (clause 6)
562
– Asset management (clause 7)
563
– Human resources security (clause 8)
564
– Physical and environmental security (clause 9)
565
– Communications and operations management (clause 10)
566
– Access control (clause 11)
567
– Information systems acquisition, development and maintenance (clause 12)
568
– Information security incident management (clause 13)
569
– Business continuity management (clause 14)
570
4.2
571
4.2.1
572
573
574
575
Industrial control systems and associated networks are faced with security threats from a wide
range of sources, including computer-assisted fraud, espionage, sabotage, vandalism,
information leakage, earthquake, fire or flood. These security threats may originate from inside or
outside the control systems environment resulting in damage to the organization.
576
577
578
579
Once the security of an IACS is compromised, for example by unauthorized access, the system or
the equipment under control may suffer damage. Therefore, it is essential for an asset owner to
ensure its security by continuously improving its related programs in accordance with ISO/IEC
27001.
580
581
582
583
584
Effective IACS security is achieved by implementing a suitable set of controls based on those
described in this standard. These controls need to be established, implemen ted, monitored,
reviewed and improved in facilities, services and applications. The successful deployment of
security controls will better enable meeting the security and business objectives of the
organization to be met.
585
4.2.2
586
587
588
In order to establish information security management, it is essential for an asset owner to clarify
and identify all IACS related assets. The clarification of attributes and importance of the assets
makes it possible to implement appropriate controls.
Information security management in IACS
Goal
IACS assets to be protected
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
Structure
ISA‑62443-2-2, D1E4, April 2013
– 22 –
ISA99, WG02, TG02
589
4.2.3
Establishment of information security management
590
4.2.3.1
591
592
It is essential for asset owners to identify their security requirements. There are three main
sources of security requirements as follows:
593
594
595
a) What is derived from assessing risks to IAC S operation, taking into account the overall
business strategy and objectives. Through risk assessment, threats to assets are identified,
vulnerability to and likelihood of occurrence is evaluated and potential impact is estimated;
596
597
b) The legal, statutory, regulatory, and contractual requirements that asset owners have to
satisfy, and the socio-cultural environment;
598
599
c) The particular set of principles, objective and business requirements for information processing
that an asset owner has developed to support its operations.
600
4.2.3.2
601
602
603
604
605
Security requirements are identified by a methodical assessment of security risks. Expenditure on
controls needs to be balanced against the business harm likely to result from security failures.
The results of the risk assessment will help to guide and determine the appropriate management
action and priorities for managing information security risks, and for implementing controls
selected to protect against these risks.
606
607
Risk assessment should be repeated periodically to address any changes that might influence the
risk assessment results.
608
4.2.3.3
609
610
611
Once security requirements and risks have been identified and decisions for the treatment of
risks have been made, appropriate controls should be selected and implemented to ensure risks
are reduced to an acceptable level.
612
613
614
615
This standard provides guidance and IACS specific controls, in addition to general information
security management, taking account of IACS specific requirements. Therefore, asset owners are
recommended to select controls from this guideline and implement them. In addition, new controls
can be designed to meet specific needs as appropriate.
616
617
618
619
The selection of security controls is dependent upon organizational decisions based on the
criteria for risk acceptance, risk treatment options, and the general risk management approach
applied by asset owners, and should also be subject to all relevant national and international
legislation and regulations.
620
4.2.3.4
621
622
Experience has shown that the following factors are often critical to the successful
implementation of information security in an industrial automation and control system :
623
624
a) information security policy, objectives, and activities t hat reflect business objectives and the
specific characteristics of an IACS;
625
626
b) an approach and framework to implementing, maintaining, monitoring, and improving
information security that is consistent with the organizational culture;
627
c) visible support and commitment from all levels of managem ent;
628
d) a good understanding of the security requirements, risk assessment, and risk management;
629
630
e) effective marketing of information security to all managers, employees, and other parties to
achieve awareness;
Assessing security risks
Selecting controls
Critical success factors
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
How to establish security requirements
– 23 –
ISA99, WG02, TG02
631
632
f) distribution of guidance on information security policy and standards to all managers,
employees and other parties;
633
g) provision to fund information security management activities;
634
h) providing appropriate awareness, training, and education;
635
i) establishing an effective information security inci dent management process;
636
637
j) implementation of a measurement system that is used to evaluate performance in information
security management and feedback suggestions for improvement.
638
5
639
5.1
640
5.1.1
Security Policy
Introduction
641
{Requirement}
Requirement:
642
643
Foundational Requirement:
644
Rationale/Supplemental Guidance:
645
Requirement Enhancements:
646
647
6
Organization of Security
648
6.1
Introduction
650
6.2
Internal Organization
651
6.2.1
649
652
{Requirement}
Requirement:
653
654
Foundational Requirement:
655
Rationale/Supplemental Guidance:
656
Requirement Enhancements:
657
658
6.3
659
6.3.1
660
External Parties
{Requirement}
Requirement:
661
662
Foundational Requirement:
663
Rationale/Supplemental Guidance:
664
Requirement Enhancements:
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
ISA‑62443-2-2, D1E4, April 2013
– 24 –
ISA99, WG02, TG02
665
666
7
Asset Management
667
7.1
Introduction
669
7.2
Responsibility for Assets
670
7.2.1
668
671
Requirement:
672
673
Foundational Requirement:
674
Rationale/Supplemental Guidance:
675
Requirement Enhancements:
676
677
7.3
Information Classification
678
7.3.1
679
{Requirement}
Requirement:
680
681
Foundational Requirement:
682
Rationale/Supplemental Guidance:
683
Requirement Enhancements:
684
685
8
Human Resources Security
686
8.1 Prior to Employment
687
688
689
Objective: To ensure that employees, contractors and third party users understand their
responsibilities, and are suitable for the roles they are considered for, and to reduce the risk of
theft, fraud or misuse of facilities.
690
691
Security responsibilities should be addressed prior to e mployment in adequate job descriptions
and in terms and conditions of employment.
692
693
All candidates for employment, contractors and third party users should be adequately screened,
especially for sensitive jobs.
694
695
Employees, contractors and third party users of information processing facilities should sign an
agreement on their security roles and responsibilities.
696
8.1.1
697
Control
698
699
Security roles and responsibilities of employees, contractors and third party users should be
defined and documented in accordance with the organization’s information security policy.
700
Implementation guidance
Roles and responsibilities
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
{Requirement}
ISA‑62443-2-2, D1E4, April 2013
ISA99, WG02, TG02
Security roles and responsibilities should include the requirement to:
702
703
a) implement and act in accordance with the organization’s information security policies (see
5.1);
704
705
b) protect assets from unauthorized access, disclosure, modification, destruction or
interference;
706
c) execute particular security processes or activities;
707
d) ensure responsibility is assigned to the individual for actions taken;
708
e) report security events or potential events or other security risks to the organization.
709
710
Security roles and responsibilities should be defined and clearly communicated to job candidates
during the pre-employment process.
711
IACS-specific implementation guidance
712
713
714
715
Facilities should appoint staff who have the right credentials or appropriate knowledge and skills
to be in charge of the supervision of matters related to the installation, maintenance and
operation of IACS. The relevant staff should be notified of their assigned roles and
responsibilities.
716
Other Information
717
718
719
Job descriptions can be used to document security roles and responsibilities. Security roles and
responsibilities for individuals not engaged via the organization’s employment process, e.g.
engaged via a third party organization, should also be clearly defined and communicated.
720
721
Requirement:
722
723
Foundational Requirement:
724
Rationale/Supplemental Guidance:
725
Requirement Enhancements:
726
727
8.1.2
Screening
728
Control
729
730
731
732
Background verification checks on all candidates for employment, contractors, and third party
users should be carried out in accordance with relevant laws, regulations and ethics, and
proportional to the business requirements, the classification of the information to be accessed,
and the perceived risks.
733
Implementation guidance
734
735
Verification checks should take into account all relevant privacy, protection of personal data
and/or employment based legislation, and should, where permitted, include the following:
736
a) availability of satisfactory character references, e.g. one business and one per sonal;
737
b) a check (for completeness and accuracy) of the applicant’s curriculum vitae;
738
c) confirmation of claimed academic and professional qualifications;
739
d) independent identity check (passport or similar document);
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
701
– 25 –
– 26 –
ISA99, WG02, TG02
740
e) more detailed checks, such as credit checks or checks of criminal records.
741
742
743
744
Where a job, either on initial appointment or on promotion, involves the person having access to
information processing facilities, and in particular if these are handling sensitive information, e.g.
financial information or highly confidential information, the organization should also consider
further, more detailed checks.
745
746
Procedures should define criteria and limitations for verification checks, e.g. who is eligible to
screen people, and how, when and why verification checks a re carried out.
747
748
749
750
751
752
A screening process should also be carried out for contractors, and third party users. Where
contractors are provided through an agency the contract with the agency should clearly specify
the agency’s responsibilities for screening and the notification procedures they need to follow if
screening has not been completed or if the results give cause for doubt or concern. In the same
way, the agreement with the third party (see also 6.2.3) should clearly specify all responsibilities
and notification procedures for screening.
753
754
755
756
Information on all candidates being considered for positions within the organization should be
collected and handled in accordance with any appropriate legislation existing in the relevant
jurisdiction. Depending on applicable legislation, the candidates should be informed beforehand
about the screening activities.
757
IACS-specific implementation guidance
758
759
760
Facilities should also consider further, more detailed checks for job positions that give staff
access to IACS that have been assessed as critical and thus require higher levels of security.
[wording?]
761
8.1.3
762
Control
763
764
765
As part of their contractual obligation, employees, contractors and third party users should agree
and sign the terms and conditions of their employment contract, which should state their and the
organization’s responsibilities for information security.
766
Implementation guidance
767
768
The terms and conditions of employment should reflect the organization’s security policy in
addition to clarifying and stating:
769
770
771
a) that all employees, contractors and third party users who are given access to sensitive
information should sign a confidentiality or non-disclosure agreement prior to being given
access to information processing facilities;
772
773
b) the employee’s, contractor’s and any other user’s legal responsibilities and rights, e.g.
regarding copyright laws or data protection legislation (see also 15.1.1 and 15.1.2);
774
775
776
c) responsibilities for the classification of information and management of organizational assets
associated with information systems and services handled by the employee, contractor or
third party user (see also 7.2.1 and 10.7.3);
777
778
d) responsibilities of the employee, contractor or third party user for the handling of information
received from other companies or external parties;
779
780
781
e) responsibilities of the organization for the handling of personal information, including personal
information created as a result of, or in the course of, employment with the organization (see
also 15.1.4);
782
783
f)
Terms and conditions of employment
responsibilities that are extended outside the organization’s premises and outside normal
working hours, e.g. in the case of home-working (see also 9.2.5 and 11.7.1);
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
– 27 –
ISA99, WG02, TG02
784
785
g) actions to be taken if the employee, contractor or third party user disregards the
organization’s security requirements (see also 8.2.3).
786
787
788
The organization should ensure that employees, contractors and third party users agree to terms
and conditions concerning information security appropriate to the nature and extent of access
they will have to the organization’s assets associated with information systems and services.
789
790
Where appropriate, responsibilities contained within the terms and conditions of employment
should continue for a defined period after the end of the employment (see also 8.3).
791
IACS-specific implementation guidance
792
793
Facilities should clarify and state the responsibilities for maintaining IACS availability, plant
protection, plant operations (even if in a degraded mode), and time -critical system response.
794
Other Information
795
796
797
798
799
800
A code of conduct may be used to cover the employee’s, contractor’s or third party user’s
responsibilities regarding confidentiality, data protection, ethics, appropriate use of the
organization’s equipment and facilities, as well as reputable practices expected by the
organization. The contractor or third party users may be associated with an external organization
that may in turn be required to enter in contractual arrangements on behalf of the contracted
individual.
801
8.2 During Employment
802
803
804
805
Objective: To ensure that employees, contractors and third party users are aware of information
security threats and concerns, their responsibilities and liabilities, and are equipped to support
organizational security policy in the course of their normal work, and to reduce the risk of human
error.
806
807
Management responsibilities should be defined to ensure that security is applied throughout an
individual’s employment within the organization.
808
809
810
811
An adequate level of awareness, education, and training in security procedures and the correct
use of information processing facilities should be provided to all employees, contractors and third
party users to minimize possible security risks. A formal disciplinary process for handling security
breaches should be established.
812
8.2.1
813
Control
814
815
Management should require employees, contractors and third party users to apply security in
accordance with established policies and procedures of the organization.
816
Implementation guidance
817
818
Management responsibilities should include ensuring that employees, contractor s and third party
users:
819
820
a) are properly briefed on their information security roles and responsibilities prior to being
granted access to sensitive information or information systems;
821
b) are provided with guidelines to state security expectations of their role within the organization;
822
c) are motivated to fulfil the security policies of the organization;
823
824
d) achieve a level of awareness on security relevant to their roles and responsibilities within the
organization (see also 8.2.2);
Management responsibilities
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
ISA‑62443-2-2, D1E4, April 2013
– 28 –
ISA99, WG02, TG02
825
826
e) conform to the terms and conditions of employment, which includes the organization’s
information security policy and appropriate methods of working;
827
f)
continue to have the appropriate skills and qualifications.
829
IACS-specific implementation guidance
830
831
Management should ensure that individuals responsible for operating and maintaining IACS are
included in the above mentioned activities
832
Other Information
833
834
835
If employees, contractors and third party users are not made aware of their security
responsibilities, they can cause considerable damage to an organization. Motivated personnel are
likely to be more reliable and cause less information security incidents.
836
837
838
Poor management may cause personnel to feel undervalued resulting in a negative security
impact to the organization. For example, poor management may lead to security being neglected
or potential misuse of the organization’s assets.
839
Requirement:
840
Foundational Requirement:
841
Rationale/Supplemental Guidance:
842
Requirement Enhancements:
843
8.2.2
Information security awareness, education, and training
844
Control
845
846
847
All employees of the organization and, where relevant, contractors and third party users should
receive appropriate awareness training and regular updates in organizational policies and
procedures, as relevant for their job function.
848
Implementation guidance
849
850
851
Awareness training should commence with a formal induction process designed to introduce the
organization’s security policies and expectations before access to information or services is
granted.
852
853
854
Ongoing training should include security requirements, legal responsibilities and business
controls, as well as training in the correct use of information processing facilities e.g. log -on
procedure, use of software packages and information on the disciplinary process (see 8.2.3).
855
IACS-specific implementation guidance
856
857
858
Individuals responsible for operating and maintaining IACS should be included in the above
mentioned activities and, where necessary, specific training should be developed for individuals
in these roles.
859
Other Information
860
861
862
863
The security awareness, education, and training activities should be suitable and relevant to the
person’s role, responsibilities and skills, and should include information on known threats, who to
contact for further security advice and the proper channels for reporting inf ormation security
incidents (see also 13.1).
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
828
ISA‑62443-2-2, D1E4, April 2013
– 29 –
ISA99, WG02, TG02
864
865
Training to enhance awareness is intended to allow individuals to recognize information security
problems and incidents, and respond according to the needs of their work role.
866
8.2.3
867
The control objective and the contents from ISO/IEC 27002 clause 8.2.3 apply.
868
8.3 Termination or Change of Employment
869
870
Objective: To ensure that employees, contractors and third party users exit an organization or
change employment in an orderly manner.
871
872
873
Responsibilities should be in place to ensure an employee’s, contractor’s or third party user’s exit
from the organization is managed, and that the return of all equipment and the removal of all
access rights are completed.
874
875
876
Change of responsibilities and employments within an organization should be managed as the
termination of the respective responsibility or employment in line with this section, and any new
employments should be managed as described in section 8.1.
877
8.3.1
878
The control objective and the contents from ISO/IEC 27002 clause 8.3 .1 apply.
879
8.3.2
880
The control objective and the contents from ISO/IEC 27002 clause 8.3.2 apply.
881
8.3.3
882
Control
883
884
885
The access rights of all employees, contractors and third party users to information and
information processing facilities should be removed upon termination of their employment,
contract or agreement, or adjusted upon change.
886
Implementation guidance
887
888
889
890
891
892
893
894
895
Upon termination, the access rights of an individual to assets associ ated with information
systems and services should be reconsidered. This will determine whether it is necessary to
remove access rights. Changes of an employment should be reflected in removal of all access
rights that were not approved for the new employment. The access rights that should be removed
or adapted include physical and logical access, keys, identification cards, information processing
facilities (see also 11.2.4), subscriptions, and removal from any documentation that identifies
them as a current member of the organization. If a departing employee, contractor or third party
user has known passwords for accounts remaining active, these should be changed upon
termination or change of employment, contract or agreement.
896
897
898
Access rights for information assets and information processing facilities should be reduced or
removed before the employment terminates or changes, depending on the evaluation of risk
factors such as:
899
900
a) whether the termination or change is initiated by the employee, contractor or third party user,
or by management and the reason of termination;
Termination responsibilities
Return of assets
Removal of access rights
901
f)
the current responsibilities of the employee, contractor or any other user;
902
g) the value of the assets currently accessible.
903
904
IACS-specific implementation guidance
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
Disciplinary process
– 30 –
ISA99, WG02, TG02
905
906
Other risk factors to be considered when reducing or removing access rights should include risks
associated with disruption to IACS availability, plant protection, and plant operations.
907
Other Information
908
909
910
911
912
In certain circumstances access rights may be allocated on the basis of being available to more
people than the departing employee, contractor or third party user, e.g. group IDs. In such
circumstances, departing individuals should be removed from any group access lists and
arrangements should be made to advise all other employees, contractors and third party users
involved to no longer share this information with the person departing.
913
914
915
In cases of management-initiated termination, disgruntled employees, contractors or third party
users may deliberately corrupt information or sabotage information processing facilities. In cases
of persons resigning, they may be tempted to collect information for future use.
916
917
9
918
9.1
Physical and Environmental Security
Introduction
919
920
9.2 Secure Areas
921
9.2.1
922
{Requirement}
Requirement:
923
924
Foundational Requirement:
925
Rationale/Supplemental Guidance:
926
Requirement Enhancements:
927
928
9.3 Equipment Security
929
9.3.1
Physical Access Authorizations
930
Requirement:
931
932
933
934
935
The organization shall develop and keeps current a list of personnel with authorized
access to the facility where the IACS resides ( except for those areas within the facility
officially designated as publicly accessible) and issues assigns appropriate authorization
credentials. Designated officials within the organization review and approve the access
list and authorization credentials [Assignment: organization-defined frequency].
936
Foundational Requirement:
937
938
939
940
Rationale/Supplemental Guidance: Appropriate authorization credentials include, for
example, badges, identification cards, smart cards, key pads codes or biometric
attributes. The organization promptly removes from the access list personnel no longer
requiring access to the facility where the IACS resides.
941
Requirement Enhancements:
942
943
(1) Authorized access shall be adjusted for assignments in restricted areas or for
personnel dismissal.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
– 31 –
ISA‑62443-2-2, D1E4, April 2013
9.3.2
Physical Access Control
945
Requirement:
946
947
948
949
950
951
The organization shall control all physical access points (including designated entry/exit
points) to the facility where the IACS resides (except for those areas within the facility
officially designated as publicly accessible) and verifies individual access authorizations
before granting access to the facility. The organization controls access to areas officially
designated as publicly accessible, as appropriate, in accordance with the organization’s
assessment of risk.
952
Foundational Requirement:
953
954
955
956
957
958
959
960
961
962
963
964
Rationale/Supplemental Guidance: The organization uses physical access devices (e.g.,
keys, locks, combinations, card readers) and/or guards to control entry to facilities
containing IACS. The organization secures keys, combinations, and other access devices
and inventories those devices regularly. The organization changes combinations and
keys: (i) periodically; and (ii) when keys are lost, combinations are compromised, or
individuals are transferred or terminated. Workstations and associated peripherals
connected to (and part of) an organizational IACS may be located in areas designated as
publicly accessible with access to such devices being appropriately controlled. The
organization considers IACS safety and security interdependencies. The organization
considers access requirements in emergency situations. During an emergency-related
event, the organization may restrict access to IACS facilities and assets to authorized
individuals only.
965
Requirement Enhancements:
966
967
968
(1) The organization controls physical access to the IACS independent of the physical
access controls for the facility. Identity verification is required for entry to the most
secured IACS spaces.
969
970
971
972
973
974
975
976
977
978
Rationale/Supplemental Guidance: This requirement enhancement, in general, applies to
server rooms, communications centers, telecom munication spaces, control rooms,
instrument rack rooms, remote control rooms or any other areas within a facility containing
large concentrations of IACS components or components with a higher impact level than
that of the majority of the facility. The intent is to provide an additional layer of physical
security for those areas where the organization may be more vulnerable due to the
concentration of IACS components or the impact level of the components.
The
requirement enhancement is not intended to apply to workstations or peripheral devices
that are typically dispersed throughout the facility and used routinely by organizational
personnel.
979
FR1 Access Control
9.3.3 Access Control for Communication Medium
980
Requirement:
981
982
The organization shall control physical access to IACS distr ibution and communication
lines within local organizational facilities.
983
Foundational Requirement:
984
985
986
987
988
989
990
Rationale/Supplemental Guidance: Physical protections applied to IACS distribution and
communication lines help prevent accidental damage, disruption, and ph ysical tampering.
Additionally, physical protections are necessary to help prevent eavesdropping or in
transit modification of unencrypted communications. Protective measures to control
physical access to IACS distribution and communication lines include : (i) including
endpoints or any access point contained in locked wiring closets; (ii) disconnected or
locked spare jacks; and/or (iii) protection of cabling by conduit or cable trays.
991
Requirement Enhancements: None.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
944
ISA99, WG02, TG02
ISA‑62443-2-2, D1E4, April 2013
ISA99, WG02, TG02
9.3.4 Access Control for Display Medium
993
Requirement:
994
995
The organization shall control physical access to IACS devices that display information to
prevent unauthorized individuals from observing the display output.
996
Foundational Requirement:
997
Rationale/Supplemental Guidance: None.
998
Requirement Enhancements:
999
1000
1001
(1) Access displays shall be placed in such a manner to prevent others from viewing the
display of clear text access information.
9.3.5 Monitoring Physical Access
1002
Requirement:
1003
1004
The organization shall monitor physical access to the IACS to detect and respond to
physical security incidents.
1005
Foundational Requirement:
1006
1007
1008
1009
Rationale/Supplemental Guidance:
The organization reviews physical access logs
periodically and investigates apparent security violations or s uspicious physical access
activities. Response to detected physical security incidents is part of the organization’s
incident response capability.
1010
Requirement Enhancements:
1011
1012
(1) The organization monitors real-time physical intrusion alarms and surveillance
equipment.
1013
1014
(2) The organization employs automated mechanisms to r ecognize potential intrusions
and initiate appropriate response actions.
1015
9.3.6 Visitor Control
1016
Requirement:
1017
1018
1019
The organization shall control physical access to the IACS by authenticating visitors
before authorizing access to the facility where the IACS resides oth er than areas
designated as publicly accessible.
1020
Foundational Requirement:
1021
1022
Rationale/Supplemental Guidance:
Personnel without permanent authorization or
permanent duties, including physical access to an IACS, are considered a visitor.
1023
Requirement Enhancements:
1024
(1) The organization escorts visitors and monitors visitor activity.
1025
9.3.7 Access Records
1026
Requirement:
1027
1028
1029
1030
1031
1032
The organization shall maintain visitor access records to the facility where the IACS
resides (except for those areas within the facility officially designated as publicly
accessible).The detailed contents of these records are to be defined by the asset owner
and their respective security policy. Designated officials within the organization review
the visitor access records [Assignment: organization-defined frequency] and maintain
those records for [Assignment: organization-defined periodicity]. .
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
992
– 32 –
– 33 –
ISA99, WG02, TG02
1033
Foundational Requirement:
1034
1035
1036
1037
1038
Rationale/Supplemental Guidance:
These logs are intended to support forensic
investigation. Useful attributes would include: (i) name and organization of the person
visiting; (ii) signature of the visitor; (iii) form of identification; (iv) date of access; (v) time
of entry and departure; (vi) purpose of visit; and (vii) name and organization of person
visited..
1039
Requirement Enhancements:
1040
1041
(1) The organization employs automated mechanisms to facilitate the maintenance and
review of access records.
1042
1043
(2) The organization maintains a record of all physical access, both visitor and authorized
individuals.
1044
10 Communications and Operations Management
1045
10.1
Introduction
1046
1047
10.2 Operational Procedures and Responsibilities
1048
10.2.1 Automated Marking
1049
Requirement:
1050
1051
The IACS shall mark output using standard naming conventions to identify any special
dissemination, handling, or distribution instructions .
1052
Foundational Requirement:
1053
1054
Rationale/Supplemental Guidance: Automated marking refers to markings employed on
external media (e.g., hardcopy documents output from the IACS).
1055
Requirement Enhancements: None.
1056
10.3 Third Party Service Delivery Management
1057
10.3.1
1058
{Requirement}
Requirement:
1059
1060
Foundational Requirement:
1061
Rationale/Supplemental Guidance:
1062
Requirement Enhancements:
1063
1064
10.4 System planning and acceptance
1065
10.4.1
1066
{Requirement}
Requirement:
1067
1068
Foundational Requirement:
1069
Rationale/Supplemental Guidance:
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
ISA‑62443-2-2, D1E4, April 2013
1070
– 34 –
ISA99, WG02, TG02
Requirement Enhancements:
1071
1072
10.5 Protection against malicious and mobile code
1073
10.5.1 Malicious Code Protection
1075
1076
1077
Requirement:
The organization updates malicious code protection mechanisms (including the latest virus
definitions) whenever new releases are available in accordance with organizationa l
configuration management policy and procedures.
1078
Foundational Requirement:
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
Rationale/Supplemental Guidance: The organization considers using malicious code
protection software products from multiple vendors (e.g., using one vendor for boundary
devices and servers and another vendor for workstations). The organization also
considers the receipt of false positives during malicious code detection and eradication
and the resulting potential affect on the availability of the IACS. Updates are scheduled to
occur during planned IACS outages. The organization considers IACS vendor
recommendations for malicious code protection. To reduce malicious code, organizations
remove the functions and services that should not be employed on the IACS (e.g., Voice
Over Internet Protocol, Instant Messaging, File Transfer Protocol, Hyper Text Transfer
Protocol, electronic mail, file sharing).
1089
Requirement Enhancements: None.
1090
10.5.2 Security Alerts and Advisories
1091
1092
1093
Requirement:
The organization shall receive IACS security alerts/advisories on a regular basis, issues
alerts/advisories to appropriate personnel, and takes appropriate actions in response.
1094
Foundational Requirement:
1095
1096
1097
1098
1099
1100
Rationale/Supplemental Guidance: The organization documents the types of actions to
be taken in response to security alerts/advisories. The organization also maintains
contact with special interest groups (e.g., inform ation security forums) that: (i) facilitate
sharing of security-related information (e.g., threats, vulnerabilities, and latest security
technologies); (ii) provide access to advice from security professionals; and (iii) improve
knowledge of security best practices.
1101
Requirement Enhancements:
1102
1103
(1) The organization employs automated mechanisms to make security alert and advisory
information available throughout the organization as needed.
1104
10.6 Backup
1105
10.6.1
1106
{Requirement}
Requirement:
1107
1108
Foundational Requirement:
1109
Rationale/Supplemental Guidance:
1110
Requirement Enhancements:
1111
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1074
ISA‑62443-2-2, D1E4, April 2013
1112
10.7 Network Security Management
1113
10.7.1
1114
– 35 –
ISA99, WG02, TG02
{Requirement}
Requirement:
1116
Foundational Requirement:
1117
Rationale/Supplemental Guidance:
1118
Requirement Enhancements:
1119
1120
10.8 Media Handling
1121
10.8.1 Media Protection Policy and Procedures
1122
Requirement:
1123
1124
1125
1126
1127
The organization shall develop, disseminate, and periodically reviews/updates: (i) a
formal, documented, media protection policy that addresses purpose, scope, roles,
responsibilities, management commitment, coordination among organizational entities,
and compliance; and (ii) formal, documented procedures to facilitate the implementation
of the media protection policy and associated media protection requirements.
1128
Foundational Requirement:
1129
1130
1131
1132
1133
Rationale/Supplemental Guidance: The media protection policy and procedures are
consistent with applicable laws, directives, policies, regulations, standards, and guidance.
The media protection policy can be included as part of the general information security
policy for the organization. Media protection procedures can be developed for the
security program in general, and for a particular IACS, when required.
1134
Requirement Enhancements: None.
1135
1136
10.8.2 Media Access
1137
Requirement:
1138
The organization shall restrict access to IACS media to authorized individuals.
1139
Foundational Requirement:
1140
1141
1142
1143
1144
1145
Rationale/Supplemental Guidance:
IACS media includes both digital media (e.g.,
diskettes, magnetic tapes, external/removable hard drives, flash/thumb drives, compact
disks, digital video disks) and non-digital media (e.g., paper, microfilm). This requirement
also applies to portable and mobile computing and communications devices with
information storage capability (e.g., notebook computers, personal digital assistants,
cellular telephones).
1146
1147
1148
1149
1150
1151
1152
1153
1154
An organizational assessment of risk guides the sel ection of media and associated
information contained on that media requiring restricted access. Organizations document
in policy and procedures, the media requiring restricted access, individuals authorized to
access the media, and the specific measures t aken to restrict access. The rigor with
𝑡𝑎𝑟𝑔𝑒𝑡
which this requirement is applied is commensurate with the 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 categorization of the
information contained on the media. For example, fewer protection measures are needed
for media containing information determined by the organization to be in the public
domain, to be publicly releasable, or to have limited or no adverse impact on the
organization or individuals if accessed by other than authorized personnel. In these
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1115
– 36 –
ISA99, WG02, TG02
1155
1156
situations, it is assumed that the physical access requirements where the media resides
provide adequate protection.
1157
Requirement Enhancements:
1158
1159
(1) The organization employs automated mechanisms to restrict access to media storage
areas and to audit access attempts and access granted.
1160
1161
1162
1163
1164
1165
Foundational Requirement:
Rationale/Supplemental Guidance:
This requirement enhancement is primarily
applicable to designated media storage areas within an organization where a
significant volume of media is stored and is not intended to apply to every lo cation
where some media is stored (e.g., in individual offices).
1166
10.8.3 Media Labeling
1167
Requirement:
1168
1169
1170
1171
1172
The organization shall: (i) affix external labels to removable IACS media and IACS output
indicating the distribution limitations, handling caveats and applicable security markings (if
any) of the information; and (ii) exempt [Assignment: organization-defined list of media
types or hardware components] from labeling so long as they remain within [ Assignment:
organization-defined protected environment].
1173
Foundational Requirement:
1174
1175
1176
1177
1178
Rationale/Supplemental Guidance: An organizational assessment of
selection of media requiring labeling. Organizations document in policy
the media requiring labeling and the specific measures taken to afford
The rigor with which this requirement is applied is commensurate
categorization of the information contained on the media.
1179
Requirement Enhancements: None.
1180
risk guides the
and procedures,
such protection.
𝑡𝑎𝑟𝑔𝑒𝑡
with the 𝑆𝑠𝑦𝑠𝑡𝑒𝑚
10.8.4 Media Storage
1181
Requirement:
1182
1183
The organization shall physically control and securely store IACS media within controlled
areas.
1184
Foundational Requirement:
1185
1186
1187
1188
1189
1190
Rationale/Supplemental Guidance:
IACS media includes both digital media (e.g.,
diskettes, magnetic tapes, external/removable hard drives, flash/thumb drives, compact
disks, digital video disks) and non-digital media (e.g., paper, microfilm). A controlled area
is any area or space for which the organization has confidence that the physical and
procedural protections provided are sufficient to meet the requirements established for
protecting the information and/or IACS.
1191
1192
1193
This requirement applies to portable and mobile computing and communications devices
with information storage capability (e.g., notebook computers, personal digital assistants,
cellular telephones, telephone systems (voicemail only)).
1194
1195
1196
1197
1198
1199
1200
Organizations document in policy and procedures, the media requiring physical protection
and the specific measures taken to afford such protection. The rigor with which this
𝑡𝑎𝑟𝑔𝑒𝑡
requirement is applied is commensurate with the 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 categorization of the information
contained on the media. For example, fewer protection measures are needed for media
containing information determined by the organization to have limited or no adverse
impact on the organization or individuals if accessed by non -authorized personnel. The
assumption is that the physical access controls to the facility where the media resides
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
– 37 –
ISA99, WG02, TG02
1201
1202
1203
provide adequate protection. The organization protects IACS media identified by the
organization until the media are destroyed or sanitized using approved equipment,
techniques, and procedures.
1204
1205
1206
1207
1208
As part of a defense-in-depth protection strategy, the organization considers routinely
encrypting data at rest on selected secondary storage device s. The organization
implements effective cryptographic key management in support of secondary storage
encryption and provides protections to maintain the availability of the information in the
event of the loss of cryptographic keys by IACS users.
1209
Requirement Enhancements: None.
1210
10.8.5 Media Transport
1211
Requirement:
1212
1213
1214
The organization shall protect and control IACS media during transport outside of
controlled areas and restricts the activities associated with transport of such media to
authorized personnel.
1215
Foundational Requirement:
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
Rationale/Supplemental Guidance:
IACS media includes both digital media (e.g.,
diskettes, tapes, removable hard drives, flash/thumb drives, compact disks, digital video
disks) and non-digital media (e.g., paper, microfilm). A c ontrolled area is any area or
space for which the organization has confidence that the physical and procedural
protections provided are sufficient to meet the requirements established for protecting the
information and/or IACS. This requirement also applies to portable and mobile computing
and communications devices with information storage capability (e.g., notebook
computers, personal digital assistants, cellular telephones) that are transported outside of
controlled areas. Telephone systems are also co nsidered IACS and may have the
capability to store information on internal media (e.g., on voicemail systems). Since
telephone systems do not have, in most cases, the identification, authentication, and
access control mechanisms typically employed in othe r IACS, organizational personnel
exercise extreme caution in the types of information stored on telephone voicemail
systems that are transported outside of controlled areas. An organizational assessment
of risk guides the selection of media and associated information contained on that media
requiring protection during transport. Organizations document in policy and procedures,
the media requiring protection during transport and the specific measures taken to protect
such transported media.
The rigor with which this requirement is applied is
𝑡𝑎𝑟𝑔𝑒𝑡
commensurate with the 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 categorization of the information contained on the media.
An organizational assessment of risk also guides the selection and use of appropriate
storage containers for transporting non-digital media. Authorized transport and courier
personnel may include individuals from outside the organization (e.g., U.S. Postal Service
or a commercial transport or delivery service).
1239
Requirement Enhancements:
1240
1241
1242
(1) The organization protects digital and non-digital media during transport outside of
controlled areas using [Assignment: organization-defined security measures, e.g.,
locked container, cryptography].
1243
1244
1245
1246
1247
1248
Rationale/Supplemental Guidance: Physical and technical security measures for the
protection of digital and non-digital media are approved by the organization,
𝑡𝑎𝑟𝑔𝑒𝑡
commensurate with the 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 categorization of the information residing on the media,
and consistent with applicable laws, directives, policies, regulations, standards, and
guidance. Cryptographic mechanisms can provide confidentiality and/or integrity
protections depending upon the mechanisms used.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
– 38 –
ISA99, WG02, TG02
1249
1250
(2) The organization documents, where appropriate, activities associated with the
transport of IACS media using [Assignment: organization-defined system of records].
1251
1252
1253
Rationale/Supplemental Guidance:
Organizations establish documentation
requirements for activities associated with the transport of IACS media in accordance
with the organizational assessment of risk.
1254
(3) The organization employs an identified custodian at all times to transport IACS media.
1255
1256
1257
Rationale/Supplemental Guidance:
Organizations establish documentation
requirements for activities associated with the transport of IACS media in accordance
with the organizational assessment of risk.
1258
10.8.6 Media Sanitization and Disposal
1259
Requirement:
1260
1261
The organization shall sanitize IACS media, both digital and non-digital, prior to disposal
or release for reuse.
1262
Foundational Requirement:
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
Rationale/Supplemental Guidance:
Sanitization is the process used to remove
information from IACS media such that there is reasonable assurance, in proporti on to the
confidentiality of the information, that the information cannot be retrieved or
reconstructed. Sanitization techniques, including clearing, purging, and destroying media
information, prevent the disclosure of organizational information to unauth orized
individuals when such media is reused or disposed. The organization uses its discretion
on sanitization techniques and procedures for media containing information deemed to be
in the public domain or publicly releasable, or deemed to have no advers e impact on the
organization or individuals if released for reuse or disposed. The National Security
Agency provides media sanitization guidance and maintains a listing of approved
sanitization products at http://www.nsa.gov/ia/government/mdg.cfm .
1274
Requirement Enhancements:
1275
1276
(1) The organization tracks, documents, and verifies media sanitization and disposal
actions.
1277
1278
(2) The organization periodically tests sanitization equipment and procedures to verify
correct performance.
1279
10.8.7 Access Control for Display Medium
1280
Requirement:
1281
1282
The organization shall control physical access to IACS devices that display information to
prevent unauthorized individuals from observing the display output.
1283
Foundational Requirement:
1284
Rationale/Supplemental Guidance: None.
1285
1286
1287
Requirement Enhancements: None.
1288
10.8.8 Public Key Infrastructure Certificates
1289
Requirement:
1290
1291
Where public key cryptography is utilized, the organization shall determine what
appropriate interfaces are required with existing public key infrastructure under an
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
– 39 –
ISA99, WG02, TG02
1292
1293
appropriate certificate policy or obtains public key certificates under an appropriate
certificate policy from an approved service provider.
1294
Foundational Requirement:
1295
1296
1297
1298
Rationale/Supplemental Guidance: Registration to receive a public key certificate needs
to include authorization by a supervisor or a responsible official and needs to be
accomplished using a secure process that verifies the identity of the certificate holder and
ensures that the certificate is issued to the intended party.
1299
Requirement Enhancements: None.
1300
10.9 Exchange of Information
1301
10.9.1
1302
{Requirement}
Requirement:
1303
1304
Foundational Requirement:
1305
Rationale/Supplemental Guidance:
1306
Requirement Enhancements:
1307
1308
10.10 Electronic Commerce Services
1309
10.10.1 {Requirement}
1310
Requirement:
1311
1312
Foundational Requirement:
1313
Rationale/Supplemental Guidance:
1314
Requirement Enhancements:
1315
1316
10.11 Monitoring
1317
10.11.1 Audit and Accountability Policy and Procedures
1318
Requirement:
1319
1320
1321
1322
1323
The organization shall develop, disseminate, and periodically reviews/updates: (i) a
formal, documented, audit and accountability policy that addresses purpos e, scope, roles,
responsibilities, management commitment, coordination among organizational entities,
and compliance; and (ii) formal, documented procedures to facilitate the implementation
of the audit and accountability policy and associated audit and ac countability controls.
1324
Foundational Requirement:
1325
1326
1327
1328
1329
1330
Rationale/Supplemental Guidance: The audit and accountability policy and procedures
are consistent with applicable laws, directives, policies, regulations, standards, and
guidance. The audit and accountability policy can be included as part of the general
information security policy for the organization. Audit and accountability procedures can
be developed for the security program in general, and for a particular IACS, when
required. The parameters to be monitored are a local matter. Of those parameters it is
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
ISA‑62443-2-2, D1E4, April 2013
– 40 –
ISA99, WG02, TG02
1331
1332
strongly recommended to consider false-positives (e.g. how many times did an authorized
entity get hindered or prevented from performing its function ).
1333
Requirement Enhancements: None.
1335
1336
1337
10.11.2 Auditable Events
Requirement:
The organization periodically reviews and updates the list of orga nization-defined auditable
events.
1338
Foundational Requirement:
1339
1340
1341
1342
1343
1344
1345
Rationale/Supplemental Guidance:
The purpose of this requirement is to identify
important events which need to be audited as significant and relevant to the security of
the IACS. The security audit function is usually coordinated with the network health and
status monitoring function which may be in a different zone. Commonly recognized and
accepted checklists and configuration guides should be considered when compiling a list
of auditable events. The organization defines auditable events that are adequate to
support after-the-fact investigations of security incidents.
1346
Requirement Enhancements: None.
1347
10.11.3 Audit Monitoring, Analysis and Reporting
1348
Requirement:
1349
1350
1351
The organization shall regularly review/analyze IACS audit records for indications of
inappropriate or unusual activity, investigates suspicious activity or suspected violations,
reports findings to appropriate officials, and takes necessary actions.
1352
Foundational Requirement:
1353
1354
1355
1356
Rationale/Supplemental Guidance: Organizations increase the level of audit monitoring
and analysis activity within the IACS whenever there is an indication of increased risk to
organizational operations, organizational assets, or individuals based on law enforcement
information, intelligence information, or other credible sources of information.
1357
Requirement Enhancements:
1358
1359
1360
(1) The organization employs automated mechanisms to integrate audit monitoring,
analysis, and reporting into an overall process for investigation and res ponse to
suspicious activities.
1361
1362
1363
1364
(2) The organization employs automated mechanisms to alert security personnel of the
following inappropriate or unusual activities with security implications: [ Assignment:
organization-defined list of inappropriate or unusual ac tivities that are to result in
alerts].
1365
10.11.4 Audit Record Retention
1366
Requirement:
1367
1368
1369
The organization shall retain audit records for [Assignment: organization-defined time
period] to provide support for after-the-fact investigations of security incidents and to meet
regulatory and organizational information retention requirements.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1334
– 41 –
ISA99, WG02, TG02
1370
Foundational Requirement:
1371
1372
1373
Rationale/Supplemental Guidance: The organization retains audit records until it is
determined that they are no longer needed for administrative, legal, audit , or other
operational purposes.
1374
Requirement Enhancements: None.
1375
11 Access Control
1376
11.1
Introduction
1377
1378
11.2 Business Requirement
1379
11.2.1 Access Control Policy and Procedures
1380
Requirement:
1381
1382
1383
1384
1385
The organization shall develop, disseminate, and periodically reviews/updates: (i) a
formal, documented, access control policy that addresses purpose, scope, roles,
responsibilities, management commitment, coordination among organizational entities,
and compliance; and (ii) formal, documented procedures to facilitate the implementation
of the access control policy and associated access controls.
1386
Foundational Requirement:
1387
1388
1389
1390
1391
1392
Rationale/Supplemental Guidance:
The access control policy and procedures are
consistent with applicable laws, directives, policies, regulations, standards, and guidance
and in alignment with the security requirements of the IACS(s). The access control policy
can be included as part of the general information security policy for the organization.
Access control procedures can be developed for the security program in gener al, and for
a particular IACS, when required.
1393
Requirement Enhancements: None.
1394
11.2.2 System and Information Integrity Policy and Procedures
1395
Requirement:
1396
1397
1398
1399
1400
1401
The organization shall develop, disseminate, and periodically reviews/updates: (i) a
formal, documented, system and information integrity policy that addresses purpose,
scope, roles, responsibilities, management commitment, coordination among
organizational entities, and compliance; and (ii) formal, documented procedures to
facilitate the implementation of the s ystem and information integrity policy and associated
system and information integrity requirements.
1402
Foundational Requirement:
1403
1404
1405
1406
1407
1408
Rationale/Supplemental Guidance: The system and information integrity policy and
procedures are consistent with applicable laws, directives, policies, regulations,
standards, and guidance. The system and information integrity policy can be included as
part of the general information security policy for the organization.
System and
information integrity procedures can be developed for the security program in general,
and for a particular IACS, when required.
1409
Requirement Enhancements: None.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
ISA‑62443-2-2, D1E4, April 2013
ISA99, WG02, TG02
11.2.3 Flaw Remediation
1411
Requirement:
1412
The organization shall identify, report, and correct IACS flaws.
1413
Foundational Requirement:
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
Rationale/Supplemental Guidance: The organization identifies IACS containing software
affected by recently announced software flaws (and potential vulnerabilities resulting from
those flaws). The organization (or the software developer/vendor in the case of software
developed and maintained by a vendor/contractor) promptly installs newly released
security relevant patches, service packs, and hot fixes, and tests patches, service packs,
and hot fixes for effectiveness and potential side effects on the organization’s IACS before
installation.
Flaws discovered during security assessments, continuous monitoring,
incident response activities, or IACS error handling are also addressed expeditiously.
Flaw remediation is incorporated into configuration management as an emergency
change. The flaw remediation process shall be consistent with certification, safety and
regulatory testing requirements.
1425
Requirement Enhancements:
1426
1427
(1) The organization centrally manages the flaw remediation process and installs updates
automatically.
1428
1429
1430
(2) The organization employs automated mechanisms to periodically and upon demand
determine the state of IACS components with regard to flaw remediation.
1431
11.3 User Access Management
1432
11.3.1 Account Management
1433
Foundational Requirement:
1434
Requirement:
1435
1436
The organization reviews accounts [Assignment: organization-defined frequency, at least
annually]. A history of account changes shall be maintained if only manually.
1437
Foundational Requirement:
1438
1439
1440
1441
1442
1443
1444
Rationale/Supplemental Guidance: Account management might include (i.e., individual,
role, and system, device-based, and system), establishment of conditions for group
membership, and assignment of associated authorizations. In certain IACS instances,
where the organization has determined that individual accounts are unnecessary from a
risk-analysis and/or regulatory aspect, shared accounts are acceptable as long as
adequate compensating controls (such as limited physical access) are in place and
documented.
1445
1446
1447
Non-user accounts (sometimes termed service accounts) that are utilized for process -toprocess communication (for example, an HMI connecting to a database) typically requires
different security policies from human user accounts.
1448
1449
The organization identifies authorized users of the IACS and specifies access
rights/privileges. The organization grants access to the IACS based on:
1450
1451
(i)
a valid need-to-know/need-to-share that is determined by assigned
official duties and satisfying all functional and security criteria; and
1452
1453
(ii)
Intended system usage. The organization requires proper identification
for requests to establish accounts and approves all such requests.
1454
1455
(iii)
The organization specifically authorizes and monitors the use of
guest/anonymous accounts and removes, disables, or otherwise secures
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1410
– 42 –
ISA‑62443-2-2, D1E4, April 2013
ISA99, WG02, TG02
unnecessary accounts. Account managers are notified when IACS
users are terminated or transferred and associated accounts are
removed, disabled, or otherwise secured.
1459
1460
1461
1462
1463
(iv)
Account managers are also notified when users’ IACS usage or need -toknow/need-to-share changes. In cases where accounts are role-based,
i.e., the workstation, hardware, and/or field devices define a user role,
access to the IACS includes physical security policies and procedures
based on organization risk assessment.
1464
1465
1466
1467
1468
1469
(v)
In cases where physical access to the workstation, hardware, and/or
field devices predefine privileges, the organization implements physical
security policies, and procedures based on organization risk
assessment. Account management may include additional account types
(e.g., role-based, device-based, attribute-based). The organization
removes, changes, disables, or otherwise secures default accounts.
1470
Requirement Enhancements:
1471
1472
1473
(1) The organization has policies and procedures to terminate guest or temporary
accounts after [Assignment: organization-defined time period for each type of
account].
1474
1475
(2) The organization has policies and procedures to disable inactive accounts after
[Assignment: organization-defined time period].
1476
1477
(3) The organization employs mechanisms to audit account creation, Modification,
disabling, and termination actions and to notify, as required, appropriate individuals.
1478
11.3.2 Separation of Duties
1479
Foundational Requirement:
1480
Requirement:
1481
1482
When assigning permissions and/or roles to users, the organization shall obey the
separation of duties as outlined in their security policy.
1483
Foundational Requirement:
1484
1485
1486
Rationale/Supplemental Guidance: The organization establishes appropriate divisions of
responsibility and separates duties as needed to eliminate conflicts of interest in the
responsibilities and duties of individuals. Examples of separation of duties incl ude:
1487
1488
(i)
mission functions and distinct IACS support functions are divided among
different individuals/roles
1489
1490
1491
(ii)
different individuals perform IACS support functions (e.g., system
management,
systems programming,
quality assurance/testing,
configuration management, and network security)
1492
1493
(iii)
security personnel who administer access control functions do not
administer audit functions
1494
1495
Requirement Enhancements: None.
(4)
1496
11.4 User Responsibilities
1497
11.4.1
1498
{Requirement}
Requirement:
1499
1500
Foundational Requirement:
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1456
1457
1458
– 43 –
ISA‑62443-2-2, D1E4, April 2013
1501
Rationale/Supplemental Guidance:
1502
Requirement Enhancements:
– 44 –
ISA99, WG02, TG02
1504
11.5 Network Access Control
1505
11.5.1 Least Privilege
1506
Foundational Requirement:
1507
Requirement:
1508
1509
1510
The organization shall enforce set of rights/privileges or accesses as required by ISA 99.02.xx needed by asset owner (or processes acting on behalf of asset owners) for the
performance of specified tasks.
1511
Foundational Requirement:
1512
1513
1514
1515
Rationale/Supplemental Guidance:
The organization employs the concept of least
privilege for specific duties and IACS (zones and conduits) in accordance with risk
assessments as necessary to adequately mitigate risk to organizational operations,
organizational assets, and individuals.
1516
Requirement Enhancements: None.
1517
11.5.2 Permitted Actions Without Identification or Authentication
1518
Foundational Requirement:
1519
Requirement:
1520
1521
1522
The organization shall identify and document (log) specific IACS user actions that can be
performed on the IACS without additional identification or authentication, if and only if
prior identification and authentication have already occurred.
1523
Foundational Requirement:
1524
1525
1526
Rationale/Supplemental Guidance: The organization may allow limited IACS user activity
without identification and authentication for corrective actions (e.g., emergency). The
intent is to prevent repeated unnecessary identification and/or authe ntication.
1527
Requirement Enhancements:
1528
1529
(1) The organization permits actions to be performed without identification and
authentication only to the extent necessary to accomplish mission objectives.
1530
1531
11.5.3 Remote Access
1532
Foundational Requirement:
1533
Requirement:
1534
The organization shall authorize all methods of remote access to the IACS.
1535
Foundational Requirement:
1536
1537
1538
1539
1540
Rationale/Supplemental Guidance: Remote access is any access to an IACS by an IACS
user (human user, process, or device) communicating through an external, no norganization-controlled network (e.g., the Internet). Examples of remote access methods
include dial-up, broadband, and wireless. Remote access to IACS component locations
(e.g., control center, field locations) is only enabled when approved by the org anization.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1503
ISA‑62443-2-2, D1E4, April 2013
– 45 –
ISA99, WG02, TG02
1541
Requirement Enhancements:
1542
1543
(1) The organization controls all remote accesses through a limited number of managed
access control points.
1544
1545
1546
(2) The organization permits remote access for privileged functions only for compelling
operational needs and documents the rationale for such access in the security plan for
the IACS.
11.5.4 Use of External Information Systems
1548
Foundational Requirement:
1549
Requirement:
1550
1551
1552
The organization shall establish terms and conditions for authorized individuals to: (i)
access the IACS from an external information system; and (ii) process, store, and/or
transmit organization-controlled information using an external information system.
1553
Foundational Requirement:
1554
1555
1556
1557
1558
1559
1560
1561
Rationale/Supplemental Guidance: External information systems are information systems
or components of information systems that are outside of the accreditation boundary
established by the organization and for which the organization typically has no direct
control over the application of required security controls or the assessment of secu rity
control effectiveness. External information systems include, but are not limited to,
personally owned information systems (e.g., computers, cellular telephones, or personal
digital assistants); privately owned computing and communications devices res ident in
commercial or public facilities (e.g., hotels, convention centers, or airports).
1562
1563
1564
1565
1566
1567
1568
1569
Authorized individuals include organizational personnel, contractors, or any other
individuals with authorized access to the organizational IACS.
The organization
establishes terms and conditions for the use of external information systems in
accordance with organizational security policies and procedures.
The terms and
conditions address as a minimum; (i) the types of applications that can be accessed on
the organizational IACS from the external information system; and (ii) the maximum
𝑐𝑎𝑝𝑎𝑏𝑙𝑒
𝑆𝑠𝑦𝑠𝑡𝑒𝑚 category of information that can be transmitted to or processed and stored on the
external information system.
1570
Requirement Enhancements:
1571
1572
1573
1574
1575
1576
1577
(1) The organization prohibits authorized individuals from using an external information
system to access the IACS or to process, store, or transmit organization -controlled
information except in situations where the organization: (i) can verify the employment
of required security controls on the external system as specified in the organization’s
information security policy and system security plan; or (ii) has approved IACS
connection or processing agreements with the organizational entity hosting the
external information system.
1578
1579
(2) The organization provides a domain of filtered control for access by external IACS
users, and limits access only to this domain.
1580
1581
(3) The organization provides a separate domain of information for read -only or
download-only access by external IACS users and limits access only to this domain.
1582
11.6 Operating System Access Control
1583
11.6.1
1584
{Requirement}
Requirement:
1585
1586
Foundational Requirement:
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1547
ISA‑62443-2-2, D1E4, April 2013
1587
Rationale/Supplemental Guidance:
1588
Requirement Enhancements:
– 46 –
ISA99, WG02, TG02
1589
1590
11.7 Application and Information Access Control
1591
11.7.1
Requirement:
1593
1594
Foundational Requirement:
1595
Rationale/Supplemental Guidance:
1596
Requirement Enhancements:
1597
1598
11.8 Mobile Computing and Teleworking
1599
11.8.1 Wireless Access Restrictions
1600
Foundational Requirement:
1601
Requirement:
1602
The organization shall produce implementation guidance for wireless technologies.
1603
1604
1605
1606
1607
1608
Foundational Requirement:
Rationale/Supplemental Guidance: Wireless technologies include, but are not limited to,
microwave, satellite, packet radio [UHF/VHF], 802.11x, 802.15.4 (ZigBee, WirelessHART,
ISA100.11a), and Bluetooth.
1609
1610
(1) The organization shall deploy continuous passive monitoring for unauthorized wireless
access points and takes appropriate action if such access points are discovered.
1611
1612
1613
1614
1615
1616
1617
Foundational Requirement:
Rationale/Supplemental Guidance: At the time of publication of this document, these
access points are typically based on 802.11x technology. In the future, this will
change and thus other wireless technologies will need to be monitored as well.
Regardless, organizations should conduct a thorough scan for unauthorized wireless
access points in facilities containing high-impact IACS. The scan should involve the
entire facility, not just areas containing a high -impact IACS.
1618
Requirement Enhancements:
11.8.2 Use Control for Portable and Mobile Devices
1619
Foundational Requirement:
1620
Requirement:
1621
1622
The organization shall produce implementation guidance for organization -controlled
portable and mobile devices.
1623
Foundational Requirement:
1624
1625
1626
Rationale/Supplemental Guidance: Portable and mobile devices may introduce undesired
network traffic, malware and/or information exposure, and thus there should be specific
control associated with their usage in the typical IACS environment.
1627
1628
Portable and mobile devices (e.g., notebook c omputers, personal digital assistants,
cellular telephones, and other computing and communications devices with network
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1592
{Requirement}
– 47 –
ISA99, WG02, TG02
1629
1630
1631
1632
1633
1634
1635
connectivity are only allowed access to the IACS in accordance with organizational
security policies and procedures. Security policies and procedures include device
identification and authentication, implementation of mandatory protective software (e.g.,
malicious code detection, firewall), configuration management, scanning devices for
malicious code, updating virus protection software, scanning for critical software updates
and patches, conducting primary operating system (and possibly other resident software)
integrity checks, and disabling unnecessary hardware (e.g., wireless, infrared).
1636
1637
Requirement Enhancements: None.
1638
11.8.3 Mobile Code
1639
Foundational Requirement:
1640
Requirement:
1641
1642
The organization shall produce implementation guidance regarding the use of mobile code
technologies based on the potential to cause damage to the IACS.
1643
Foundational Requirement:
1644
1645
1646
1647
1648
1649
1650
1651
Rationale/Supplemental Guidance: Mobile code technologies include, for example, Java,
JavaScript, ActiveX, PDF, Postscript, Shockwave movies, Flash animations, and
VBScript. Usage restrictions and implementation guidance apply to both the selection and
use of mobile code installed on servers and mobile code downloaded and executed on
individual workstations. Control procedures prevent the development, acquisition, or
introduction of unacceptable mobile code within the IACS. For example, mobile code
exchanges might be disallowed directly with the IACS, but rather in a controlled adjacent
information environment maintained by IACS personnel.
1652
Requirement Enhancements: None.
1653
11.8.4 Supervision and Review – Use Control
1654
Foundational Requirement:
1655
Requirement:
1656
1657
The organization shall supervise and review the activities of IACS users with respect to
the enforcement and usage of IACS assets.
1658
Foundational Requirement:
1659
1660
1661
1662
1663
1664
1665
1666
1667
Rationale/Supplemental Guidance: The organization reviews audit records (e.g., user
activity logs) for inappropriate activities in accordance wit h organizational procedures.
The organization investigates any unusual IACS -related activities and periodically reviews
changes to access authorizations. The organization reviews more frequently the activities
of IACS users with significant IACS roles and responsibilities. The extent of the audit
record reviews is based on the impact level of the IACS. For example, for low -impact
systems, it is not intended that security logs be reviewed frequently for every workstation,
but rather at central points such as a web proxy or email servers and when specific
circumstances warrant review of other audit records.
1668
1669
1670
1671
Requirement Enhancements:
(1) The organization develops a baseline of normal IACS user behavior, allowable
variances and employs automated mechanisms to facilitate the review of user
activities.
1672
1673
11.8.5 Identification and Authentication Policy and Procedures
Foundational Requirement:
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
– 48 –
ISA99, WG02, TG02
1674
Requirement:
1675
1676
1677
1678
1679
1680
The organization shall develop, disseminate, and periodically review/update: (i) a formal,
documented, identification and authentication policy that addresses purpose, scope, roles,
responsibilities, management commitment, coordination among organizational entities,
and compliance; and (ii) formal, documented procedures to facilitate the implementation
of the identification and authentication policy and associated identification and
authentication controls for IACS.
1681
Foundational Requirement:
1682
1683
1684
1685
1686
1687
Rationale/Supplemental Guidance:
The organization ensures the identification and
authentication policy and procedures are consistent with applicable laws, directives,
policies, regulations, standards, and guidance. The identification and authentication policy
can be included as part of the general security policy for the organization. Identification
and authentication procedures can be developed for the security program in general, and
for a particular IACS, when required.
1688
1689
Requirement Enhancements: None.
1690
11.8.6 Identifier Management
1691
Foundational Requirement:
1692
Requirement:
1693
1694
1695
1696
The organization shall manage identifiers by user, group, role, and/or system interface. An
appropriate organization official or group is responsible for authorizing the issuance of
user identifiers, issuing the user identifier to the intended party, and archiving user
identifiers.
1697
Foundational Requirement:
1698
1699
1700
1701
1702
1703
1704
1705
Rationale/Supplemental Guidance: Identifiers are distinguished from the privileges which
they permit an entity to perform within a specific IACS control domain/zone (see also 2.6,
Authenticator Management). Where users function as a single group (e.g., control room
operators), user identification may be role-based, group-based, or device-based. For
some IACS, the capability for immediate operator interaction is critical. Local emergency
actions for the IACS must not be hampered by identification requirements. Access to
these systems may be restricted by appropriate compensating security mechanism s.
Identifiers may be required on portions of the IACS but not necessarily the entire system.
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
For very high SAL level IACS the requirement for maximum control is increased, not
decreased. Security measures that have the potential to cause loss of control in process
operations are not acceptable. In these cases, to maintain the higher SAL levels,
compensating measures external to the IACS (e.g. additional physical security measure s
and/or enhanced personnel background checks) will be needed. In these cases, it may be
possible to see a normally high SAL level IACS at a lower SAL 1 or 2 rating, depending
upon the compensating controls. Lockout or loss of control due to security mea sures is
not acceptable in high availability IACS.
1716
1717
1718
(1) The organization shall verify the identity of each IACS user. This verification may
be maintained separately from the IACS (such as by the appropriate HR group).
1719
1720
Requirement Enhancements:
11.8.7 Authenticator Management
Foundational Requirement:
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
ISA‑62443-2-2, D1E4, April 2013
1722
1723
ISA99, WG02, TG02
Requirement:
The organization shall establish administrative procedures for initial authenticator distribution, for
lost/compromised, or damaged authenticators, and for revoking authenticators.
1724
Foundational Requirement:
1725
1726
1727
1728
1729
1730
1731
Rationale/Supplemental Guidance: IACS authenticators include, for example, tokens,
Public Key certificates, biometrics, passwords, physical keys, and key cards. IACS users
should take reasonable measures to safeguard authenticators including maintainin g
possession of their individual authenticators, not loaning or sharing authenticators with
others, and reporting lost or compromised authenticators immediately. In the case of a
process or device, such users should also take measures to protect their IAC S
authenticators.
1732
1733
1734
1735
1736
1737
If the IACS is required to have a high level of availability, measures must be taken to
maintain this high level of availability (e.g. compensating physical controls, duplicate
keys, supervisory override). Lockout or loss of control due to security measures is not
acceptable.
1738
1739
1740
1741
Requirement Enhancements: None.
11.8.8 Software and Information Integrity
Requirement:
The organization reassesses the integrity of software and information by performing [ Assignment:
organization-defined frequency] integrity scans of the system.
1742
Foundational Requirement:
1743
1744
1745
1746
1747
Rationale/Supplemental Guidance: This requirement complements related Access Control
requirements. Access Control involves enforcing the roles, permissions, and use patterns
as designed. Integrity verification methods are employed to detect, record, report, and
protect against the effects of software and information tampering that may occur if other
protection mechanisms (e.g. Access Control) have been circumvented.
1748
Requirement Enhancements: None.
1749
1750
11.8.9 Information Input Restrictions
1751
Requirement:
1752
1753
1754
Restrictions on entities authorized to input information to the IACS may extend beyond the
typical access controls employed by the system and include limitations based on specific
operational/project responsibilities.
1755
Foundational Requirement:
1756
Rationale/Supplemental Guidance: None.
1757
Requirement Enhancements: None.
1758
11.8.10 Error Handling
1759
Requirement:
1760
1761
The extent to which the IACS identifies and handles error conditions shall be guided by
organizational policy and operational requirements.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1721
– 49 –
ISA‑62443-2-2, D1E4, April 2013
– 50 –
1762
Foundational Requirement:
1763
Rationale/Supplemental Guidance: None.
1764
Requirement Enhancements: None.
ISA99, WG02, TG02
1765
11.8.11 Information Output Handling and Retention
1767
Requirement:
1768
1769
The organization shall handle and retain output from the IACS in accordance with
applicable laws, directives, policies, regulations, standards, and operational requirements.
1770
Foundational Requirement:
1771
Rationale/Supplemental Guidance: None.
1772
Requirement Enhancements: None.
1773
11.8.12 Boundary Protection
1774
Requirement:
1775
1776
1777
The organization carefully considers the intrinsically shared nature of commercial
telecommunications services in the implementation of security controls associated with
the use of such services.
1778
Foundational Requirement:
1779
1780
1781
1782
1783
1784
1785
Rationale/Supplemental Guidance:
Commercial telecommunications services are
commonly based on network components and consolidated management systems shared
by all attached commercial customers, and may include third party provided access lines
and other service elements. Consequently, such interconnecting communication services
may represent sources of increased risk despite contract security provisions. Therefore,
when this situation occurs, the organization either implements appropriate compensating
security controls or explicitly accepts the additional risk.
1786
Requirement Enhancements:
1787
1788
1789
1790
(1) The organization implements a managed interface (boundary protection devices in an
effective security architecture) with any external telecommunication service,
implementing controls appropriate to the required protection of the confidentiality and
integrity of the information being transmitted.
1791
1792
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1766
ISA‑62443-2-2, D1E4, April 2013
– 51 –
1793
12 Systems acquisition, development and maintenance
1794
12.1
ISA99, WG02, TG02
Introduction
1795
1796
12.2 Security requirements of information systems
1797
12.2.1
Requirement:
1799
1800
Foundational Requirement:
1801
Rationale/Supplemental Guidance:
1802
Requirement Enhancements:
1803
1804
12.3 Correct Processing in Applications
1805
12.3.1
1806
{Requirement}
Requirement:
1807
1808
Foundational Requirement:
1809
Rationale/Supplemental Guidance:
1810
Requirement Enhancements:
1811
1812
12.4 Cryptographic Controls
1813
12.4.1 Cryptographic Module Validation
1814
1815
1816
1817
Requirement:
If cryptography is required, the IACS shall employ validated cryptographic modules that
applicable laws, directives, policies, regulations, standards, and guidance for
authentication to a cryptographic module ma y require.
1818
Foundational Requirement:
1819
1820
1821
1822
1823
Rationale/Supplemental Guidance: The use of cryptography is determined after careful
consideration of the security needs and the potential ramifications on system
performance. The procurement process most effective safeguard is to use a cryptographic
module validated by a recognized 3 rd party authority, e.g. the Cryptographic Module
Validation Program.
1824
Requirement Enhancements: None.
1825
1826
12.5 Security of System Files
1827
12.5.1
1828
1829
{Requirement}
Requirement:
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1798
{Requirement}
ISA‑62443-2-2, D1E4, April 2013
1830
Foundational Requirement:
1831
Rationale/Supplemental Guidance:
1832
Requirement Enhancements:
– 52 –
ISA99, WG02, TG02
1833
1834
12.6 Security in development and support processes
1835
12.6.1
Requirement:
1837
1838
Foundational Requirement:
1839
Rationale/Supplemental Guidance:
1840
Requirement Enhancements:
1841
1842
12.7 Technical vulnerability management
1843
12.7.1 Configuration Management Policy and Procedures
1844
Requirement:
1845
1846
1847
1848
1849
1850
The organization shall develop, disseminate, and periodically review/update: (i) a formal,
documented, configuration management policy that addresses purpose, scope, roles,
responsibilities, management commitment, coordination among organizational entities,
and compliance; and (ii) formal, documented procedures to facilitate the implementation
of the configuration management policy and associated configuration management
controls.
1851
Foundational Requirement:
1852
1853
1854
1855
1856
1857
Rationale/Supplemental Guidance: The configuration management policy and procedures
are consistent with applicable laws, directives, policies, regulations, standards, and
guidance. The configuration management policy can be included as part of the general
information security policy for the organization. Co nfiguration management procedures
can be developed for the security program in general, and for a particular IACS, when
required.
1858
1859
Requirement Enhancements: None.
1860
1861
1862
1863
12.7.2 Baseline Configuration
Requirement:
The organization shall develop, document, and maintain a current baseline configuration of the
IACS.
1864
Foundational Requirement:
1865
1866
1867
1868
1869
Rationale/Supplemental Guidance: This requirement establishes a baseline configuration
for the IACS.
The baseline configuration provides information about a particular
component’s makeup (e.g., the standard software load for a workstation or notebook
computer including updated patch information) and the component’s logical placement
within the IACS architecture. The baseline configuration also provides the organization
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
1836
{Requirement}
– 53 –
ISA99, WG02, TG02
1870
1871
with a well-defined and documented specification to which the IACS is built and
deviations, if required, are documented in support of mission needs/ objectives.
1872
Requirement Enhancements:
1873
1874
(1) The organization updates the baseline configuration of the IACS as an integral part of
IACS component installations.
1875
1876
(2) The organization employs automated mechanisms to maintain an up -to-date,
complete, accurate, and readily available baseline configuration of the IACS.
1877
1878
1879
12.7.3 Configuration Change Control
Requirement:
The organization shall authorize, document, and control changes to the IACS.
1880
Foundational Requirement:
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
Rationale/Supplemental Guidance: The organization manages configuration changes to
the IACS using an organizationally approved process. Configuration change control
involves the systematic proposal, justification, implementation, test/evaluation, review,
and disposition of changes to the IACS, including upgrades and modifications.
Configuration change control includes changes to the configuration settings for
information technology products (e.g., operating systems, firewalls, routers).
The
organization includes emergency changes in the configuration change control process,
including changes resulting from the remediation of flaws. The approvals to implement a
change to the IACS include successful results from the security analysis of the change.
The organization audits activities associated with configuration changes to the IACS.
1891
Requirement Enhancements:
1892
1893
1894
1895
(1) The organization employs automated mechanisms to: (i) document proposed c hanges
to the IACS; (ii) notify appropriate approval authorities; (iii) highlight approvals that
have not been received in a timely manner; (iv) inhibit change until necessary
approvals are received; and (v) document completed changes to the IACS.
1896
1897
(2) The organization tests, validates, and documents changes (e.g., patches and updates)
before implementing the changes on the operational IACS.
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
1908
1909
Foundational Requirement:
Rationale/Supplemental Guidance: The organization ensures that testing does not
interfere with IACS functions. The individual/group conducting the tests fully
understands the organizational information security policies and procedures, the IACS
security policies and procedures, and the specific health, safety, and environmental
risks associated with a particular facility and/or process. A production IACS may need
to be taken off-line, or replicated to the extent feasible, before testing can be
conducted. If an IACS must be taken off-line for testing, the tests are scheduled to
occur during planned IACS outages whenever possible. In situations where the
organization cannot, for operational reasons, conduct live testing of a production
IACS, the organization employs compensating controls (e.g., providing a replicated
system to conduct testing).
1910
12.7.4 Monitoring Configuration Changes
1911
Requirement:
1912
1913
The organization shall conduct security impact analyses to determine the effects of
configuration changes.
1914
Foundational Requirement:
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
– 54 –
ISA99, WG02, TG02
1915
1916
1917
1918
1919
1920
1921
1922
Rationale/Supplemental Guidance: Prior to change implementation, and as part of the
change approval process, the organization analyzes changes to the IACS for potential
adverse security consequences. After the IACS is changed (including upgrades and
modifications), the organization checks the security features to verify that the features are
still functioning properly. The organization audits activities associated with configuration
changes to the IACS. Monitoring configuration changes and conducting security impact
analyses are important elements with regard to the ongoing assessment o f security
controls in the IACS.
1923
1924
Requirement Enhancements: None.
1925
12.7.5 Access Restrictions for Change
1926
Requirement:
1927
1928
1929
The organization shall: (i) approve individual access privileges and enforces physical and
logical access restrictions associated with changes to the IACS; and (ii) generate, retain,
and review records reflecting all such changes.
1930
Foundational Requirement:
1931
1932
1933
1934
1935
Rationale/Supplemental Guidance: Planned or unplanned changes to the hardware,
software, and/or firmware components of the IACS can have signif icant effects on the
overall security of the system. Accordingly, only qualified and authorized individuals
obtain access to IACS components for purposes of initiating changes, including upgrades
and modifications.
1936
Requirement Enhancements:
1937
1938
1939
(1) The organization employs automated mechanisms to enforce access restrictions and
support auditing of the enforcement actions.
1940
1941
1942
1943
1944
1945
1946
12.7.6 Network and Security Configuration Settings
Requirement:
The IACS vendor shall provide guidelines for recommended network and securi ty configurations.
The organization shall, based upon guidelines provided by the vendor: (i) establish
mandatory network and security configuration settings for IACS components (ii) configure
these settings to the most restrictive mode consistent with ope rational requirements; (iii)
document these settings; and (iv) enforce these settings in all components of the IACS.
1947
Foundational Requirement:
1948
1949
Rationale/Supplemental Guidance:
These configuration settings are the adjustable
parameters of the IACS components.
1950
Requirement Enhancements:
1951
1952
1953
(1) The organization shall employ automated mechanisms to centrally manage, apply, and
verify configuration settings.
1954
1955
12.7.7 IACS Component Inventory
Requirement:
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
– 55 –
ISA99, WG02, TG02
1956
1957
The organization shall develop, document, and maintain a current inventor y of the
components of the IACS and relevant ownership information.
1958
Foundational Requirement:
1959
1960
1961
1962
1963
1964
1965
Rationale/Supplemental Guidance: The organization determines the appropriate level of
granularity for the IACS components included in the inventory that are subj ect to
management control (i.e., tracking, and reporting). The inventory of IACS components
includes any information determined to be necessary by the organization to achieve
effective property accountability (e.g., manufacturer, model number, serial numb er,
software license information, system/component owner). The component inventory is
consistent with the accreditation boundary of the IACS.
1966
1967
1968
Requirement Enhancements:
(1) The organization updates the inventory of IACS components as an integral part of
component installations.
1969
1970
1971
(2) The organization employs automated mechanisms to help maintain an up -to-date,
complete, accurate, and readily available inventory of IACS components.
1972
12.7.8 System Maintenance Policy and Procedures
1973
Requirement:
1974
1975
1976
1977
1978
The organization shall develop, disseminate, and periodically review/update: (i) a formal,
documented, IACS maintenance policy that addresses purpose, scope, roles,
responsibilities, management commitment, coordination among organizational entities,
and compliance; and (ii) formal, documented procedures to facilitate the implementation
of the IACS maintenance policy and associated system maintenance controls.
1979
Foundational Requirement:
1980
1981
1982
1983
1984
Rationale/Supplemental Guidance: The IACS maintenance policy and procedures are
consistent with applicable laws, directives, policies, regulations, standards, and guidance.
The IACS maintenance policy can be included as part of the general information security
policy for the organization. System maintenance procedures can be developed for the
security program in general, and for a particular IACS, when required.
1985
Requirement Enhancements: None.
1986
1987
1988
1989
1990
1991
12.7.9 Controlled Maintenance
Requirement:
The organization shall schedule, perform, document, and review records of routine preventative
and regular maintenance (including repairs) on the components of the IACS in accordance
with vendor, system integrator, and/or organizational specifications and requirements.
1992
Foundational Requirement:
1993
1994
1995
1996
1997
1998
1999
Rationale/Supplemental Guidance:
All maintenance activities to include routin e,
scheduled maintenance and repairs are controlled; whether performed on site or remotely
and whether the equipment is serviced on site or removed to another location.
Organizational officials approve the removal of the IACS or IACS components from the
facility when repairs are necessary. If the IACS or component of the system requires off site repair, the organization removes all information from associated media using
approved procedures. After maintenance is performed on the IACS, the organization
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
– 56 –
ISA99, WG02, TG02
2000
2001
checks all potentially affected security controls to verify that the controls are still
functioning properly.
2002
Requirement Enhancements:
2003
2004
2005
2006
2007
(1) The organization maintains maintenance records for the IACS that include: (i) the date
and time of maintenance; (ii) name of the individual performing the maintenance; (iii)
name of escort, if necessary; (iv) a description of the maintenance performed; and (v)
a list of equipment removed or replaced (including identification numbers, if
applicable).
2008
2009
2010
2011
(2) The organization employs automated mechanisms to schedule and conduct
maintenance as required, and to create up-to date, accurate, complete, and available
records of all maintenance actions, both needed and completed.
2012
12.7.10 Maintenance Tools
2013
Requirement:
2014
2015
The organization shall approve, control, and monitor the use of IACS maintenance tools and
maintains the tools on an ongoing basis.
2016
Foundational Requirement:
2017
2018
2019
2020
2021
2022
2023
Rationale/Supplemental Guidance: The intent of this requirement is to address hardware
and software brought into the IACS specifically for diagnostic/repair actions (e.g., a
hardware or software packet sniffer that is introduced for the purpose of a particular
maintenance activity). Hardware and/or software components that may support IACS
maintenance, yet are a part of the system (e.g., the software implementing “ping”, “ls”,
“ipconfig” or the hardware and software implementing the monitoring port of an Ethernet
switch) are not covered by this requirement.
2024
Requirement Enhancements:
2025
2026
(1) The organization inspects all maintenance tools c arried into a facility by maintenance
personnel for obvious improper modifications.
2027
Foundational Requirement:
2028
2029
Rationale/Supplemental Guidance:
Maintenance tools include, for
diagnostic and test equipment used to conduct maintenance on the IACS.
example,
2030
2031
(2) The organization checks all media containing diagnostic and test programs for
malicious code before the media are used in the IACS.
2032
2033
2034
2035
2036
(3) The organization checks all maintenance equipment with the capability of retaining
information so that no organizational information is written on the equipment or the
equipment is appropriately sanitized before release; if the equipment cannot be
sanitized, the equipment remains within the facility or is destroyed, unless an
appropriate organization official explicitly authori zes an exception.
2037
2038
2039
(4) The organization employs automated mechanisms to restrict the use of maintenance
tools to authorized personnel only.
2040
2041
2042
2043
12.7.11 Remote Maintenance
Requirement:
The organization shall authorize, monitor, and control any remotely executed maintenanc e and
diagnostic activities, if employed.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
– 57 –
ISA99, WG02, TG02
2044
Foundational Requirement:
2045
2046
2047
2048
2049
2050
2051
2052
2053
2054
2055
2056
2057
2058
Rationale/Supplemental Guidance: Remote maintenance and diagnostic activities are
conducted by individuals communicating through an external, non -organization-controlled
network (e.g., the Internet). The use of remote maintenance and diagnostic tools is
consistent with organizational policy and documented in the security plan for the IACS.
The organization maintains records for all remote maintenance and diagnostic activities.
Other techniques and/or controls to consider for improving the security of remote
maintenance include: (i) encryption and decryption of communications; (ii) strong
identification and authentication techniques; and (iii) remote disconnect verification.
When remote maintenance is completed, the organization (or IACS in certain cases)
terminates all sessions and remote connections invoked in the performance of that
activity. If password-based authentication is used to accomplish remote maintenance, the
organization changes the passwords following each remote maintenance service. The
National Security Agency provides a listing of approved media sanitization products at
http://www.nsa.gov/ia/government/mdg.cfm .
2059
Requirement Enhancements:
2060
2061
2062
(1) The organization audits all remote maintenance and diagnostic sessions and
appropriate organizational personnel review the maintenanc e records of the remote
sessions.
2063
2064
2065
(2) The organization addresses the installation and use of remote maintenance and
diagnostic links in the security plan for the IACS.
2066
2067
2068
12.7.12 Maintenance Personnel
Requirement:
The organization shall allow only authorized personnel to perform maintenance on the IACS.
2069
Foundational Requirement:
2070
2071
2072
2073
2074
2075
2076
Rationale/Supplemental Guidance:
Maintenance personnel (whether performing
maintenance locally or remotely) have appropriate access authorizations to the IACS
when maintenance activities allow access to organizational information or could result in a
future compromise of confidentiality, integrity, or availability.
When maintenance
personnel do not have needed access authorizations, organizational personnel with
appropriate access authorizations supervise maintenance personnel during the
performance of maintenance activities on the IACS.
2077
Requirement Enhancements: None.
2078
12.7.13 Timely Maintenance
2079
Requirement:
2080
2081
2082
The organization shall obtain maintenance support and spare parts for [ Assignment: organizationdefined list of key IACS components] within [Assignment: organization-defined time
period] of failure.
2083
Foundational Requirement:
2084
Rationale/Supplemental Guidance: None.
2085
Requirement Enhancements: None.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
ISA-62443.02.02, D1E4, April 2013
2086
13 Incident Management
2087
13.1
– 58 –
ISA99, WG02, TG02
Introduction
2088
2089
13.2 Reporting Security Events and Weaknesses
2090
13.2.1
Requirement:
2092
2093
Foundational Requirement:
2094
Rationale/Supplemental Guidance:
2095
Requirement Enhancements:
2096
2097
13.3 Management of Incidents and Improvements
2098
13.3.1 Incident Response Policy and Procedures
2099
Requirement:
2100
2101
2102
2103
2104
The organization shall develop, disseminate, and periodically review/update: (i) a forma l,
documented, incident response policy that addresses purpose, scope, roles,
responsibilities, management commitment, coordination among organizational entities,
and compliance; and (ii) formal, documented procedures to facilitate the implementation
of the incident response policy and associated incident response controls.
2105
Foundational Requirement:
2106
2107
2108
2109
2110
Rationale/Supplemental Guidance: The incident response policy and procedures are
consistent with applicable laws, directives, policies, regulations, standards, and guidance.
The incident response policy can be included as part of the general information security
policy for the organization. Incident response procedures can be developed for the
security program in general, and for a particular IACS, when required.
2111
2112
Requirement Enhancements: None.
2113
2114
2115
2116
2117
13.3.2 Incident Response Training
Requirement:
The organization shall train personnel in their incident response roles and responsibilities with
respect to the IACS and provides refresher training [ Assignment: organization-defined
frequency, at least annually].
2118
Foundational Requirement:
2119
Rationale/Supplemental Guidance: None.
2120
Requirement Enhancements:
2121
2122
(1) The organization incorporates simulated events into incident response training to
facilitate effective response by personnel in crisis situations.
2123
2124
(2) The organization employs automated mechanisms to provide a more thorough and
realistic training environment.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2091
{Requirement}
ISA‑62443-2-2, D1E4, April 2013
– 59 –
ISA99, WG02, TG02
2125
2127
2128
2129
2130
2131
13.3.3 Incident Response Testing and Exercises
Requirement:
The organization shall test and/or exercise the incident response capability for the IACS
[Assignment: organization-defined frequency, at least annually ] using [Assignment:
organization-defined tests and/or exercises] to determine the incident response
effectiveness and documents the results.
2132
Foundational Requirement:
2133
Rationale/Supplemental Guidance: None
2134
Requirement Enhancements:
2135
2136
(1) The organization employs automated mechanisms to more thoroughly and effectively
test/exercise the incident response capability.
2137
2138
2139
2140
2141
2142
Foundational Requirement:
Rationale/Supplemental Guidance: Automated mechanisms can provide the ability to
more thoroughly and effectively test or exercise the incident response ca pability by
providing more complete coverage of incident response issues, selecting more
realistic test/exercise scenarios and environments, and more effectively stressing the
response capability.
2143
13.3.4 Incident Handling
2144
Requirement:
2145
2146
The organization shall implement an incident handling capability for security incidents that
includes preparation, detection and analysis, containment, eradication, and recovery.
2147
Foundational Requirement:
2148
2149
2150
2151
2152
Rationale/Supplemental Guidance: Incident-related information can be obtained from a
variety of sources including, but not limited to, audit monitoring, network monitoring,
physical access monitoring, and user/administrator reports.
The organization
incorporates the lessons learned from ongoing incident handling activities into the incident
response procedures and implements the procedures accordingly.
2153
Requirement Enhancements:
2154
2155
(1) The organization employs automated mechanisms to support the incident handling
process.
2156
13.3.5 Incident Monitoring
2157
Requirement:
2158
The organization shall track and document IACS security incidents on an ongoing basis.
2159
Foundational Requirement:
2160
Rationale/Supplemental Guidance: None.
2161
Requirement Enhancements:
2162
2163
(1) The organization employs automated mechanisms to assist in the tracking of security
incidents and in the collection and analysis of incident information.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2126
ISA-62443.02.02, D1E4, April 2013
2165
2166
ISA99, WG02, TG02
13.3.6 Incident Reporting
Requirement:
The organization shall promptly reports incident information to appropriate authorities.
2167
Foundational Requirement:
2168
2169
2170
2171
2172
2173
2174
Rationale/Supplemental Guidance:
The types of incident information reported, the
content and timeliness of the reports, and the list of designated reporting authorities or
organizations are consistent with applicable laws, directives, policies, regulations,
standards, and guidance. The United States Computer Em ergency Readiness Team (USCERT) maintains the IACS Security Center at http://www.uscert.gov/control_systems. In
addition to incident information, weaknesses and vulnerabilities in the IACS are reported
to appropriate organizational officials in a timely manner to prevent security incidents.
2175
Requirement Enhancements:
2176
2177
(1) The organization employs automated mechanisms to assist in the reporting of security
incidents.
2178
2179
2180
2181
2182
13.3.7 Incident Response Assistance
Requirement:
The organization shall provide an incident response support resource that offers advice and
assistance to users of the IACS for the handling and reporting of security incidents. The
support resource is an integral part of the organization’s incident respo nse capability.
2183
Foundational Requirement:
2184
2185
2186
Rationale/Supplemental Guidance:
Possible implementations of incident response
support resources in an organization include a help desk or an assistance group and
access to forensics services, when required.
2187
Requirement Enhancements:
2188
2189
(1) The organization employs automated mechanisms to increase the availability of
incident response-related information and support.
2190
2191
13.3.8 IACS Monitoring Tools and Techniques
2192
Requirement:
2193
2194
2195
2196
The organization shall determine the required granularity of the information collected
based upon its monitoring objectives and the capability of the IACS to support such
activities. This includes monitoring inbound and outbound communications for unusual or
unauthorized activities or conditions.
2197
Foundational Requirement:
2198
2199
2200
2201
2202
Rationale/Supplemental Guidance: Organizations consult appropriate legal counsel with
regard to all IACS monitoring activities. Organizations heighten the level of IACS
monitoring activity whenever there is an indication of increas ed risk to organizational
operations, organizational assets, or individuals based on law enforcement information,
intelligence information, or other credible sources of information.
2203
Requirement Enhancements:
2204
2205
(1) The organization interconnects and configures individual intrusion detection tools into a
system wide intrusion detection system using common protocols.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2164
– 60 –
– 61 –
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
ISA99, WG02, TG02
2206
ISA-62443.02.02, D1E4, April 2013
2207
14 Business Continuity Management
2208
14.1
– 62 –
ISA99, WG02, TG02
Introduction
2210
14.2 Security Aspects
2211
14.2.1 Contingency Planning Policy and Procedures
2212
Requirement:
2213
2214
2215
2216
2217
The organization shall develop, disseminates, and periodically reviews/updates: (i) a
formal, documented, contingency planning policy that addresses purpose, scope, roles,
responsibilities, management commitment, coordination among organizational entities,
and compliance; and (ii) formal, documented procedures to facilitate the implementation
of the contingency planning policy and associated contingency planning controls.
2218
Foundational Requirement:
2219
2220
2221
2222
2223
Rationale/Supplemental Guidance: The contingency planning policy and procedures are
consistent with applicable laws, directives, policies, regulations, standards, and guidance.
The contingency planning policy can be included as part of the general information
security policy for the organization. Contingency planning procedures can be develop ed
for the security program in general, and for a particular IACS, when required.
2224
Requirement Enhancements: None.
2225
2226
2227
2228
2229
2230
2231
14.2.2 Contingency Plan
Requirement:
The organization shall develop and implement a contingency plan for the IACS addressing
contingency roles, responsibilities, assigned individuals with contact information, and
activities associated with restoring the system after a disruption or failure. Designated
officials within the organization review and approve the contingency plan and distribute
copies of the plan to key contingency personnel.
2232
Foundational Requirement:
2233
2234
2235
2236
2237
2238
Rationale/Supplemental Guidance: The organization defines contingency plans for
categories of disruptions or failures. In the event of a loss of processing within the IACS
or communication with operational facilities, the IACS executes predetermined procedures
(e.g., alert the operator of the failure and then do nothing, alert the operator and then
safely shut down the industrial process, alert the operator and then maintain the last
operational setting prior to failure). These examples are not exhaustive.
2239
Requirement Enhancements:
2240
2241
(1) The organization coordinates contingency plan development with organizational
elements responsible for related plans.
2242
Foundational Requirement:
2243
2244
2245
Rationale/Supplemental Guidance:
Examples of related plans include Business
Continuity Plan, Disaster Recovery Plan, Continuity of Operations Plan, Business
Recovery Plan, Incident Response Plan, and Emergency Action Plan.
2246
2247
2248
(2) The organization conducts capacity planning s o that necessary capacity for
information processing, telecommunications, and environmental support exists during
crisis situations.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2209
ISA‑62443-2-2, D1E4, April 2013
2250
2251
2252
2253
ISA99, WG02, TG02
14.2.3 Contingency Training
Requirement:
The organization shall train personnel in their contingency roles and responsibilities w ith respect
to the IACS and provides refresher training [Assignment: organization-defined frequency,
at least annually].
2254
Foundational Requirement:
2255
Rationale/Supplemental Guidance: None.
2256
Requirement Enhancements:
2257
2258
(1) The organization incorporates simulated events into contingency training to facilitate
effective response by personnel in crisis situations.
2259
2260
(2) The organization employs automated mechanisms to provide a more thorough and
realistic training environment.
2261
2262
2263
2264
2265
2266
2267
14.2.4 Contingency Plan Testing and Exercises
Requirement:
The organization shall: (i) test and/or exercise the contingency plan for the IACS [ Assignment:
organization-defined frequency, at least annually ] using [Assignment: organization-defined
tests and/or exercises] to determine the plan’s effectiveness and the organization’s
readiness to execute the plan; and (ii) review the contingency plan test/exercise results
and initiates corrective actions.
2268
Foundational Requirement:
2269
2270
2271
2272
2273
2274
2275
Rationale/Supplemental Guidance:
There are several methods for testing and/or
exercising contingency plans to identify potential weaknesses (e.g., full -scale contingency
plan testing, functional/tabletop exercises). The depth and rigor of contingency plan
𝑡𝑎𝑟𝑔𝑒𝑡
testing and/or exercises increases with the 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 level of the IACS. Contingency plan
testing and/or exercises also include a determination of the effects on organizational
operations and assets (e.g., reduction in mission capability) and individuals arising due to
contingency operations in accordance with t he plan.
2276
Requirement Enhancements:
2277
2278
(1) The organization coordinates contingency plan testing and/or
organizational elements responsible for related plans.
exercises
with
2279
Foundational Requirement:
2280
2281
2282
Rationale/Supplemental Guidance:
Examples of related plans include Business
Continuity Plan, Disaster Recovery Plan, Continuity of Operations Plan, Business
Recovery Plan, Incident Response Plan, and Emergency Action Plan.
2283
2284
2285
(2) The organization tests/exercises the contingency plan at the alt ernate processing site
to familiarize contingency personnel with the facility and available resources and to
evaluate the site’s capabilities to support contingency operations.
2286
2287
2288
2289
(3) The organization employs automated mechanisms to more thoroughly and effectivel y
test/exercise the contingency plan by providing more complete coverage of
contingency issues, selecting more realistic test/exercise scenarios and environments,
and more effectively stressing the IACS and supported missions.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2249
– 63 –
ISA-62443.02.02, D1E4, April 2013
– 64 –
ISA99, WG02, TG02
2290
2292
2293
2294
2295
2296
14.2.5 Contingency Plan Update
Requirement:
The organization shall review the contingency plan for the IACS [ Assignment: organizationdefined frequency, at least annually] and revises the plan to address
system/organizational changes or problems encountered during plan implementation,
execution, or testing.
2297
Foundational Requirement:
2298
2299
2300
2301
2302
Rationale/Supplemental Guidance: Organizational changes include changes in mission,
functions, or business processes supported by the IACS. The organization communicates
changes to appropriate organizational elements responsible for related plans (e.g.,
Business Continuity Plan, Disaster Recovery Plan, Continuity of Operations Plan,
Business Recovery Plan, Incident Response Plan, Emergency Action Plan).
2303
Requirement Enhancements: None.
2304
2305
2306
2307
2308
14.2.6 Alternate Storage Site
Requirement:
The organization shall identify an alternate storage site and initiates necessary agreements to
permit the storage of IACS backup information.
2309
Foundational Requirement:
2310
2311
2312
Rationale/Supplemental Guidance: The frequency of IACS backups and the transfer rate
of backup information to the alternate storage site (if so designated) are consistent with
the organization’s recovery time objectives and recovery point objectives.
2313
Requirement Enhancements:
2314
2315
(1) The organization identifies an alternate storage site that is geographically separated
from the primary storage site so as not to be susceptible to the same hazards.
2316
2317
(2) The organization configures the alternate storage site to facilitate timely and effective
recovery operations.
2318
2319
2320
(3) The organization identifies potential accessibility problems to the alternate storage
site in the event of an area-wide disruption or disaster and outlines explicit mitigation
actions.
2321
2322
2323
2324
2325
2326
2327
14.2.7 Alternate Control Site
Requirement:
The organization shall identify an alternate control site an d initiates necessary agreements to
permit the resumption of IACS operations for critical mission/business functions within
[Assignment: organization-defined time period] when the primary processing capabilities
are unavailable.
2328
Foundational Requirement:
2329
2330
Rationale/Supplemental Guidance:
Equipment and supplies required to resume
operations within the organization-defined time period are either available at the alternate
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2291
– 65 –
ISA99, WG02, TG02
2331
2332
site or contracts are in place to support delivery to the site. Timeframes to resume IA CS
operations are consistent with organization-established recovery time objectives.
2333
Requirement Enhancements:
2334
2335
2336
(1) The organization identifies an alternate processing site that is geographically
separated from the primary processing site so as not to be suscep tible to the same
hazards.
2337
2338
2339
(2) The organization identifies potential accessibility problems to the alternate processing
site in the event of an area-wide disruption or disaster and outlines explicit mitigation
actions.
2340
2341
(3) The organization develops alternate processing site agreements that contain priorityof-service provisions in accordance with the organization’s availability requirements.
2342
2343
(4) The organization fully configures the alternate processing site so that it is ready to be
used as the operational site supporting a minimum required operational capability.
2344
14.2.8 IACS Backup
2345
Requirement:
2346
2347
2348
The frequency of IACS backups and the transfer rate of backup information to alternate storage
sites (if so designated) shall be consistent with the organization’s recovery time objectives
and recovery point objectives.
2349
Foundational Requirement:
2350
2351
2352
Rationale/Supplemental Guidance: Availability of up-to-date backups is essential for
recovery from IACS failure and mis-configuration. Automating this function ensures that
all required files are captured, reducing operator overhead.
2353
2354
2355
2356
2357
An organizational assessment of risk guides the use of encryption for backup information.
While integrity and availability are the primary concerns for system backup information,
protecting backup information from unauthorized disclosure is also an important
consideration depending on the type of informati on residing on the backup media and the
𝑡𝑎𝑟𝑔𝑒𝑡
𝑆𝑠𝑦𝑠𝑡𝑒𝑚 level.
2358
Requirement Enhancements:
2359
2360
(1) The organization selectively uses backup information in the restoration of IACS
functions as part of contingency plan testing.
2361
2362
2363
(2) The organization stores backup copies of the operating system and other critical IACS
software in a separate facility or in a fire-rated container that is not collocated with the
operational software.
2364
14.2.9 IACS Recovery and Reconstruction
2365
Requirement:
2366
None.
2367
Foundational Requirement:
2368
2369
2370
2371
2372
2373
2374
Rationale/Supplemental Guidance: IACS recovery and reconstitution to a known secure
state means that all system parameters (either default or organization -established) are set
to secure values, security-critical patches are reinstalled, security-related configuration
settings are reestablished, system documentation and operating procedures are available,
application and system software is reinstalled and configured with secure settings,
information from the most recent, known secure backups is loaded, and the sy stem is fully
tested and functional.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
ISA-62443.02.02, D1E4, April 2013
– 66 –
ISA99, WG02, TG02
2375
Requirement Enhancements:
2376
2377
(1) The organization shall include a full recovery and reconstitution of the IACS as part of
contingency plan testing.
14.2.10 Power Equipment and Cabling
2379
Requirement:
2380
2381
The organization shall protect power equipment and power cabling for the IACS from
damage and destruction.
2382
Foundational Requirement:
2383
Rationale/Supplemental Guidance: None.
2384
Requirement Enhancements:
2385
(1) The organization employs redundant and parallel power cabling paths.
2386
2387
2388
2389
2390
2391
14.3 Telecommunications Services
Requirement:
The organization shall identify primary and alternate telecommunications services to support the
IACS and initiates necessary agreements to permit the resumption of system operations
for critical mission/business functions within [ Assignment: organization-defined time
period] when the primary telecommunications capabilities are unavailable.
2392
Foundational Requirement:
2393
2394
2395
2396
2397
Rationale/Supplemental Guidance:
In the event that the primary and/or alternate
telecommunications services are provided by a common carrier, the organization requests
Telecommunications Service Priority (TSP) for all telecommunications services used for
national security emergency preparedness (see http://tsp.ncs.gov for a full explanation of
the TSP program).
2398
Requirement Enhancements:
2399
2400
2401
(1) The organization develops primary and alternate telecommunications service
agreements that contain priority-of-service provisions in accordance with the
organization’s availability requirements.
2402
2403
(2) The organization obtains alternate telecommunications services that do not share a
single point of failure with primary telecommunications services.
2404
2405
2406
(3) The organization obtains alternate telecommunications service providers that are
sufficiently separated from primary service providers so as not to be su sceptible to the
same hazards.
2407
2408
2409
(4) The organization requires primary and alternate telecommunications service providers
to have adequate contingency plans.
2410
14.3.1 Emergency Shutoff
2411
Requirement:
2412
2413
2414
2415
The IACS shall provide, for specific locations within a facility containing concentrations of
IACS resources, the capability of shutting off power to any IACS component that may be
malfunctioning or threatened without endangering personnel by requiring them to
approach the equipment.
2416
Foundational Requirement:
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2378
– 67 –
ISA99, WG02, TG02
2417
2418
2419
2420
Rationale/Supplemental Guidance: Facilities containing concentrations of IACS resources
may include, for example, data centers, server rooms, and mainframe rooms. Emergency
shutoff capabilities are typically integrated with SIS systems, if present (e.g. automated
fail-safe shutdown sequences).
2421
Requirement Enhancements:
2422
2423
2424
(1) The IACS shall protect the emergency power -off capability from accidental or
unauthorized activation.
2425
14.3.2 Emergency Power
2426
Requirement:
2427
2428
The organization shall provide a short-term uninterruptible power supply to facilitate an
orderly shutdown of the IACS in the event of a primary power source loss.
2429
Foundational Requirement:
2430
Rationale/Supplemental Guidance: None.
2431
Requirement Enhancements:
2432
2433
2434
(1) The organization provides a long-term alternate power supply for the IACS that is
capable of maintaining minimally required operational capability in the event of an
extended loss of the primary power source.
2435
2436
2437
(2) The organization provides a long-term alternate power supply for the IACS that is self contained and not reliant on external power generation.
2438
14.3.3 Emergency Lighting
2439
Requirement:
2440
2441
2442
The organization shall employ and maintains automatic emergency lighting that activates
in the event of a power outage or disruption and that covers emergency exits and
evacuation routes.
2443
Foundational Requirement:
2444
Rationale/Supplemental Guidance: None.
2445
Requirement Enhancements: None.
2446
2447
14.3.4 Fire Protection
2448
Requirement:
2449
2450
The organization shall employ and maintain fire suppression
devices/systems that can be activated in the event of a fire.
2451
Foundational Requirement:
2452
2453
2454
Rationale/Supplemental Guidance:
Fire suppression and detection devices/systems
include, but are not limited to, sprinkler systems, handheld fire extinguishers, fixed fire
hoses, and smoke detectors.
2455
Requirement Enhancements:
and
detection
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
– 68 –
ISA99, WG02, TG02
2456
2457
(1) The organization employs fire detection devices/systems that activate automatically
and notify the organization and emergency responders in the event of a fire.
2458
2459
(2) The organization employs fire suppression devices/systems that provide automatic
notification of any activation to the organization and emergency responders.
2460
2461
2462
(3) The organization employs an automatic fire suppression capability in facilities that are
not staffed on a continuous basis.
2463
14.3.5 Temperature and Humidity Controls
2464
Requirement:
2465
2466
The organization shall regularly maintain, within acceptable levels, and monitor the
temperature and humidity within the facility where the IACS resides.
2467
Foundational Requirement:
2468
Rationale/Supplemental Guidance: None.
2469
2470
Requirement Enhancements: None.
2471
14.3.6 Water Damage Protection
2472
Requirement:
2473
2474
2475
The organization shall protect the IACS from water damage resulting from broken
plumbing lines or other sources of water leakage by providing master shutoff valves that
are accessible, working properly, and known to key personnel.
2476
Foundational Requirement:
2477
Rationale/Supplemental Guidance: None.
2478
Requirement Enhancements:
2479
2480
2481
(1) The organization employs mechanisms that, without the need for manual intervention,
protect the IACS from water damage in the event of a significant water leak.
2482
15 Compliance
2483
15.1
2484
15.1.1
2485
General
{Requirement}
Requirement:
2486
2487
Foundational Requirement:
2488
Rationale/Supplemental Guidance:
2489
Requirement Enhancements:
2490
2491
2492
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA-62443.02.02, D1E4, April 2013
– 69 –
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA‑62443-2-2, D1E4, April 2013
ISA99, WG02, TG02
2493
ISA-62443.02.02, D1E4, April 2013
– 70 –
ISA99, WG02, TG02
Annex A
(informative)
Foundational Requirements
2494
2495
2496
2497
A.1
Overview
2498
This annex is intended to provide guidance to the reader as to the relevance of the SRs.
2499
A.2
2500
2501
2502
2503
2504
2505
2506
2507
2508
2509
2510
Identify and authenticate IACS users (incl. human users, processes, and devices), assign them to
a pre-defined role, and allow them access to the system or assets.
2511
A.3
2512
2513
2514
2515
2516
2517
2518
2519
2520
2521
Enforce the assigned privileges of an authenticated IACS user to perform the requested action on
the system or assets, and monitor the use of these privileges.
2522
A.4
2523
2524
2525
2526
2527
2528
2529
2530
2531
Ensure the integrity of information on communication channels and in data repositories to prevent
unauthorized manipulation.
2532
A.5
2533
2534
Ensure the confidentiality of information on communication channels and in data repositories to
prevent dissemination.
2535
2536
2537
Rationale: Some IACS generated information whether at rest or in transit is of
confidential/sensitive nature. This implies that some communication channels and data -stores
require protection against eavesdropping and unauthorized access.
Rationale: Asset owners will have to develop a list of IACS users and to determine for each
device the required level of access control protection. The goal of access control is to protect the
system by verifying the identity of a user requesting the access to a de vice of the system before
activating the communication. Recommendations and guidelines should include mechanisms that
will operate in mixed modes; e.g. some devices on a communication channel require strong
access control, i.e. strong authentication mechanism and others do not. By extension, access
control requirements need to be extended to data at rest.
FR2 USE C ONTROL
Rationale: Asset owners will have to assign to each IACS user the privileges defining the
authorized use of the system. The goal of use control is to protect against unauthorized actions
on IACS resources by verifying if the necessary privileges are granted before allowing performing
the action. Examples of actions are read or write data, download program, set configuration, etc.
Recommendations and guidelines should include mechanisms that will operate in mixed modes;
e.g. some IACS resources require strong use control protection, i.e. restrictive privileges and
others do not. By extension, use control requirements need to be extended to data at rest .
FR3 D ATA I NTEGRITY
Rationale: Using the organization’s risk assessment methodology, asset owners will “select”
communication channels that require strong integrity protection.
Derived prescriptive
recommendations and guidelines should include mechanisms that will operate in mixed modes;
e.g. some communication channels require strong integrity protection and others do not. By
extension, data integrity requirements need to be extended to data at rest; i.e. protecting the
integrity of data that resides in selected repositories.
FR4 D ATA CONFIDENTIALITY
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
FR1 ACCESS CONTROL
ISA‑62443-2-2, D1E4, April 2013
– 71 –
ISA99, WG02, TG02
2538
A.6
FR5 RESTRICT D ATA F LOW
2539
2540
2541
2542
2543
2544
2545
Segment the system via zones and conduits to limit the unnecessary flow of data.
2546
A.7
2547
2548
2549
2550
2551
2552
2553
2554
2555
2556
Respond to security violations by notifying the proper authority, reporting needed forensic
evidence of the violation, and taking timely corrective action when incidents are discovered.
2557
A.8
2558
2559
2560
2561
2562
2563
Ensure the availability of the system or assets against the denial of essential services.
FR6 T IMELY R ESPONSE TO AN EVENT
Rationale: Using the organization’s risk assessment methodology, asset owners will establish
policies and proper lines of communication and control needed to respond to security violations.
Derived prescriptive recommendations and guidelines shou ld include mechanisms that collect,
report and automatically correlate the forensic evidence to ensure timely corrective action. The
use of monitoring tools and techniques must not adversely affect the operational performance of
the IACS.
FR7 RESOURCE AVAILABILITY
Rationale: The aim of this series of System Requirements is to ensure that the system is resilient
against various types of Denial of Service events. Thi s includes the unavailability of system
functionality at various levels.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
Rationale: Using the organization’s risk assessment methodology, asset owners will determine
necessary information flow restrictions and thus by extension determine the configuration of the
conduits used to deliver these data. Derived prescriptive recommendations and guidelines
should include mechanisms that range from disconnecting control networks from business or
public networks to using stateful firewalls and DMZ to manage the flow of information.
ISA-62443.02.02, D1E4, April 2013
– 72 –
ISA99, WG02, TG02
Annex B
(informative)
Mapping Controls to Foundational Requirements
2564
2565
2566
2567
B.1
2569
2570
This annex is intended to provide guidance to the reader as to the relevance of the specific
controls to the various foundational requirements.
2571
2572
NOTE
2573
Overview
This annex will be completed as part of the final document generation after the primary content has been
finalized.
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
2568
ISA‑62443-2-2, D1E4, April 2013
2574
2575
– 73 –
ISA99, WG02, TG02
BIBLIOGRAPHY
2576
2577
2578
2579
2580
NOTE
2581
References to other parts, both existing and anticipated, of the ISA‑62443 series:
2582
2583
NOTE
2584
2585
[1]
ANSI/ISA‑62443-1-1-2007, Security for industrial automation and control systems:
Terminology, concepts and models
2586
2587
[2]
ANSI/ISA‑TR62443-1-2, Security for industrial automation and control systems: Master
glossary of terms and abbreviations
2588
2589
[3]
ANSI/ISA‑62443-1-3, Security for industrial automation and control systems: System
security compliance metrics
2590
2591
[4]
ANSI/ISA‑62443-2-1-2009, Security for industrial automation and control systems:
Establishing an industrial automation and control system security program
2592
2593
[5]
ANSI/ISA‑TR62443-2-3, Security for industrial automation and control systems: Patch
management in the IACS environment
2594
2595
[6]
ANSI/ISA‑TR62443-3-1-2007, Security for industrial autom ation and control systems:
Security technologies for industrial automation and control systems
2596
2597
[7]
ANSI/ISA‑62443-3-2, Security for industrial automation and control systems: Target
security assurance levels for zones and conduits
2598
2599
[8]
ANSI/ISA‑62443-3-3, Security for industrial automation and control systems: System
security requirements and security assurance levels
2600
2601
[9]
ANSI/Error! Unknown document property name., Security for industrial automation and
control systems: Product development requirements
2602
2603
[10]
ANSI/ISA‑62443-4-1, Security for industrial automation and control systems: Embedded
devices
2604
[11]
ANSI/ISA‑62443-4-2, Security for industrial automation and control systems: Host devices
2605
Other standards references:
2606
[12]
2607
2608
Some of these references are normative references (see Clause 2), published documents, in development, or
anticipated. They are all listed here for completeness of the a nticipated parts of the ISA‑62443 series.
ISO/IEC Directives, Part 2, Rules for the structure and drafting of International Standards
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
This bibliography includes references to sources used in the creation of this standard as well as references to
sources that may aid the reader in developing a greater understanding of cyber security as a whole and
developing a management system. Not all references in this bibliography are referred to throughout the text of
this standard. The references have been broken down into different categories depending on the type of
source they are.
– 74 –
This document includes working drafts of, or extracts from documents in the ISA-62443 series.
New versions will be generated periodically as individual documents are revised.
IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT
BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA.
ISA-62443.02.02, D1E4, April 2013
ISA99, WG02, TG02
2609