THIS COPY OF A FULL OR ABRIDGED ISA PUBLICATION IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS. IT MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. Copyright © by the International Society of Automaton. All rights reserved. Not for resale. Printed in the United States of America. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), without the prior written permission of the Publisher. ISA 67 Alexander Drive P. O. Box 12277 Research Triangle Park, North Carolina 27709 USA This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. FOR USE AND REVIEW ONLY BY MEMBERS OF ISA99 AND APPROVED PARTIES: This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. This page intentionally left blank ISA‑62443-2-2, D1E4, April 2013 –3– ISA99, WG02, TG02 1 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ISA‑62443-2-2 Security for industrial automation and control systems Implementation Guidance for and IACS Security Management System Draft 1, Edit 4 April 2013 Text appearing red italics should be considered editorial comments, provided as an aid in the preparation of the document. It will be removed before the draft is completed. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 2 ISA 67 Alexander Drive P. O. Box 12277 Research Triangle Park, NC 27709 USA –4– ISA Security for industrial automation and control systems <Document Title> ISBN: -to-be-assigned- Copyright © 2011 by ISA. All rights reserved. Not for resale. Printed in the United States of America. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 ISA99, WG02, TG02 21 22 23 –5– ISA99, WG02, TG02 24 PREFACE 25 26 This preface, as well as all footnotes and annexes, is included for information purposes and is not part of ISA-62443.02.02. 27 28 29 30 31 32 This document has been prepared as part of the service of ISA, the International Society of Automation, toward a goal of uniformity in the field of instrumentation. To be of real value, this document should not be static but should be subject to periodic review. Toward this end, the Society welcomes all comments and criticisms and asks that they be addressed to the Secretary, Standards and Practices Board; ISA; 67 Alexander Drive; P. O. Box 122 77; Research Triangle Park, NC 27709; Telephone (919) 549-8411; Fax (919) 549-8288; E-mail: standards@isa.org. 33 34 35 36 37 38 39 40 41 42 The ISA Standards and Practices Department is aware of the growing need for attention to the metric system of units in general and the Internatio nal System of Units (SI) in particular, in the preparation of instrumentation standards. The Department is further aware of the benefits to USA users of ISA standards of incorporating suitable references to the SI (and the metric system) in their business and professional dealings with other countries. Toward this end, this Department will endeavor to introduce SI-acceptable metric units in all new and revised standards, recommended practices and technical reports to the greatest extent possible. Standard f or Use of the International System of Units (SI): The Modern Metric System, published by the American Society for Testing and Materials as IEEE/ASTM SI 10-97, and future revisions, will be the reference guide for definitions, symbols, abbreviations, and co nversion factors. 43 44 45 46 47 It is the policy of ISA to encourage and welcome the participation of all concerned individuals and interests in the development of ISA standards, recommended practices and technical reports. Participation in the ISA standards-making process by an individual in no way constitutes endorsement by the employer of that individual, of ISA or of any of the standards, recommended practices and technical reports that ISA develops. 48 49 50 51 52 CAUTION – ISA adheres to the policy of the American National Standa rds Institute with regard to patents. If ISA is informed of an existing patent that is required for use of the standard, it will require the owner of the patent to either grant a royalty -free license for use of the patent by users complying with the standard or a license on reasonable terms and conditions that are free from unfair discrimination. 53 54 55 56 57 58 59 60 Even if ISA is unaware of any patent covering this Standard, the user is cautioned that implementation of the standard may require use of techniques, processes or materials covered by patent rights. ISA takes no position on the existence or validity of any patent rights that may be involved in implementing the standard. ISA is not responsible for identifying all patents that may require a license before implementati on of the standard or for investigating the validity or scope of any patents brought to its attention. The user should carefully investigate relevant patents before using the standard for the user’s intended application. 61 62 63 However, ISA asks that anyone reviewing this standard who is aware of any patents that may impact implementation of the standard notify the ISA Standards and Practices Department of the patent and its owner. 64 65 66 67 68 69 70 Additionally, the use of this standard may involve hazardous materials, operat ions or equipment. The standard cannot anticipate all possible applications or address all possible safety issues associated with use in hazardous conditions. The user of this standard must exercise sound professional judgment concerning its use and applic ability under the user’s particular circumstances. The user must also consider the applicability of any governmental regulatory limitations and established safety and health practices before implementing this standard. 71 This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 ISA‑62443-2-2, D1E4, April 2013 72 73 –6– ISA99, WG02, TG02 The following people served as active members of ISA99, Working Group 02, Task Group 02 for the preparation of this document: Name Company Contributor <WG/TG Leader’s Name>, WG/TG Chair <WG/TG Leader’s Company> X <Editor’s Name>, Lead Editor <Editor’s Company> X Reviewer 74 75 76 This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. <Member & Reviewer Names > ISA‑62443-2-2, D1E4, April 2013 –7– ISA99, WG02, TG02 CONTENTS 77 79 PREFACE ............................................................................................................................... 5 80 FORWORD ........................................................................................................................... 12 81 INTRODUCTION ................................................................................................................... 13 82 83 84 1 Context ........................................................................................................................... 13 Audience ........................................................................................................................ 13 Scope ............................................................................................................................. 15 85 2 Normative references ..................................................................................................... 15 86 3 Terms, definitions, abbreviated terms, acronyms, and conventions ................................. 16 4 3.1 Terms and definitions ............................................................................................ 16 3.2 Abbreviated terms and acronyms ........................................................................... 18 3.3 Conventions .......................................................................................................... 19 Overview ........................................................................................................................ 21 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 4.1 4.2 5 Structure ............................................................................................................... 21 Information security management in IACS ............................................................. 21 4.2.1 Goal .......................................................................................................... 21 4.2.2 IACS assets to be protected ...................................................................... 21 4.2.3 Establishment of information security management.................................... 22 Security Policy ................................................................................................................ 23 5.1 6 Introduction ........................................................................................................... 23 5.1.1 {Requirement} ........................................................................................... 23 Organization of Security ................................................................................................. 23 6.1 6.2 7 Introduction ........................................................................................................... 23 Internal Organization ............................................................................................. 23 6.2.1 {Requirement} ........................................................................................... 23 6.3 External Parties ..................................................................................................... 23 6.3.1 {Requirement} ........................................................................................... 23 Asset Management ......................................................................................................... 24 7.1 7.2 8 Introduction ........................................................................................................... 24 Responsibility for Assets ....................................................................................... 24 7.2.1 {Requirement} ........................................................................................... 24 7.3 Information Classification ...................................................................................... 24 7.3.1 {Requirement} ........................................................................................... 24 Human Resources Security ............................................................................................ 24 8.1 8.2 Prior to Employment .............................................................................................. 24 8.1.1 Roles and responsibilities .......................................................................... 24 8.1.2 Screening .................................................................................................. 25 8.1.3 Terms and conditions of employment ......................................................... 26 During Employment ............................................................................................... 27 8.2.1 Management responsibilities ...................................................................... 27 8.2.2 Information security awareness, education, and training ............................ 28 8.2.3 Disciplinary process ................................................................................... 29 This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 78 ISA‑62443-2-2, D1E4, April 2013 ISA99, WG02, TG02 8.3 9 Termination or Change of Employment .................................................................. 29 8.3.1 Termination responsibilities ....................................................................... 29 8.3.2 Return of assets ........................................................................................ 29 8.3.3 Removal of access rights ........................................................................... 29 Physical and Environmental Security .............................................................................. 30 125 126 127 128 129 130 131 132 133 134 135 136 9.1 9.2 Introduction ........................................................................................................... 30 Secure Areas ........................................................................................................ 30 9.2.1 {Requirement} ........................................................................................... 30 9.3 Equipment Security ............................................................................................... 30 9.3.1 Physical Access Authorizations ................................................................. 30 9.3.2 Physical Access Control ............................................................................ 31 9.3.3 Access Control for Communication Medium ............................................... 31 9.3.4 Access Control for Display Medium ............................................................ 32 9.3.5 Monitoring Physical Access ....................................................................... 32 9.3.6 Visitor Control ............................................................................................ 32 9.3.7 Access Records ......................................................................................... 32 10 Communications and Operations Management ............................................................... 33 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 10.1 Introduction ........................................................................................................... 33 10.2 Operational Procedures and Responsibilities ......................................................... 33 10.2.1 Automated Marking .................................................................................... 33 10.3 Third Party Service Delivery Management ............................................................. 33 10.3.1 {Requirement} ........................................................................................... 33 10.4 System planning and acceptance .......................................................................... 33 10.4.1 {Requirement} ........................................................................................... 33 10.5 Protection against malicious and mobile code ....................................................... 34 10.5.1 Malicious Code Protection ......................................................................... 34 10.5.2 Security Alerts and Advisories ................................................................... 34 10.6 Backup .................................................................................................................. 34 10.6.1 {Requirement} ........................................................................................... 34 10.7 Network Security Management .............................................................................. 35 10.7.1 {Requirement} ........................................................................................... 35 10.8 Media Handling ..................................................................................................... 35 10.8.1 Media Protection Policy and Procedures .................................................... 35 10.8.2 Media Access ............................................................................................ 35 10.8.3 Media Labeling .......................................................................................... 36 10.8.4 Media Storage ........................................................................................... 36 10.8.5 Media Transport ........................................................................................ 37 10.8.6 Media Sanitization and Disposal ................................................................ 38 10.8.7 Access Control for Display Medium ............................................................ 38 10.8.8 Public Key Infrastructure Certificates ......................................................... 38 10.9 Exchange of Information ........................................................................................ 39 10.9.1 {Requirement} ........................................................................................... 39 10.10 Electronic Commerce Services .............................................................................. 39 10.10.1 {Requirement} ........................................................................................... 39 10.11 Monitoring ............................................................................................................. 39 This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 120 121 122 123 124 –8– –9– ISA99, WG02, TG02 165 166 167 168 169 10.11.1 Audit and Accountability Policy and Procedures ......................................... 39 10.11.2 Auditable Events........................................................................................ 40 10.11.3 Audit Monitoring, Analysis and Reporting ................................................... 40 10.11.4 Audit Record Retention .............................................................................. 40 11 Access Control ............................................................................................................... 41 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 11.1 Introduction ........................................................................................................... 41 11.2 Business Requirement ........................................................................................... 41 11.2.1 Access Control Policy and Procedures ...................................................... 41 11.2.2 System and Information Integrity Policy and Procedures ............................ 41 11.2.3 Flaw Remediation ...................................................................................... 42 11.3 User Access Management ..................................................................................... 42 11.3.1 Account Management ................................................................................ 42 11.3.2 Separation of Duties .................................................................................. 43 11.4 User Responsibilities ............................................................................................. 43 11.4.1 {Requirement} ........................................................................................... 43 11.5 Network Access Control ........................................................................................ 44 11.5.1 Least Privilege ........................................................................................... 44 11.5.2 Permitted Actions Without Identification or Authentication ......................... 44 11.5.3 Remote Access.......................................................................................... 44 11.5.4 Use of External Information Systems ......................................................... 45 11.6 Operating System Access Control ......................................................................... 45 11.6.1 {Requirement} ........................................................................................... 45 11.7 Application and Information Access Control ........................................................... 46 11.7.1 {Requirement} ........................................................................................... 46 11.8 Mobile Computing and Teleworking ....................................................................... 46 11.8.1 Wireless Access Restrictions ..................................................................... 46 11.8.2 Use Control for Portable and Mobile Devices ............................................. 46 11.8.3 Mobile Code .............................................................................................. 47 11.8.4 Supervision and Review – Use Control ...................................................... 47 11.8.5 Identification and Authentication Policy and Procedures ............................ 47 11.8.6 Identifier Management ............................................................................... 48 11.8.7 Authenticator Management ........................................................................ 48 11.8.8 Software and Information Integrity ............................................................. 49 11.8.9 Information Input Restrictions .................................................................... 49 11.8.10 Error Handling ........................................................................................... 49 11.8.11 Information Output Handling and Retention ............................................... 50 11.8.12 Boundary Protection .................................................................................. 50 12 Systems acquisition, development and maintenance ...................................................... 51 203 204 205 206 207 208 209 12.1 Introduction ........................................................................................................... 51 12.2 Security requirements of information systems ........................................................ 51 12.2.1 {Requirement} ........................................................................................... 51 12.3 Correct Processing in Applications ........................................................................ 51 12.3.1 {Requirement} ........................................................................................... 51 12.4 Cryptographic Controls .......................................................................................... 51 12.4.1 Cryptographic Module Validation ............................................................... 51 This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 – 10 – ISA99, WG02, TG02 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 12.5 Security of System Files ........................................................................................ 51 12.5.1 {Requirement} ........................................................................................... 51 12.6 Security in development and support processes .................................................... 52 12.6.1 {Requirement} ........................................................................................... 52 12.7 Technical vulnerability management ...................................................................... 52 12.7.1 Configuration Management Policy and Procedures .................................... 52 12.7.2 Baseline Configuration ............................................................................... 52 12.7.3 Configuration Change Control .................................................................... 53 12.7.4 Monitoring Configuration Changes ............................................................. 53 12.7.5 Access Restrictions for Change ................................................................. 54 12.7.6 Network and Security Configuration Settings ............................................. 54 12.7.7 IACS Component Inventory ........................................................................ 54 12.7.8 System Maintenance Policy and Procedures .............................................. 55 12.7.9 Controlled Maintenance ............................................................................. 55 12.7.10 Maintenance Tools .................................................................................... 56 12.7.11 Remote Maintenance ................................................................................. 56 12.7.12 Maintenance Personnel ............................................................................. 57 12.7.13 Timely Maintenance ................................................................................... 57 13 Incident Management ..................................................................................................... 58 229 230 231 232 233 234 235 236 237 238 239 240 241 13.1 Introduction ........................................................................................................... 58 13.2 Reporting Security Events and Weaknesses .......................................................... 58 13.2.1 {Requirement} ........................................................................................... 58 13.3 Management of Incidents and Improvements ......................................................... 58 13.3.1 Incident Response Policy and Procedures ................................................. 58 13.3.2 Incident Response Training ....................................................................... 58 13.3.3 Incident Response Testing and Exercises .................................................. 59 13.3.4 Incident Handling ....................................................................................... 59 13.3.5 Incident Monitoring .................................................................................... 59 13.3.6 Incident Reporting ..................................................................................... 60 13.3.7 Incident Response Assistance ................................................................... 60 13.3.8 IACS Monitoring Tools and Techniques ..................................................... 60 14 Business Continuity Management ................................................................................... 62 242 243 244 245 246 247 248 249 250 251 252 253 254 14.1 Introduction ........................................................................................................... 62 14.2 Security Aspects.................................................................................................... 62 14.2.1 Contingency Planning Policy and Procedures ............................................ 62 14.2.2 Contingency Plan ...................................................................................... 62 14.2.3 Contingency Training ................................................................................. 63 14.2.4 Contingency Plan Testing and Exercises ................................................... 63 14.2.5 Contingency Plan Update .......................................................................... 64 14.2.6 Alternate Storage Site ............................................................................... 64 14.2.7 Alternate Control Site ................................................................................ 64 14.2.8 IACS Backup ............................................................................................. 65 14.2.9 IACS Recovery and Reconstruction ........................................................... 65 14.2.10 Power Equipment and Cabling ................................................................... 66 14.3 Telecommunications Services ............................................................................... 66 This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 ISA‑62443-2-2, D1E4, April 2013 – 11 – ISA99, WG02, TG02 14.3.1 14.3.2 14.3.3 14.3.4 14.3.5 14.3.6 15 Compliance Emergency Shutoff .................................................................................... 66 Emergency Power...................................................................................... 67 Emergency Lighting ................................................................................... 67 Fire Protection ........................................................................................... 67 Temperature and Humidity Controls ........................................................... 68 Water Damage Protection .......................................................................... 68 .................................................................................................................... 68 262 263 264 15.1 General ................................................................................................................. 68 15.1.1 {Requirement} ........................................................................................... 68 Annex A (informative) Foundational Requirements ................................................................ 70 265 266 267 268 269 270 271 272 273 A.1 A.2 A.3 A.4 A.5 A.6 A.7 A.8 Annex B 274 275 B.1 Overview ............................................................................................................... 72 BIBLIOGRAPHY ................................................................................................................... 73 Overview ............................................................................................................... 70 FR1 A CCESS C ONTROL ............................................................................................ 70 FR2 U SE C ONTROL ................................................................................................. 70 FR3 D ATA I NTEGRITY .............................................................................................. 70 FR4 D ATA C ONFIDENTIALITY .................................................................................... 70 FR5 R ESTRICT D ATA F LOW ...................................................................................... 71 FR6 T IMELY R ESPONSE TO AN E VENT ....................................................................... 71 FR7 R ESOURCE A VAILABILITY ................................................................................... 71 (informative) - Mapping Controls to Foundational Requirements ............................. 72 276 277 No table of figures entries found. 278 No table of figures entries found. 279 This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 255 256 257 258 259 260 261 ISA‑62443-2-2, D1E4, April 2013 – 12 – ISA99, WG02, TG02 280 FORWORD 281 282 283 284 This standard is part of a series that addresses the issue of security for industrial automation and control systems. It has been developed by Working Group 02, Task Group 02 of the ISA99 committee. 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 SKELETON NOTE The forward should only be a few lines and should indicate the basic premise of the document and why it is important. It should also indicate if this document supersedes or modifies any other document. The following information comes from the IEC Directives. The foreword shall appear in each document. It shall not contain requirements, recommendations, figures or tables. It consists of a general part and a specific part. The general part (supplied by the Central Secretariat of ISO or by the Central Office of the IEC, as appropriate) gives information relating to the organization responsible and to International Standards in general, i.e. a) the designation and name of the committee that prepared the document, b) information regarding the approval of the document, and c) information regarding the drafting conventions used, co mprising a reference to this part of the ISO/IEC Directives. The specific part (supplied by the committee secretariat) shall give a statement of significant technical changes from any previous edition of the document and as many of the following as are appropriate: d) an indication of any other international organization that has contributed to the preparation of the document; e) a statement that the document cancels and replaces other documents in whole or in part; f) the relationship of the document to other documents (see 5.2.1.3); g) in IEC, an indication of the next stability date (see ISO/IEC Directives, IEC Supplement, 2010, 3.4). This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 302 This standard addresses the requirements for the operation of an effective cyber security program within the context of the foundational requirements defined in ISA‑62443-1-1. ISA‑62443-2-2, D1E4, April 2013 – 13 – ISA99, WG02, TG02 INTRODUCTION 303 The format of this document follows the ISO/IEC requirements discussed in ISO/IEC Directives, Pa rt 2. [12] 1 The ISO/IEC Directives specify the format of this document as well as the use of terms like “shall”, “should”, and “may”. The use of those terms for the requirements specified in Clause Error! Reference source not f ound. of this document use the conventions discussed in the ISO/IEC Directives, Appendix H. 304 305 306 307 308 309 NOTE 310 Context 311 312 313 314 315 Industrial automation and control system (IACS) organizations increasingly use commercial -offthe-shelf (COTS) networked devices that are inexpensive, efficient and highly automated. These devices and networking technologies provide an increased opportunity for cyber attack against the IACS equipment. This weakness may lead to health, safety and environmenta l (HSE) consequences in deployed systems. 316 317 318 319 320 321 Organizations deploying pre-existing information technology (IT) and business cyber security solutions to address IACS security may not fully comprehend the results of this decision. While many business IT applications and security solutions can be applied to IACS, they need to be applied in the correct way to eliminate inadvertent consequences. For this reason, the approach used to define system requirements needs to be based on a combination of functional and consequence analysis, and often an awareness of operational issues as well. 322 323 324 325 326 327 328 The primary goal of the ISA‑99 series is to provide a flexible framework that facilitates addressing current and future vulnerabilities in IACS and applying necessary mitigations in a systematic, defensible manner. It is important to understand that the intention of the ISA ‑99 series is to build extensions to enterprise security that adapt the requirements for IT business systems and combine them with the unique requirements that embrac e the strong availability needed by IACS. The ISA‑99 committee has made every effort to avoid building unique stovepipe security architectures for IACS. 329 330 331 332 This International Standard provides interpretation guidelines for the implementation and management of information security management for Industrial Automation and Control Systems (IACS). The approach used is consistent with ISO/IEC 27002 (Code of practice for information security management). 333 334 335 336 337 IACS security goals focus on system availability, plant prote ction, plant operations (even if in a degraded mode), and time-critical system response. IT security goals often do not place the same emphasis on these factors. They may be more concerned with protecting information rather than physical assets. These different goals need to be clearly stated as security objectives regardless of the degree of plant integration achieved. 338 339 340 This document assumes that a security program has been established in accordance with ISA‑99.02.01 and that patch management is implemented consistent with the recommendations detailed in ISA‑TR99.02.03. 341 Audience 342 343 344 345 346 The audience for the information in this standard includes asset owners, those responsible for information security; system vendors, auditors, and application content providers, with a common set of general security control objectives based on ISO/IEC 27002, IACS specific controls, and information security management guidelines allowing for the selection and implementation of such controls. 347 ————————— 1 Numbers in square brackets refer to the Bibliography. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. The initial content of this section is based on similar material from other standards in the ISA99 series. This is provided only as a starting point. ISA‑62443-2-2, D1E4, April 2013 368 369 ISA99, WG02, TG02 SKELETON NOTE For most documents in the ISA-99 series, the Introduction will probably be labeled as Clause 0, since there are sub-clauses included. This is common. The Introduction should be limited to no more than 2 pages and should contain no figures. If figures are needed, then that section sh ould be moved to Clause 4+ or an Annex. If you need a Clause 0, you will need to edit the “iecstd_us.dotm” and change starting number for the Heading style to start at 0. After that, make sure that the styles reload into the Skeleton file and change the style of the Introduction section header to Heading instead of Heading (Nonumber). The Introduction should indicate major similarities or relationships between the document and existing ISO/IEC documents. It does not have to include detailed explanations, bu t should give the reader some context in relation to other documents. The following information comes from the IEC Directives. The introduction is an optional preliminary element used, if required, to give specific information or commentary about the technical content of the document, and about the reasons prompting its preparation. It shall not contain requirements. Whenever alternative solutions are adopted internationally in a document and preferences for the different alternatives provided, the reasons for the preferences shall be explained in the introduction [see A.6 d)]. Where patent rights have been identified in a document, the introduction shall include an appropriate notice. See Annex F for further information. The introduction shall not be numbered unless there is a need to create numbered subdivisions. In this case, it shall be numbered 0, with subclauses being numbered 0.1, 0.2, etc. Any numbered figure, table, displayed formula or footnote shall be numbered normally beginning with 1. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 – 14 – ISA‑62443-2-2, D1E4, April 2013 – 15 – ISA99, WG02, TG02 1 371 372 The initial content of this section is based on similar material from other standards in the ISA99 series. This is provided only as a starting point. 373 374 375 376 377 378 This standard addresses the operation of an effective IACS cyber security program. Aspects of this operation are examined in the context of the foundational requirements (FRs) described in ISA‑99.01.01. The requirements and controls would be used by various members of the industrial automation and control systems (IACS) community along with the defined zones an d conduits for the system under consideration (SuC) while developing the appropriate technical system target security assurance level (SAL), SAL-T(system), for a specific asset. 379 380 381 382 383 384 385 386 387 388 389 390 391 SKELETON NOTE Clause 1 shall always be the Scope. This is a short statement that describes the scope of this document only. It does not list the overall scope of ISA -99. That has been described in other documents and does not need to be repeated here. The following information comes from the IEC Directives. This element shall appear at the beginning of each document and define without ambiguity the subject of the document and the aspects covered, thereby indicating the limits of applicability of the document or particular parts of it. It shall not contain requirements. In documents that are subdivided into parts, the scope of each part shall define the subject of that part of the document only. The scope shall be succinct so that it can be used as a summary for bibliographic purposes. This element shall be worded as a series of statements of fact. Forms of expression such as the following shall be used: “This International Standard the dimensions of … " - specifies {a method of … " the characteristics of … " a system for … " - establishes { general principles for … " 392 393 394 395 396 397 398 399 Scope — gives guidelines for …” — defines terms …” Statements of applicability of the document shall be introduced by wording such as: “This International Standard is applicable to …” The wording shall be altered as a function of the document type concerned, i.e. International Standard, Technical Specification, Publicly Available Specification, Technical Report or Guide. 400 2 Normative references 401 402 403 The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. 404 405 406 The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. F or undated references, the latest edition of the referenced document (including any amendments) applies. 407 408 ISA‑99.01.01 – Security for industrial and automation control systems: Terminology, concepts and models 409 410 ISA‑99.02.01 – Security for industrial and automation control system: Establishing an industrial automation and control systems security program 411 412 ISA‑99.03.02 – Security for industrial and automation control system: Security assurance levels for zones and conduits 413 414 SKELETON NOTE Generally, in the ISA-99 series, there is only 1 completely normative document, ISA -99.01.01. If there are others, put them here as well. Normative references shall be International Standards documents of This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 370 ISA‑62443-2-2, D1E4, April 2013 415 416 – 16 – ISA99, WG02, TG02 some sort. Even though a document gets listed here, it will also be liste d in the Bibliography along with all the other documents. 417 3 Terms, definitions, abbreviated terms, acronyms, and conventions 418 419 The initial content of this section is based on similar material from other standards in the ISA99 series. This is provided only as a starting point. 420 3.1 421 422 For the purposes of this document, the terms and definitions given in ISA‑62443-1-1 and the following apply. 423 424 425 426 3.1.1 authentication verifying the identity of an IACS user, often as a prerequisite to allowing access to resources in an information system 427 428 429 3.1.2 authenticity property of being genuine and being able to be verified and trusted 430 NOTE 431 432 433 434 3.1.3 automatic pertaining to a process or equipment that, under specified conditions, functions without human intervention 435 [IEV number 351-21-40] 436 437 438 3.1.4 availability ensuring timely and reliable access to and use of information 439 [FIPS 199] 440 441 442 443 3.1.5 communication channel logical or physical point-to-point or point-to-multipoint data flow between components in one zone to one or more components in another zone 444 445 446 447 3.1.6 confidentiality preserving authorized restrictions on information access and disclosure, including means fo r protecting personal privacy and proprietary information 448 [FIPS 199] 449 450 451 452 3.1.7 connection association established between two or more endpoints which supports the transfer of IACS specific data 453 454 455 3.1.8 consequence outcome of an event 456 457 458 459 3.1.9 environment aggregate of external procedures, conditions, and objects affecting the development, operation and maintenance of IACS It may also be defined as confidence in the validity of a transmission, a message, or message o riginator. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. Terms and definitions – 17 – ISA99, WG02, TG02 460 461 462 3.1.10 event occurrence or change of a particular set of circumstances 463 464 465 466 3.1.11 external information systems hardware, software components and repositories that are connecte d by some means or embedded within the component 467 468 469 470 3.1.12 IACS user entity (including human users, processes and devices) that performs a function in the IACS or a component used by the IACS 471 472 473 3.1.13 impact evaluated consequence of a particular event 474 475 476 3.1.14 industrial automation and control system system which controls the manufacturing process within a defined set of operational limits 477 478 479 480 3.1.15 integrity guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity 481 [FIPS 199] 482 483 484 485 486 3.1.16 local access any access to an organizational IACS by an IACS user communicating through an internal, organization-controlled network (such as a local area network) or directly to the IACS without the use of a network 487 488 489 490 491 3.1.17 non-repudiation assurance that the sender of information is provided with proof of delivery and all recipients are provided with proof of the sender’s identity, so the sender cannot deny having sent the information and the recipient cannot deny having received the information 492 493 494 495 3.1.18 remote access any access to an IACS by an IACS user communicating through an external, non -organizationcontrolled network (such as the Internet) 496 497 498 499 3.1.19 remote session session initiated whenever an IACS is accessed by a human user communicating across the boundary of a zone defined by the asset owner based on their risk assessment 500 501 502 503 3.1.20 role set of connected behaviors, privileges and obligations associated to IACS users in a given situation 504 NOTE 1 The privileges to perform certain operations are assigned to specific ro les. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 ISA‑62443-2-2, D1E4, April 2013 – 18 – ISA99, WG02, TG02 505 506 507 508 NOTE 2 509 510 511 512 513 3.1.21 security assurance level measure of confidence that computer systems and data are free from vulnerabilities, either intentionally designed computer components or accidently inserted at any time during its lifecycle, and that the computer systems functions in the intended manner 514 515 516 517 3.1.22 session semi-permanent, stateful, communicating devices 518 NOTE 519 520 521 522 523 3.1.23 threat any circumstance or event with the potential to adversely affect organizational operations (including mission, functions, image or reputation), organizational assets, IACS or individuals via unauthorized access, destruction, disclosure, modification of dat a and/or denial of service 524 525 526 527 3.1.24 trust belief that an operation or data transaction source or process is secure and will perform as intended 528 529 530 3.1.25 untrusted entity that has not met predefined requirements to be trusted 531 532 533 534 535 536 537 538 3.1.26 vulnerability 539 3.2 540 This subclause defines the abbreviated terms and acronyms used in this document. Role definitions must be distinguished in infrastructure role definitions (within a process), functional role definitions (part of an entity functions) or organizational role definition (a person position). A functional role may be associated with privileges and confer responsibility and authority on a user assigned to that role interactive information interchange between two or more Typically a session has a clearly defined start process and end process. weakness in an IACS function, procedure, internal control or implementation that could be exploited or triggered by a threat source SKELETON NOTE Only add in the reference at the end of the term if it relates directly to something from an international standard. IEC seems to dislike referencing national standards documents (ISA, NIST, NERC, NEMA, etc.). Only include these references if there is an ISO/IEC, NATO, etc. reference. Also, if the reference is not exactly from the reference, indicate something like “Adapted from … ”. Abbreviated terms and acronyms AC Access Control AES Advanced encryption standard API Application programming interface CA Certification authority CIP Critical infrastructure protection COTS Commercial-off-the-shelf DC Data confidentiality DI Data integrity DMZ Demilitarized zone This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. Adapted from [ISO/IEC 1st WD 24760: 2005 -10-01] – 19 – DoS Denial of service FR Foundational requirement FTP File transfer protocol HSE Health, safety, and environmental HTTP Hypertext transfer protocol IACS Industrial automation and control system(s) ID Identifier IDS Intrusion detection system IEC International Electrotechnical Commission IEEE Institute of Electrical and Electronics Engineers IM Instant messaging IPS Intrusion prevention system ISO International Organization for Standardization IT Information technology NERC North American Electric Reliability Corporation NIST U.S. National Institute of Standards and Technology PDF Portable document format RA Resource availability RDF Restrict data flow RE Requirement enhancement SAL Security assurance level SIS Safety instrumented system SP Special Publication (from NIST) SR System requirement SuC System under consideration TRE Timely response to an event UC Use control US-CERT U.S. Computer Emergency Readiness Team USB Universal serial bus VoIP Voice over internet protocol ISA99, WG02, TG02 541 3.3 Conventions 542 543 544 545 546 Much of the content of this standard is expressed in the form of specific requirements or controls. Each of these has a baseline requirement and zero or more requirement enhancements to strengthen security assurance. Rationale and supplemental guidance may be provided for each baseline requirement, and for any associated enhancement as is deemed necessary, to provide clarity to the reader. 547 548 SKELETON NOTE This sub-clause is where specific conventions used in the document, like specific clause/sub clause formatting, special text conventions, or any other things that the reader should know in order to read This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 549 550 – 20 – This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 ISA99, WG02, TG02 the document. The reader may still need some introduction to conventions used throughout the document, but this sub-clause allows for a greater explanation in one place. 551 ISA‑62443-2-2, D1E4, April 2013 – 21 – ISA99, WG02, TG02 552 4 Overview 553 4.1 554 555 556 The content of this standard has been organized in a manner similar to that used in ISO/IEC 27002. In cases where objectives and controls specified in ISO/IEC 27002 are applicable without a need for any additional information, only a reference is provided to ISO/IEC 27002. 557 558 559 560 In cases where controls need additional guidance spec ific to IACS, the ISO/IEC 27002 control and implementation guidance is repeated without modification, followed by the IACS specific guidance related to this control. IACS specific guidance and information is included in the following clauses: 561 – Organization of information security (clause 6) 562 – Asset management (clause 7) 563 – Human resources security (clause 8) 564 – Physical and environmental security (clause 9) 565 – Communications and operations management (clause 10) 566 – Access control (clause 11) 567 – Information systems acquisition, development and maintenance (clause 12) 568 – Information security incident management (clause 13) 569 – Business continuity management (clause 14) 570 4.2 571 4.2.1 572 573 574 575 Industrial control systems and associated networks are faced with security threats from a wide range of sources, including computer-assisted fraud, espionage, sabotage, vandalism, information leakage, earthquake, fire or flood. These security threats may originate from inside or outside the control systems environment resulting in damage to the organization. 576 577 578 579 Once the security of an IACS is compromised, for example by unauthorized access, the system or the equipment under control may suffer damage. Therefore, it is essential for an asset owner to ensure its security by continuously improving its related programs in accordance with ISO/IEC 27001. 580 581 582 583 584 Effective IACS security is achieved by implementing a suitable set of controls based on those described in this standard. These controls need to be established, implemen ted, monitored, reviewed and improved in facilities, services and applications. The successful deployment of security controls will better enable meeting the security and business objectives of the organization to be met. 585 4.2.2 586 587 588 In order to establish information security management, it is essential for an asset owner to clarify and identify all IACS related assets. The clarification of attributes and importance of the assets makes it possible to implement appropriate controls. Information security management in IACS Goal IACS assets to be protected This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. Structure ISA‑62443-2-2, D1E4, April 2013 – 22 – ISA99, WG02, TG02 589 4.2.3 Establishment of information security management 590 4.2.3.1 591 592 It is essential for asset owners to identify their security requirements. There are three main sources of security requirements as follows: 593 594 595 a) What is derived from assessing risks to IAC S operation, taking into account the overall business strategy and objectives. Through risk assessment, threats to assets are identified, vulnerability to and likelihood of occurrence is evaluated and potential impact is estimated; 596 597 b) The legal, statutory, regulatory, and contractual requirements that asset owners have to satisfy, and the socio-cultural environment; 598 599 c) The particular set of principles, objective and business requirements for information processing that an asset owner has developed to support its operations. 600 4.2.3.2 601 602 603 604 605 Security requirements are identified by a methodical assessment of security risks. Expenditure on controls needs to be balanced against the business harm likely to result from security failures. The results of the risk assessment will help to guide and determine the appropriate management action and priorities for managing information security risks, and for implementing controls selected to protect against these risks. 606 607 Risk assessment should be repeated periodically to address any changes that might influence the risk assessment results. 608 4.2.3.3 609 610 611 Once security requirements and risks have been identified and decisions for the treatment of risks have been made, appropriate controls should be selected and implemented to ensure risks are reduced to an acceptable level. 612 613 614 615 This standard provides guidance and IACS specific controls, in addition to general information security management, taking account of IACS specific requirements. Therefore, asset owners are recommended to select controls from this guideline and implement them. In addition, new controls can be designed to meet specific needs as appropriate. 616 617 618 619 The selection of security controls is dependent upon organizational decisions based on the criteria for risk acceptance, risk treatment options, and the general risk management approach applied by asset owners, and should also be subject to all relevant national and international legislation and regulations. 620 4.2.3.4 621 622 Experience has shown that the following factors are often critical to the successful implementation of information security in an industrial automation and control system : 623 624 a) information security policy, objectives, and activities t hat reflect business objectives and the specific characteristics of an IACS; 625 626 b) an approach and framework to implementing, maintaining, monitoring, and improving information security that is consistent with the organizational culture; 627 c) visible support and commitment from all levels of managem ent; 628 d) a good understanding of the security requirements, risk assessment, and risk management; 629 630 e) effective marketing of information security to all managers, employees, and other parties to achieve awareness; Assessing security risks Selecting controls Critical success factors This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. How to establish security requirements – 23 – ISA99, WG02, TG02 631 632 f) distribution of guidance on information security policy and standards to all managers, employees and other parties; 633 g) provision to fund information security management activities; 634 h) providing appropriate awareness, training, and education; 635 i) establishing an effective information security inci dent management process; 636 637 j) implementation of a measurement system that is used to evaluate performance in information security management and feedback suggestions for improvement. 638 5 639 5.1 640 5.1.1 Security Policy Introduction 641 {Requirement} Requirement: 642 643 Foundational Requirement: 644 Rationale/Supplemental Guidance: 645 Requirement Enhancements: 646 647 6 Organization of Security 648 6.1 Introduction 650 6.2 Internal Organization 651 6.2.1 649 652 {Requirement} Requirement: 653 654 Foundational Requirement: 655 Rationale/Supplemental Guidance: 656 Requirement Enhancements: 657 658 6.3 659 6.3.1 660 External Parties {Requirement} Requirement: 661 662 Foundational Requirement: 663 Rationale/Supplemental Guidance: 664 Requirement Enhancements: This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 ISA‑62443-2-2, D1E4, April 2013 – 24 – ISA99, WG02, TG02 665 666 7 Asset Management 667 7.1 Introduction 669 7.2 Responsibility for Assets 670 7.2.1 668 671 Requirement: 672 673 Foundational Requirement: 674 Rationale/Supplemental Guidance: 675 Requirement Enhancements: 676 677 7.3 Information Classification 678 7.3.1 679 {Requirement} Requirement: 680 681 Foundational Requirement: 682 Rationale/Supplemental Guidance: 683 Requirement Enhancements: 684 685 8 Human Resources Security 686 8.1 Prior to Employment 687 688 689 Objective: To ensure that employees, contractors and third party users understand their responsibilities, and are suitable for the roles they are considered for, and to reduce the risk of theft, fraud or misuse of facilities. 690 691 Security responsibilities should be addressed prior to e mployment in adequate job descriptions and in terms and conditions of employment. 692 693 All candidates for employment, contractors and third party users should be adequately screened, especially for sensitive jobs. 694 695 Employees, contractors and third party users of information processing facilities should sign an agreement on their security roles and responsibilities. 696 8.1.1 697 Control 698 699 Security roles and responsibilities of employees, contractors and third party users should be defined and documented in accordance with the organization’s information security policy. 700 Implementation guidance Roles and responsibilities This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. {Requirement} ISA‑62443-2-2, D1E4, April 2013 ISA99, WG02, TG02 Security roles and responsibilities should include the requirement to: 702 703 a) implement and act in accordance with the organization’s information security policies (see 5.1); 704 705 b) protect assets from unauthorized access, disclosure, modification, destruction or interference; 706 c) execute particular security processes or activities; 707 d) ensure responsibility is assigned to the individual for actions taken; 708 e) report security events or potential events or other security risks to the organization. 709 710 Security roles and responsibilities should be defined and clearly communicated to job candidates during the pre-employment process. 711 IACS-specific implementation guidance 712 713 714 715 Facilities should appoint staff who have the right credentials or appropriate knowledge and skills to be in charge of the supervision of matters related to the installation, maintenance and operation of IACS. The relevant staff should be notified of their assigned roles and responsibilities. 716 Other Information 717 718 719 Job descriptions can be used to document security roles and responsibilities. Security roles and responsibilities for individuals not engaged via the organization’s employment process, e.g. engaged via a third party organization, should also be clearly defined and communicated. 720 721 Requirement: 722 723 Foundational Requirement: 724 Rationale/Supplemental Guidance: 725 Requirement Enhancements: 726 727 8.1.2 Screening 728 Control 729 730 731 732 Background verification checks on all candidates for employment, contractors, and third party users should be carried out in accordance with relevant laws, regulations and ethics, and proportional to the business requirements, the classification of the information to be accessed, and the perceived risks. 733 Implementation guidance 734 735 Verification checks should take into account all relevant privacy, protection of personal data and/or employment based legislation, and should, where permitted, include the following: 736 a) availability of satisfactory character references, e.g. one business and one per sonal; 737 b) a check (for completeness and accuracy) of the applicant’s curriculum vitae; 738 c) confirmation of claimed academic and professional qualifications; 739 d) independent identity check (passport or similar document); This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 701 – 25 – – 26 – ISA99, WG02, TG02 740 e) more detailed checks, such as credit checks or checks of criminal records. 741 742 743 744 Where a job, either on initial appointment or on promotion, involves the person having access to information processing facilities, and in particular if these are handling sensitive information, e.g. financial information or highly confidential information, the organization should also consider further, more detailed checks. 745 746 Procedures should define criteria and limitations for verification checks, e.g. who is eligible to screen people, and how, when and why verification checks a re carried out. 747 748 749 750 751 752 A screening process should also be carried out for contractors, and third party users. Where contractors are provided through an agency the contract with the agency should clearly specify the agency’s responsibilities for screening and the notification procedures they need to follow if screening has not been completed or if the results give cause for doubt or concern. In the same way, the agreement with the third party (see also 6.2.3) should clearly specify all responsibilities and notification procedures for screening. 753 754 755 756 Information on all candidates being considered for positions within the organization should be collected and handled in accordance with any appropriate legislation existing in the relevant jurisdiction. Depending on applicable legislation, the candidates should be informed beforehand about the screening activities. 757 IACS-specific implementation guidance 758 759 760 Facilities should also consider further, more detailed checks for job positions that give staff access to IACS that have been assessed as critical and thus require higher levels of security. [wording?] 761 8.1.3 762 Control 763 764 765 As part of their contractual obligation, employees, contractors and third party users should agree and sign the terms and conditions of their employment contract, which should state their and the organization’s responsibilities for information security. 766 Implementation guidance 767 768 The terms and conditions of employment should reflect the organization’s security policy in addition to clarifying and stating: 769 770 771 a) that all employees, contractors and third party users who are given access to sensitive information should sign a confidentiality or non-disclosure agreement prior to being given access to information processing facilities; 772 773 b) the employee’s, contractor’s and any other user’s legal responsibilities and rights, e.g. regarding copyright laws or data protection legislation (see also 15.1.1 and 15.1.2); 774 775 776 c) responsibilities for the classification of information and management of organizational assets associated with information systems and services handled by the employee, contractor or third party user (see also 7.2.1 and 10.7.3); 777 778 d) responsibilities of the employee, contractor or third party user for the handling of information received from other companies or external parties; 779 780 781 e) responsibilities of the organization for the handling of personal information, including personal information created as a result of, or in the course of, employment with the organization (see also 15.1.4); 782 783 f) Terms and conditions of employment responsibilities that are extended outside the organization’s premises and outside normal working hours, e.g. in the case of home-working (see also 9.2.5 and 11.7.1); This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 – 27 – ISA99, WG02, TG02 784 785 g) actions to be taken if the employee, contractor or third party user disregards the organization’s security requirements (see also 8.2.3). 786 787 788 The organization should ensure that employees, contractors and third party users agree to terms and conditions concerning information security appropriate to the nature and extent of access they will have to the organization’s assets associated with information systems and services. 789 790 Where appropriate, responsibilities contained within the terms and conditions of employment should continue for a defined period after the end of the employment (see also 8.3). 791 IACS-specific implementation guidance 792 793 Facilities should clarify and state the responsibilities for maintaining IACS availability, plant protection, plant operations (even if in a degraded mode), and time -critical system response. 794 Other Information 795 796 797 798 799 800 A code of conduct may be used to cover the employee’s, contractor’s or third party user’s responsibilities regarding confidentiality, data protection, ethics, appropriate use of the organization’s equipment and facilities, as well as reputable practices expected by the organization. The contractor or third party users may be associated with an external organization that may in turn be required to enter in contractual arrangements on behalf of the contracted individual. 801 8.2 During Employment 802 803 804 805 Objective: To ensure that employees, contractors and third party users are aware of information security threats and concerns, their responsibilities and liabilities, and are equipped to support organizational security policy in the course of their normal work, and to reduce the risk of human error. 806 807 Management responsibilities should be defined to ensure that security is applied throughout an individual’s employment within the organization. 808 809 810 811 An adequate level of awareness, education, and training in security procedures and the correct use of information processing facilities should be provided to all employees, contractors and third party users to minimize possible security risks. A formal disciplinary process for handling security breaches should be established. 812 8.2.1 813 Control 814 815 Management should require employees, contractors and third party users to apply security in accordance with established policies and procedures of the organization. 816 Implementation guidance 817 818 Management responsibilities should include ensuring that employees, contractor s and third party users: 819 820 a) are properly briefed on their information security roles and responsibilities prior to being granted access to sensitive information or information systems; 821 b) are provided with guidelines to state security expectations of their role within the organization; 822 c) are motivated to fulfil the security policies of the organization; 823 824 d) achieve a level of awareness on security relevant to their roles and responsibilities within the organization (see also 8.2.2); Management responsibilities This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 ISA‑62443-2-2, D1E4, April 2013 – 28 – ISA99, WG02, TG02 825 826 e) conform to the terms and conditions of employment, which includes the organization’s information security policy and appropriate methods of working; 827 f) continue to have the appropriate skills and qualifications. 829 IACS-specific implementation guidance 830 831 Management should ensure that individuals responsible for operating and maintaining IACS are included in the above mentioned activities 832 Other Information 833 834 835 If employees, contractors and third party users are not made aware of their security responsibilities, they can cause considerable damage to an organization. Motivated personnel are likely to be more reliable and cause less information security incidents. 836 837 838 Poor management may cause personnel to feel undervalued resulting in a negative security impact to the organization. For example, poor management may lead to security being neglected or potential misuse of the organization’s assets. 839 Requirement: 840 Foundational Requirement: 841 Rationale/Supplemental Guidance: 842 Requirement Enhancements: 843 8.2.2 Information security awareness, education, and training 844 Control 845 846 847 All employees of the organization and, where relevant, contractors and third party users should receive appropriate awareness training and regular updates in organizational policies and procedures, as relevant for their job function. 848 Implementation guidance 849 850 851 Awareness training should commence with a formal induction process designed to introduce the organization’s security policies and expectations before access to information or services is granted. 852 853 854 Ongoing training should include security requirements, legal responsibilities and business controls, as well as training in the correct use of information processing facilities e.g. log -on procedure, use of software packages and information on the disciplinary process (see 8.2.3). 855 IACS-specific implementation guidance 856 857 858 Individuals responsible for operating and maintaining IACS should be included in the above mentioned activities and, where necessary, specific training should be developed for individuals in these roles. 859 Other Information 860 861 862 863 The security awareness, education, and training activities should be suitable and relevant to the person’s role, responsibilities and skills, and should include information on known threats, who to contact for further security advice and the proper channels for reporting inf ormation security incidents (see also 13.1). This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 828 ISA‑62443-2-2, D1E4, April 2013 – 29 – ISA99, WG02, TG02 864 865 Training to enhance awareness is intended to allow individuals to recognize information security problems and incidents, and respond according to the needs of their work role. 866 8.2.3 867 The control objective and the contents from ISO/IEC 27002 clause 8.2.3 apply. 868 8.3 Termination or Change of Employment 869 870 Objective: To ensure that employees, contractors and third party users exit an organization or change employment in an orderly manner. 871 872 873 Responsibilities should be in place to ensure an employee’s, contractor’s or third party user’s exit from the organization is managed, and that the return of all equipment and the removal of all access rights are completed. 874 875 876 Change of responsibilities and employments within an organization should be managed as the termination of the respective responsibility or employment in line with this section, and any new employments should be managed as described in section 8.1. 877 8.3.1 878 The control objective and the contents from ISO/IEC 27002 clause 8.3 .1 apply. 879 8.3.2 880 The control objective and the contents from ISO/IEC 27002 clause 8.3.2 apply. 881 8.3.3 882 Control 883 884 885 The access rights of all employees, contractors and third party users to information and information processing facilities should be removed upon termination of their employment, contract or agreement, or adjusted upon change. 886 Implementation guidance 887 888 889 890 891 892 893 894 895 Upon termination, the access rights of an individual to assets associ ated with information systems and services should be reconsidered. This will determine whether it is necessary to remove access rights. Changes of an employment should be reflected in removal of all access rights that were not approved for the new employment. The access rights that should be removed or adapted include physical and logical access, keys, identification cards, information processing facilities (see also 11.2.4), subscriptions, and removal from any documentation that identifies them as a current member of the organization. If a departing employee, contractor or third party user has known passwords for accounts remaining active, these should be changed upon termination or change of employment, contract or agreement. 896 897 898 Access rights for information assets and information processing facilities should be reduced or removed before the employment terminates or changes, depending on the evaluation of risk factors such as: 899 900 a) whether the termination or change is initiated by the employee, contractor or third party user, or by management and the reason of termination; Termination responsibilities Return of assets Removal of access rights 901 f) the current responsibilities of the employee, contractor or any other user; 902 g) the value of the assets currently accessible. 903 904 IACS-specific implementation guidance This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. Disciplinary process – 30 – ISA99, WG02, TG02 905 906 Other risk factors to be considered when reducing or removing access rights should include risks associated with disruption to IACS availability, plant protection, and plant operations. 907 Other Information 908 909 910 911 912 In certain circumstances access rights may be allocated on the basis of being available to more people than the departing employee, contractor or third party user, e.g. group IDs. In such circumstances, departing individuals should be removed from any group access lists and arrangements should be made to advise all other employees, contractors and third party users involved to no longer share this information with the person departing. 913 914 915 In cases of management-initiated termination, disgruntled employees, contractors or third party users may deliberately corrupt information or sabotage information processing facilities. In cases of persons resigning, they may be tempted to collect information for future use. 916 917 9 918 9.1 Physical and Environmental Security Introduction 919 920 9.2 Secure Areas 921 9.2.1 922 {Requirement} Requirement: 923 924 Foundational Requirement: 925 Rationale/Supplemental Guidance: 926 Requirement Enhancements: 927 928 9.3 Equipment Security 929 9.3.1 Physical Access Authorizations 930 Requirement: 931 932 933 934 935 The organization shall develop and keeps current a list of personnel with authorized access to the facility where the IACS resides ( except for those areas within the facility officially designated as publicly accessible) and issues assigns appropriate authorization credentials. Designated officials within the organization review and approve the access list and authorization credentials [Assignment: organization-defined frequency]. 936 Foundational Requirement: 937 938 939 940 Rationale/Supplemental Guidance: Appropriate authorization credentials include, for example, badges, identification cards, smart cards, key pads codes or biometric attributes. The organization promptly removes from the access list personnel no longer requiring access to the facility where the IACS resides. 941 Requirement Enhancements: 942 943 (1) Authorized access shall be adjusted for assignments in restricted areas or for personnel dismissal. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 – 31 – ISA‑62443-2-2, D1E4, April 2013 9.3.2 Physical Access Control 945 Requirement: 946 947 948 949 950 951 The organization shall control all physical access points (including designated entry/exit points) to the facility where the IACS resides (except for those areas within the facility officially designated as publicly accessible) and verifies individual access authorizations before granting access to the facility. The organization controls access to areas officially designated as publicly accessible, as appropriate, in accordance with the organization’s assessment of risk. 952 Foundational Requirement: 953 954 955 956 957 958 959 960 961 962 963 964 Rationale/Supplemental Guidance: The organization uses physical access devices (e.g., keys, locks, combinations, card readers) and/or guards to control entry to facilities containing IACS. The organization secures keys, combinations, and other access devices and inventories those devices regularly. The organization changes combinations and keys: (i) periodically; and (ii) when keys are lost, combinations are compromised, or individuals are transferred or terminated. Workstations and associated peripherals connected to (and part of) an organizational IACS may be located in areas designated as publicly accessible with access to such devices being appropriately controlled. The organization considers IACS safety and security interdependencies. The organization considers access requirements in emergency situations. During an emergency-related event, the organization may restrict access to IACS facilities and assets to authorized individuals only. 965 Requirement Enhancements: 966 967 968 (1) The organization controls physical access to the IACS independent of the physical access controls for the facility. Identity verification is required for entry to the most secured IACS spaces. 969 970 971 972 973 974 975 976 977 978 Rationale/Supplemental Guidance: This requirement enhancement, in general, applies to server rooms, communications centers, telecom munication spaces, control rooms, instrument rack rooms, remote control rooms or any other areas within a facility containing large concentrations of IACS components or components with a higher impact level than that of the majority of the facility. The intent is to provide an additional layer of physical security for those areas where the organization may be more vulnerable due to the concentration of IACS components or the impact level of the components. The requirement enhancement is not intended to apply to workstations or peripheral devices that are typically dispersed throughout the facility and used routinely by organizational personnel. 979 FR1 Access Control 9.3.3 Access Control for Communication Medium 980 Requirement: 981 982 The organization shall control physical access to IACS distr ibution and communication lines within local organizational facilities. 983 Foundational Requirement: 984 985 986 987 988 989 990 Rationale/Supplemental Guidance: Physical protections applied to IACS distribution and communication lines help prevent accidental damage, disruption, and ph ysical tampering. Additionally, physical protections are necessary to help prevent eavesdropping or in transit modification of unencrypted communications. Protective measures to control physical access to IACS distribution and communication lines include : (i) including endpoints or any access point contained in locked wiring closets; (ii) disconnected or locked spare jacks; and/or (iii) protection of cabling by conduit or cable trays. 991 Requirement Enhancements: None. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 944 ISA99, WG02, TG02 ISA‑62443-2-2, D1E4, April 2013 ISA99, WG02, TG02 9.3.4 Access Control for Display Medium 993 Requirement: 994 995 The organization shall control physical access to IACS devices that display information to prevent unauthorized individuals from observing the display output. 996 Foundational Requirement: 997 Rationale/Supplemental Guidance: None. 998 Requirement Enhancements: 999 1000 1001 (1) Access displays shall be placed in such a manner to prevent others from viewing the display of clear text access information. 9.3.5 Monitoring Physical Access 1002 Requirement: 1003 1004 The organization shall monitor physical access to the IACS to detect and respond to physical security incidents. 1005 Foundational Requirement: 1006 1007 1008 1009 Rationale/Supplemental Guidance: The organization reviews physical access logs periodically and investigates apparent security violations or s uspicious physical access activities. Response to detected physical security incidents is part of the organization’s incident response capability. 1010 Requirement Enhancements: 1011 1012 (1) The organization monitors real-time physical intrusion alarms and surveillance equipment. 1013 1014 (2) The organization employs automated mechanisms to r ecognize potential intrusions and initiate appropriate response actions. 1015 9.3.6 Visitor Control 1016 Requirement: 1017 1018 1019 The organization shall control physical access to the IACS by authenticating visitors before authorizing access to the facility where the IACS resides oth er than areas designated as publicly accessible. 1020 Foundational Requirement: 1021 1022 Rationale/Supplemental Guidance: Personnel without permanent authorization or permanent duties, including physical access to an IACS, are considered a visitor. 1023 Requirement Enhancements: 1024 (1) The organization escorts visitors and monitors visitor activity. 1025 9.3.7 Access Records 1026 Requirement: 1027 1028 1029 1030 1031 1032 The organization shall maintain visitor access records to the facility where the IACS resides (except for those areas within the facility officially designated as publicly accessible).The detailed contents of these records are to be defined by the asset owner and their respective security policy. Designated officials within the organization review the visitor access records [Assignment: organization-defined frequency] and maintain those records for [Assignment: organization-defined periodicity]. . This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 992 – 32 – – 33 – ISA99, WG02, TG02 1033 Foundational Requirement: 1034 1035 1036 1037 1038 Rationale/Supplemental Guidance: These logs are intended to support forensic investigation. Useful attributes would include: (i) name and organization of the person visiting; (ii) signature of the visitor; (iii) form of identification; (iv) date of access; (v) time of entry and departure; (vi) purpose of visit; and (vii) name and organization of person visited.. 1039 Requirement Enhancements: 1040 1041 (1) The organization employs automated mechanisms to facilitate the maintenance and review of access records. 1042 1043 (2) The organization maintains a record of all physical access, both visitor and authorized individuals. 1044 10 Communications and Operations Management 1045 10.1 Introduction 1046 1047 10.2 Operational Procedures and Responsibilities 1048 10.2.1 Automated Marking 1049 Requirement: 1050 1051 The IACS shall mark output using standard naming conventions to identify any special dissemination, handling, or distribution instructions . 1052 Foundational Requirement: 1053 1054 Rationale/Supplemental Guidance: Automated marking refers to markings employed on external media (e.g., hardcopy documents output from the IACS). 1055 Requirement Enhancements: None. 1056 10.3 Third Party Service Delivery Management 1057 10.3.1 1058 {Requirement} Requirement: 1059 1060 Foundational Requirement: 1061 Rationale/Supplemental Guidance: 1062 Requirement Enhancements: 1063 1064 10.4 System planning and acceptance 1065 10.4.1 1066 {Requirement} Requirement: 1067 1068 Foundational Requirement: 1069 Rationale/Supplemental Guidance: This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 ISA‑62443-2-2, D1E4, April 2013 1070 – 34 – ISA99, WG02, TG02 Requirement Enhancements: 1071 1072 10.5 Protection against malicious and mobile code 1073 10.5.1 Malicious Code Protection 1075 1076 1077 Requirement: The organization updates malicious code protection mechanisms (including the latest virus definitions) whenever new releases are available in accordance with organizationa l configuration management policy and procedures. 1078 Foundational Requirement: 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 Rationale/Supplemental Guidance: The organization considers using malicious code protection software products from multiple vendors (e.g., using one vendor for boundary devices and servers and another vendor for workstations). The organization also considers the receipt of false positives during malicious code detection and eradication and the resulting potential affect on the availability of the IACS. Updates are scheduled to occur during planned IACS outages. The organization considers IACS vendor recommendations for malicious code protection. To reduce malicious code, organizations remove the functions and services that should not be employed on the IACS (e.g., Voice Over Internet Protocol, Instant Messaging, File Transfer Protocol, Hyper Text Transfer Protocol, electronic mail, file sharing). 1089 Requirement Enhancements: None. 1090 10.5.2 Security Alerts and Advisories 1091 1092 1093 Requirement: The organization shall receive IACS security alerts/advisories on a regular basis, issues alerts/advisories to appropriate personnel, and takes appropriate actions in response. 1094 Foundational Requirement: 1095 1096 1097 1098 1099 1100 Rationale/Supplemental Guidance: The organization documents the types of actions to be taken in response to security alerts/advisories. The organization also maintains contact with special interest groups (e.g., inform ation security forums) that: (i) facilitate sharing of security-related information (e.g., threats, vulnerabilities, and latest security technologies); (ii) provide access to advice from security professionals; and (iii) improve knowledge of security best practices. 1101 Requirement Enhancements: 1102 1103 (1) The organization employs automated mechanisms to make security alert and advisory information available throughout the organization as needed. 1104 10.6 Backup 1105 10.6.1 1106 {Requirement} Requirement: 1107 1108 Foundational Requirement: 1109 Rationale/Supplemental Guidance: 1110 Requirement Enhancements: 1111 This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 1074 ISA‑62443-2-2, D1E4, April 2013 1112 10.7 Network Security Management 1113 10.7.1 1114 – 35 – ISA99, WG02, TG02 {Requirement} Requirement: 1116 Foundational Requirement: 1117 Rationale/Supplemental Guidance: 1118 Requirement Enhancements: 1119 1120 10.8 Media Handling 1121 10.8.1 Media Protection Policy and Procedures 1122 Requirement: 1123 1124 1125 1126 1127 The organization shall develop, disseminate, and periodically reviews/updates: (i) a formal, documented, media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the media protection policy and associated media protection requirements. 1128 Foundational Requirement: 1129 1130 1131 1132 1133 Rationale/Supplemental Guidance: The media protection policy and procedures are consistent with applicable laws, directives, policies, regulations, standards, and guidance. The media protection policy can be included as part of the general information security policy for the organization. Media protection procedures can be developed for the security program in general, and for a particular IACS, when required. 1134 Requirement Enhancements: None. 1135 1136 10.8.2 Media Access 1137 Requirement: 1138 The organization shall restrict access to IACS media to authorized individuals. 1139 Foundational Requirement: 1140 1141 1142 1143 1144 1145 Rationale/Supplemental Guidance: IACS media includes both digital media (e.g., diskettes, magnetic tapes, external/removable hard drives, flash/thumb drives, compact disks, digital video disks) and non-digital media (e.g., paper, microfilm). This requirement also applies to portable and mobile computing and communications devices with information storage capability (e.g., notebook computers, personal digital assistants, cellular telephones). 1146 1147 1148 1149 1150 1151 1152 1153 1154 An organizational assessment of risk guides the sel ection of media and associated information contained on that media requiring restricted access. Organizations document in policy and procedures, the media requiring restricted access, individuals authorized to access the media, and the specific measures t aken to restrict access. The rigor with 𝑡𝑎𝑟𝑔𝑒𝑡 which this requirement is applied is commensurate with the 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 categorization of the information contained on the media. For example, fewer protection measures are needed for media containing information determined by the organization to be in the public domain, to be publicly releasable, or to have limited or no adverse impact on the organization or individuals if accessed by other than authorized personnel. In these This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 1115 – 36 – ISA99, WG02, TG02 1155 1156 situations, it is assumed that the physical access requirements where the media resides provide adequate protection. 1157 Requirement Enhancements: 1158 1159 (1) The organization employs automated mechanisms to restrict access to media storage areas and to audit access attempts and access granted. 1160 1161 1162 1163 1164 1165 Foundational Requirement: Rationale/Supplemental Guidance: This requirement enhancement is primarily applicable to designated media storage areas within an organization where a significant volume of media is stored and is not intended to apply to every lo cation where some media is stored (e.g., in individual offices). 1166 10.8.3 Media Labeling 1167 Requirement: 1168 1169 1170 1171 1172 The organization shall: (i) affix external labels to removable IACS media and IACS output indicating the distribution limitations, handling caveats and applicable security markings (if any) of the information; and (ii) exempt [Assignment: organization-defined list of media types or hardware components] from labeling so long as they remain within [ Assignment: organization-defined protected environment]. 1173 Foundational Requirement: 1174 1175 1176 1177 1178 Rationale/Supplemental Guidance: An organizational assessment of selection of media requiring labeling. Organizations document in policy the media requiring labeling and the specific measures taken to afford The rigor with which this requirement is applied is commensurate categorization of the information contained on the media. 1179 Requirement Enhancements: None. 1180 risk guides the and procedures, such protection. 𝑡𝑎𝑟𝑔𝑒𝑡 with the 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 10.8.4 Media Storage 1181 Requirement: 1182 1183 The organization shall physically control and securely store IACS media within controlled areas. 1184 Foundational Requirement: 1185 1186 1187 1188 1189 1190 Rationale/Supplemental Guidance: IACS media includes both digital media (e.g., diskettes, magnetic tapes, external/removable hard drives, flash/thumb drives, compact disks, digital video disks) and non-digital media (e.g., paper, microfilm). A controlled area is any area or space for which the organization has confidence that the physical and procedural protections provided are sufficient to meet the requirements established for protecting the information and/or IACS. 1191 1192 1193 This requirement applies to portable and mobile computing and communications devices with information storage capability (e.g., notebook computers, personal digital assistants, cellular telephones, telephone systems (voicemail only)). 1194 1195 1196 1197 1198 1199 1200 Organizations document in policy and procedures, the media requiring physical protection and the specific measures taken to afford such protection. The rigor with which this 𝑡𝑎𝑟𝑔𝑒𝑡 requirement is applied is commensurate with the 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 categorization of the information contained on the media. For example, fewer protection measures are needed for media containing information determined by the organization to have limited or no adverse impact on the organization or individuals if accessed by non -authorized personnel. The assumption is that the physical access controls to the facility where the media resides This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 – 37 – ISA99, WG02, TG02 1201 1202 1203 provide adequate protection. The organization protects IACS media identified by the organization until the media are destroyed or sanitized using approved equipment, techniques, and procedures. 1204 1205 1206 1207 1208 As part of a defense-in-depth protection strategy, the organization considers routinely encrypting data at rest on selected secondary storage device s. The organization implements effective cryptographic key management in support of secondary storage encryption and provides protections to maintain the availability of the information in the event of the loss of cryptographic keys by IACS users. 1209 Requirement Enhancements: None. 1210 10.8.5 Media Transport 1211 Requirement: 1212 1213 1214 The organization shall protect and control IACS media during transport outside of controlled areas and restricts the activities associated with transport of such media to authorized personnel. 1215 Foundational Requirement: 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 Rationale/Supplemental Guidance: IACS media includes both digital media (e.g., diskettes, tapes, removable hard drives, flash/thumb drives, compact disks, digital video disks) and non-digital media (e.g., paper, microfilm). A c ontrolled area is any area or space for which the organization has confidence that the physical and procedural protections provided are sufficient to meet the requirements established for protecting the information and/or IACS. This requirement also applies to portable and mobile computing and communications devices with information storage capability (e.g., notebook computers, personal digital assistants, cellular telephones) that are transported outside of controlled areas. Telephone systems are also co nsidered IACS and may have the capability to store information on internal media (e.g., on voicemail systems). Since telephone systems do not have, in most cases, the identification, authentication, and access control mechanisms typically employed in othe r IACS, organizational personnel exercise extreme caution in the types of information stored on telephone voicemail systems that are transported outside of controlled areas. An organizational assessment of risk guides the selection of media and associated information contained on that media requiring protection during transport. Organizations document in policy and procedures, the media requiring protection during transport and the specific measures taken to protect such transported media. The rigor with which this requirement is applied is 𝑡𝑎𝑟𝑔𝑒𝑡 commensurate with the 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 categorization of the information contained on the media. An organizational assessment of risk also guides the selection and use of appropriate storage containers for transporting non-digital media. Authorized transport and courier personnel may include individuals from outside the organization (e.g., U.S. Postal Service or a commercial transport or delivery service). 1239 Requirement Enhancements: 1240 1241 1242 (1) The organization protects digital and non-digital media during transport outside of controlled areas using [Assignment: organization-defined security measures, e.g., locked container, cryptography]. 1243 1244 1245 1246 1247 1248 Rationale/Supplemental Guidance: Physical and technical security measures for the protection of digital and non-digital media are approved by the organization, 𝑡𝑎𝑟𝑔𝑒𝑡 commensurate with the 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 categorization of the information residing on the media, and consistent with applicable laws, directives, policies, regulations, standards, and guidance. Cryptographic mechanisms can provide confidentiality and/or integrity protections depending upon the mechanisms used. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 – 38 – ISA99, WG02, TG02 1249 1250 (2) The organization documents, where appropriate, activities associated with the transport of IACS media using [Assignment: organization-defined system of records]. 1251 1252 1253 Rationale/Supplemental Guidance: Organizations establish documentation requirements for activities associated with the transport of IACS media in accordance with the organizational assessment of risk. 1254 (3) The organization employs an identified custodian at all times to transport IACS media. 1255 1256 1257 Rationale/Supplemental Guidance: Organizations establish documentation requirements for activities associated with the transport of IACS media in accordance with the organizational assessment of risk. 1258 10.8.6 Media Sanitization and Disposal 1259 Requirement: 1260 1261 The organization shall sanitize IACS media, both digital and non-digital, prior to disposal or release for reuse. 1262 Foundational Requirement: 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 Rationale/Supplemental Guidance: Sanitization is the process used to remove information from IACS media such that there is reasonable assurance, in proporti on to the confidentiality of the information, that the information cannot be retrieved or reconstructed. Sanitization techniques, including clearing, purging, and destroying media information, prevent the disclosure of organizational information to unauth orized individuals when such media is reused or disposed. The organization uses its discretion on sanitization techniques and procedures for media containing information deemed to be in the public domain or publicly releasable, or deemed to have no advers e impact on the organization or individuals if released for reuse or disposed. The National Security Agency provides media sanitization guidance and maintains a listing of approved sanitization products at http://www.nsa.gov/ia/government/mdg.cfm . 1274 Requirement Enhancements: 1275 1276 (1) The organization tracks, documents, and verifies media sanitization and disposal actions. 1277 1278 (2) The organization periodically tests sanitization equipment and procedures to verify correct performance. 1279 10.8.7 Access Control for Display Medium 1280 Requirement: 1281 1282 The organization shall control physical access to IACS devices that display information to prevent unauthorized individuals from observing the display output. 1283 Foundational Requirement: 1284 Rationale/Supplemental Guidance: None. 1285 1286 1287 Requirement Enhancements: None. 1288 10.8.8 Public Key Infrastructure Certificates 1289 Requirement: 1290 1291 Where public key cryptography is utilized, the organization shall determine what appropriate interfaces are required with existing public key infrastructure under an This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 – 39 – ISA99, WG02, TG02 1292 1293 appropriate certificate policy or obtains public key certificates under an appropriate certificate policy from an approved service provider. 1294 Foundational Requirement: 1295 1296 1297 1298 Rationale/Supplemental Guidance: Registration to receive a public key certificate needs to include authorization by a supervisor or a responsible official and needs to be accomplished using a secure process that verifies the identity of the certificate holder and ensures that the certificate is issued to the intended party. 1299 Requirement Enhancements: None. 1300 10.9 Exchange of Information 1301 10.9.1 1302 {Requirement} Requirement: 1303 1304 Foundational Requirement: 1305 Rationale/Supplemental Guidance: 1306 Requirement Enhancements: 1307 1308 10.10 Electronic Commerce Services 1309 10.10.1 {Requirement} 1310 Requirement: 1311 1312 Foundational Requirement: 1313 Rationale/Supplemental Guidance: 1314 Requirement Enhancements: 1315 1316 10.11 Monitoring 1317 10.11.1 Audit and Accountability Policy and Procedures 1318 Requirement: 1319 1320 1321 1322 1323 The organization shall develop, disseminate, and periodically reviews/updates: (i) a formal, documented, audit and accountability policy that addresses purpos e, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the audit and accountability policy and associated audit and ac countability controls. 1324 Foundational Requirement: 1325 1326 1327 1328 1329 1330 Rationale/Supplemental Guidance: The audit and accountability policy and procedures are consistent with applicable laws, directives, policies, regulations, standards, and guidance. The audit and accountability policy can be included as part of the general information security policy for the organization. Audit and accountability procedures can be developed for the security program in general, and for a particular IACS, when required. The parameters to be monitored are a local matter. Of those parameters it is This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 ISA‑62443-2-2, D1E4, April 2013 – 40 – ISA99, WG02, TG02 1331 1332 strongly recommended to consider false-positives (e.g. how many times did an authorized entity get hindered or prevented from performing its function ). 1333 Requirement Enhancements: None. 1335 1336 1337 10.11.2 Auditable Events Requirement: The organization periodically reviews and updates the list of orga nization-defined auditable events. 1338 Foundational Requirement: 1339 1340 1341 1342 1343 1344 1345 Rationale/Supplemental Guidance: The purpose of this requirement is to identify important events which need to be audited as significant and relevant to the security of the IACS. The security audit function is usually coordinated with the network health and status monitoring function which may be in a different zone. Commonly recognized and accepted checklists and configuration guides should be considered when compiling a list of auditable events. The organization defines auditable events that are adequate to support after-the-fact investigations of security incidents. 1346 Requirement Enhancements: None. 1347 10.11.3 Audit Monitoring, Analysis and Reporting 1348 Requirement: 1349 1350 1351 The organization shall regularly review/analyze IACS audit records for indications of inappropriate or unusual activity, investigates suspicious activity or suspected violations, reports findings to appropriate officials, and takes necessary actions. 1352 Foundational Requirement: 1353 1354 1355 1356 Rationale/Supplemental Guidance: Organizations increase the level of audit monitoring and analysis activity within the IACS whenever there is an indication of increased risk to organizational operations, organizational assets, or individuals based on law enforcement information, intelligence information, or other credible sources of information. 1357 Requirement Enhancements: 1358 1359 1360 (1) The organization employs automated mechanisms to integrate audit monitoring, analysis, and reporting into an overall process for investigation and res ponse to suspicious activities. 1361 1362 1363 1364 (2) The organization employs automated mechanisms to alert security personnel of the following inappropriate or unusual activities with security implications: [ Assignment: organization-defined list of inappropriate or unusual ac tivities that are to result in alerts]. 1365 10.11.4 Audit Record Retention 1366 Requirement: 1367 1368 1369 The organization shall retain audit records for [Assignment: organization-defined time period] to provide support for after-the-fact investigations of security incidents and to meet regulatory and organizational information retention requirements. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 1334 – 41 – ISA99, WG02, TG02 1370 Foundational Requirement: 1371 1372 1373 Rationale/Supplemental Guidance: The organization retains audit records until it is determined that they are no longer needed for administrative, legal, audit , or other operational purposes. 1374 Requirement Enhancements: None. 1375 11 Access Control 1376 11.1 Introduction 1377 1378 11.2 Business Requirement 1379 11.2.1 Access Control Policy and Procedures 1380 Requirement: 1381 1382 1383 1384 1385 The organization shall develop, disseminate, and periodically reviews/updates: (i) a formal, documented, access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the access control policy and associated access controls. 1386 Foundational Requirement: 1387 1388 1389 1390 1391 1392 Rationale/Supplemental Guidance: The access control policy and procedures are consistent with applicable laws, directives, policies, regulations, standards, and guidance and in alignment with the security requirements of the IACS(s). The access control policy can be included as part of the general information security policy for the organization. Access control procedures can be developed for the security program in gener al, and for a particular IACS, when required. 1393 Requirement Enhancements: None. 1394 11.2.2 System and Information Integrity Policy and Procedures 1395 Requirement: 1396 1397 1398 1399 1400 1401 The organization shall develop, disseminate, and periodically reviews/updates: (i) a formal, documented, system and information integrity policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the s ystem and information integrity policy and associated system and information integrity requirements. 1402 Foundational Requirement: 1403 1404 1405 1406 1407 1408 Rationale/Supplemental Guidance: The system and information integrity policy and procedures are consistent with applicable laws, directives, policies, regulations, standards, and guidance. The system and information integrity policy can be included as part of the general information security policy for the organization. System and information integrity procedures can be developed for the security program in general, and for a particular IACS, when required. 1409 Requirement Enhancements: None. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 ISA‑62443-2-2, D1E4, April 2013 ISA99, WG02, TG02 11.2.3 Flaw Remediation 1411 Requirement: 1412 The organization shall identify, report, and correct IACS flaws. 1413 Foundational Requirement: 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 Rationale/Supplemental Guidance: The organization identifies IACS containing software affected by recently announced software flaws (and potential vulnerabilities resulting from those flaws). The organization (or the software developer/vendor in the case of software developed and maintained by a vendor/contractor) promptly installs newly released security relevant patches, service packs, and hot fixes, and tests patches, service packs, and hot fixes for effectiveness and potential side effects on the organization’s IACS before installation. Flaws discovered during security assessments, continuous monitoring, incident response activities, or IACS error handling are also addressed expeditiously. Flaw remediation is incorporated into configuration management as an emergency change. The flaw remediation process shall be consistent with certification, safety and regulatory testing requirements. 1425 Requirement Enhancements: 1426 1427 (1) The organization centrally manages the flaw remediation process and installs updates automatically. 1428 1429 1430 (2) The organization employs automated mechanisms to periodically and upon demand determine the state of IACS components with regard to flaw remediation. 1431 11.3 User Access Management 1432 11.3.1 Account Management 1433 Foundational Requirement: 1434 Requirement: 1435 1436 The organization reviews accounts [Assignment: organization-defined frequency, at least annually]. A history of account changes shall be maintained if only manually. 1437 Foundational Requirement: 1438 1439 1440 1441 1442 1443 1444 Rationale/Supplemental Guidance: Account management might include (i.e., individual, role, and system, device-based, and system), establishment of conditions for group membership, and assignment of associated authorizations. In certain IACS instances, where the organization has determined that individual accounts are unnecessary from a risk-analysis and/or regulatory aspect, shared accounts are acceptable as long as adequate compensating controls (such as limited physical access) are in place and documented. 1445 1446 1447 Non-user accounts (sometimes termed service accounts) that are utilized for process -toprocess communication (for example, an HMI connecting to a database) typically requires different security policies from human user accounts. 1448 1449 The organization identifies authorized users of the IACS and specifies access rights/privileges. The organization grants access to the IACS based on: 1450 1451 (i) a valid need-to-know/need-to-share that is determined by assigned official duties and satisfying all functional and security criteria; and 1452 1453 (ii) Intended system usage. The organization requires proper identification for requests to establish accounts and approves all such requests. 1454 1455 (iii) The organization specifically authorizes and monitors the use of guest/anonymous accounts and removes, disables, or otherwise secures This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 1410 – 42 – ISA‑62443-2-2, D1E4, April 2013 ISA99, WG02, TG02 unnecessary accounts. Account managers are notified when IACS users are terminated or transferred and associated accounts are removed, disabled, or otherwise secured. 1459 1460 1461 1462 1463 (iv) Account managers are also notified when users’ IACS usage or need -toknow/need-to-share changes. In cases where accounts are role-based, i.e., the workstation, hardware, and/or field devices define a user role, access to the IACS includes physical security policies and procedures based on organization risk assessment. 1464 1465 1466 1467 1468 1469 (v) In cases where physical access to the workstation, hardware, and/or field devices predefine privileges, the organization implements physical security policies, and procedures based on organization risk assessment. Account management may include additional account types (e.g., role-based, device-based, attribute-based). The organization removes, changes, disables, or otherwise secures default accounts. 1470 Requirement Enhancements: 1471 1472 1473 (1) The organization has policies and procedures to terminate guest or temporary accounts after [Assignment: organization-defined time period for each type of account]. 1474 1475 (2) The organization has policies and procedures to disable inactive accounts after [Assignment: organization-defined time period]. 1476 1477 (3) The organization employs mechanisms to audit account creation, Modification, disabling, and termination actions and to notify, as required, appropriate individuals. 1478 11.3.2 Separation of Duties 1479 Foundational Requirement: 1480 Requirement: 1481 1482 When assigning permissions and/or roles to users, the organization shall obey the separation of duties as outlined in their security policy. 1483 Foundational Requirement: 1484 1485 1486 Rationale/Supplemental Guidance: The organization establishes appropriate divisions of responsibility and separates duties as needed to eliminate conflicts of interest in the responsibilities and duties of individuals. Examples of separation of duties incl ude: 1487 1488 (i) mission functions and distinct IACS support functions are divided among different individuals/roles 1489 1490 1491 (ii) different individuals perform IACS support functions (e.g., system management, systems programming, quality assurance/testing, configuration management, and network security) 1492 1493 (iii) security personnel who administer access control functions do not administer audit functions 1494 1495 Requirement Enhancements: None. (4) 1496 11.4 User Responsibilities 1497 11.4.1 1498 {Requirement} Requirement: 1499 1500 Foundational Requirement: This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 1456 1457 1458 – 43 – ISA‑62443-2-2, D1E4, April 2013 1501 Rationale/Supplemental Guidance: 1502 Requirement Enhancements: – 44 – ISA99, WG02, TG02 1504 11.5 Network Access Control 1505 11.5.1 Least Privilege 1506 Foundational Requirement: 1507 Requirement: 1508 1509 1510 The organization shall enforce set of rights/privileges or accesses as required by ISA 99.02.xx needed by asset owner (or processes acting on behalf of asset owners) for the performance of specified tasks. 1511 Foundational Requirement: 1512 1513 1514 1515 Rationale/Supplemental Guidance: The organization employs the concept of least privilege for specific duties and IACS (zones and conduits) in accordance with risk assessments as necessary to adequately mitigate risk to organizational operations, organizational assets, and individuals. 1516 Requirement Enhancements: None. 1517 11.5.2 Permitted Actions Without Identification or Authentication 1518 Foundational Requirement: 1519 Requirement: 1520 1521 1522 The organization shall identify and document (log) specific IACS user actions that can be performed on the IACS without additional identification or authentication, if and only if prior identification and authentication have already occurred. 1523 Foundational Requirement: 1524 1525 1526 Rationale/Supplemental Guidance: The organization may allow limited IACS user activity without identification and authentication for corrective actions (e.g., emergency). The intent is to prevent repeated unnecessary identification and/or authe ntication. 1527 Requirement Enhancements: 1528 1529 (1) The organization permits actions to be performed without identification and authentication only to the extent necessary to accomplish mission objectives. 1530 1531 11.5.3 Remote Access 1532 Foundational Requirement: 1533 Requirement: 1534 The organization shall authorize all methods of remote access to the IACS. 1535 Foundational Requirement: 1536 1537 1538 1539 1540 Rationale/Supplemental Guidance: Remote access is any access to an IACS by an IACS user (human user, process, or device) communicating through an external, no norganization-controlled network (e.g., the Internet). Examples of remote access methods include dial-up, broadband, and wireless. Remote access to IACS component locations (e.g., control center, field locations) is only enabled when approved by the org anization. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 1503 ISA‑62443-2-2, D1E4, April 2013 – 45 – ISA99, WG02, TG02 1541 Requirement Enhancements: 1542 1543 (1) The organization controls all remote accesses through a limited number of managed access control points. 1544 1545 1546 (2) The organization permits remote access for privileged functions only for compelling operational needs and documents the rationale for such access in the security plan for the IACS. 11.5.4 Use of External Information Systems 1548 Foundational Requirement: 1549 Requirement: 1550 1551 1552 The organization shall establish terms and conditions for authorized individuals to: (i) access the IACS from an external information system; and (ii) process, store, and/or transmit organization-controlled information using an external information system. 1553 Foundational Requirement: 1554 1555 1556 1557 1558 1559 1560 1561 Rationale/Supplemental Guidance: External information systems are information systems or components of information systems that are outside of the accreditation boundary established by the organization and for which the organization typically has no direct control over the application of required security controls or the assessment of secu rity control effectiveness. External information systems include, but are not limited to, personally owned information systems (e.g., computers, cellular telephones, or personal digital assistants); privately owned computing and communications devices res ident in commercial or public facilities (e.g., hotels, convention centers, or airports). 1562 1563 1564 1565 1566 1567 1568 1569 Authorized individuals include organizational personnel, contractors, or any other individuals with authorized access to the organizational IACS. The organization establishes terms and conditions for the use of external information systems in accordance with organizational security policies and procedures. The terms and conditions address as a minimum; (i) the types of applications that can be accessed on the organizational IACS from the external information system; and (ii) the maximum 𝑐𝑎𝑝𝑎𝑏𝑙𝑒 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 category of information that can be transmitted to or processed and stored on the external information system. 1570 Requirement Enhancements: 1571 1572 1573 1574 1575 1576 1577 (1) The organization prohibits authorized individuals from using an external information system to access the IACS or to process, store, or transmit organization -controlled information except in situations where the organization: (i) can verify the employment of required security controls on the external system as specified in the organization’s information security policy and system security plan; or (ii) has approved IACS connection or processing agreements with the organizational entity hosting the external information system. 1578 1579 (2) The organization provides a domain of filtered control for access by external IACS users, and limits access only to this domain. 1580 1581 (3) The organization provides a separate domain of information for read -only or download-only access by external IACS users and limits access only to this domain. 1582 11.6 Operating System Access Control 1583 11.6.1 1584 {Requirement} Requirement: 1585 1586 Foundational Requirement: This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 1547 ISA‑62443-2-2, D1E4, April 2013 1587 Rationale/Supplemental Guidance: 1588 Requirement Enhancements: – 46 – ISA99, WG02, TG02 1589 1590 11.7 Application and Information Access Control 1591 11.7.1 Requirement: 1593 1594 Foundational Requirement: 1595 Rationale/Supplemental Guidance: 1596 Requirement Enhancements: 1597 1598 11.8 Mobile Computing and Teleworking 1599 11.8.1 Wireless Access Restrictions 1600 Foundational Requirement: 1601 Requirement: 1602 The organization shall produce implementation guidance for wireless technologies. 1603 1604 1605 1606 1607 1608 Foundational Requirement: Rationale/Supplemental Guidance: Wireless technologies include, but are not limited to, microwave, satellite, packet radio [UHF/VHF], 802.11x, 802.15.4 (ZigBee, WirelessHART, ISA100.11a), and Bluetooth. 1609 1610 (1) The organization shall deploy continuous passive monitoring for unauthorized wireless access points and takes appropriate action if such access points are discovered. 1611 1612 1613 1614 1615 1616 1617 Foundational Requirement: Rationale/Supplemental Guidance: At the time of publication of this document, these access points are typically based on 802.11x technology. In the future, this will change and thus other wireless technologies will need to be monitored as well. Regardless, organizations should conduct a thorough scan for unauthorized wireless access points in facilities containing high-impact IACS. The scan should involve the entire facility, not just areas containing a high -impact IACS. 1618 Requirement Enhancements: 11.8.2 Use Control for Portable and Mobile Devices 1619 Foundational Requirement: 1620 Requirement: 1621 1622 The organization shall produce implementation guidance for organization -controlled portable and mobile devices. 1623 Foundational Requirement: 1624 1625 1626 Rationale/Supplemental Guidance: Portable and mobile devices may introduce undesired network traffic, malware and/or information exposure, and thus there should be specific control associated with their usage in the typical IACS environment. 1627 1628 Portable and mobile devices (e.g., notebook c omputers, personal digital assistants, cellular telephones, and other computing and communications devices with network This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 1592 {Requirement} – 47 – ISA99, WG02, TG02 1629 1630 1631 1632 1633 1634 1635 connectivity are only allowed access to the IACS in accordance with organizational security policies and procedures. Security policies and procedures include device identification and authentication, implementation of mandatory protective software (e.g., malicious code detection, firewall), configuration management, scanning devices for malicious code, updating virus protection software, scanning for critical software updates and patches, conducting primary operating system (and possibly other resident software) integrity checks, and disabling unnecessary hardware (e.g., wireless, infrared). 1636 1637 Requirement Enhancements: None. 1638 11.8.3 Mobile Code 1639 Foundational Requirement: 1640 Requirement: 1641 1642 The organization shall produce implementation guidance regarding the use of mobile code technologies based on the potential to cause damage to the IACS. 1643 Foundational Requirement: 1644 1645 1646 1647 1648 1649 1650 1651 Rationale/Supplemental Guidance: Mobile code technologies include, for example, Java, JavaScript, ActiveX, PDF, Postscript, Shockwave movies, Flash animations, and VBScript. Usage restrictions and implementation guidance apply to both the selection and use of mobile code installed on servers and mobile code downloaded and executed on individual workstations. Control procedures prevent the development, acquisition, or introduction of unacceptable mobile code within the IACS. For example, mobile code exchanges might be disallowed directly with the IACS, but rather in a controlled adjacent information environment maintained by IACS personnel. 1652 Requirement Enhancements: None. 1653 11.8.4 Supervision and Review – Use Control 1654 Foundational Requirement: 1655 Requirement: 1656 1657 The organization shall supervise and review the activities of IACS users with respect to the enforcement and usage of IACS assets. 1658 Foundational Requirement: 1659 1660 1661 1662 1663 1664 1665 1666 1667 Rationale/Supplemental Guidance: The organization reviews audit records (e.g., user activity logs) for inappropriate activities in accordance wit h organizational procedures. The organization investigates any unusual IACS -related activities and periodically reviews changes to access authorizations. The organization reviews more frequently the activities of IACS users with significant IACS roles and responsibilities. The extent of the audit record reviews is based on the impact level of the IACS. For example, for low -impact systems, it is not intended that security logs be reviewed frequently for every workstation, but rather at central points such as a web proxy or email servers and when specific circumstances warrant review of other audit records. 1668 1669 1670 1671 Requirement Enhancements: (1) The organization develops a baseline of normal IACS user behavior, allowable variances and employs automated mechanisms to facilitate the review of user activities. 1672 1673 11.8.5 Identification and Authentication Policy and Procedures Foundational Requirement: This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 – 48 – ISA99, WG02, TG02 1674 Requirement: 1675 1676 1677 1678 1679 1680 The organization shall develop, disseminate, and periodically review/update: (i) a formal, documented, identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls for IACS. 1681 Foundational Requirement: 1682 1683 1684 1685 1686 1687 Rationale/Supplemental Guidance: The organization ensures the identification and authentication policy and procedures are consistent with applicable laws, directives, policies, regulations, standards, and guidance. The identification and authentication policy can be included as part of the general security policy for the organization. Identification and authentication procedures can be developed for the security program in general, and for a particular IACS, when required. 1688 1689 Requirement Enhancements: None. 1690 11.8.6 Identifier Management 1691 Foundational Requirement: 1692 Requirement: 1693 1694 1695 1696 The organization shall manage identifiers by user, group, role, and/or system interface. An appropriate organization official or group is responsible for authorizing the issuance of user identifiers, issuing the user identifier to the intended party, and archiving user identifiers. 1697 Foundational Requirement: 1698 1699 1700 1701 1702 1703 1704 1705 Rationale/Supplemental Guidance: Identifiers are distinguished from the privileges which they permit an entity to perform within a specific IACS control domain/zone (see also 2.6, Authenticator Management). Where users function as a single group (e.g., control room operators), user identification may be role-based, group-based, or device-based. For some IACS, the capability for immediate operator interaction is critical. Local emergency actions for the IACS must not be hampered by identification requirements. Access to these systems may be restricted by appropriate compensating security mechanism s. Identifiers may be required on portions of the IACS but not necessarily the entire system. 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 For very high SAL level IACS the requirement for maximum control is increased, not decreased. Security measures that have the potential to cause loss of control in process operations are not acceptable. In these cases, to maintain the higher SAL levels, compensating measures external to the IACS (e.g. additional physical security measure s and/or enhanced personnel background checks) will be needed. In these cases, it may be possible to see a normally high SAL level IACS at a lower SAL 1 or 2 rating, depending upon the compensating controls. Lockout or loss of control due to security mea sures is not acceptable in high availability IACS. 1716 1717 1718 (1) The organization shall verify the identity of each IACS user. This verification may be maintained separately from the IACS (such as by the appropriate HR group). 1719 1720 Requirement Enhancements: 11.8.7 Authenticator Management Foundational Requirement: This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 ISA‑62443-2-2, D1E4, April 2013 1722 1723 ISA99, WG02, TG02 Requirement: The organization shall establish administrative procedures for initial authenticator distribution, for lost/compromised, or damaged authenticators, and for revoking authenticators. 1724 Foundational Requirement: 1725 1726 1727 1728 1729 1730 1731 Rationale/Supplemental Guidance: IACS authenticators include, for example, tokens, Public Key certificates, biometrics, passwords, physical keys, and key cards. IACS users should take reasonable measures to safeguard authenticators including maintainin g possession of their individual authenticators, not loaning or sharing authenticators with others, and reporting lost or compromised authenticators immediately. In the case of a process or device, such users should also take measures to protect their IAC S authenticators. 1732 1733 1734 1735 1736 1737 If the IACS is required to have a high level of availability, measures must be taken to maintain this high level of availability (e.g. compensating physical controls, duplicate keys, supervisory override). Lockout or loss of control due to security measures is not acceptable. 1738 1739 1740 1741 Requirement Enhancements: None. 11.8.8 Software and Information Integrity Requirement: The organization reassesses the integrity of software and information by performing [ Assignment: organization-defined frequency] integrity scans of the system. 1742 Foundational Requirement: 1743 1744 1745 1746 1747 Rationale/Supplemental Guidance: This requirement complements related Access Control requirements. Access Control involves enforcing the roles, permissions, and use patterns as designed. Integrity verification methods are employed to detect, record, report, and protect against the effects of software and information tampering that may occur if other protection mechanisms (e.g. Access Control) have been circumvented. 1748 Requirement Enhancements: None. 1749 1750 11.8.9 Information Input Restrictions 1751 Requirement: 1752 1753 1754 Restrictions on entities authorized to input information to the IACS may extend beyond the typical access controls employed by the system and include limitations based on specific operational/project responsibilities. 1755 Foundational Requirement: 1756 Rationale/Supplemental Guidance: None. 1757 Requirement Enhancements: None. 1758 11.8.10 Error Handling 1759 Requirement: 1760 1761 The extent to which the IACS identifies and handles error conditions shall be guided by organizational policy and operational requirements. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 1721 – 49 – ISA‑62443-2-2, D1E4, April 2013 – 50 – 1762 Foundational Requirement: 1763 Rationale/Supplemental Guidance: None. 1764 Requirement Enhancements: None. ISA99, WG02, TG02 1765 11.8.11 Information Output Handling and Retention 1767 Requirement: 1768 1769 The organization shall handle and retain output from the IACS in accordance with applicable laws, directives, policies, regulations, standards, and operational requirements. 1770 Foundational Requirement: 1771 Rationale/Supplemental Guidance: None. 1772 Requirement Enhancements: None. 1773 11.8.12 Boundary Protection 1774 Requirement: 1775 1776 1777 The organization carefully considers the intrinsically shared nature of commercial telecommunications services in the implementation of security controls associated with the use of such services. 1778 Foundational Requirement: 1779 1780 1781 1782 1783 1784 1785 Rationale/Supplemental Guidance: Commercial telecommunications services are commonly based on network components and consolidated management systems shared by all attached commercial customers, and may include third party provided access lines and other service elements. Consequently, such interconnecting communication services may represent sources of increased risk despite contract security provisions. Therefore, when this situation occurs, the organization either implements appropriate compensating security controls or explicitly accepts the additional risk. 1786 Requirement Enhancements: 1787 1788 1789 1790 (1) The organization implements a managed interface (boundary protection devices in an effective security architecture) with any external telecommunication service, implementing controls appropriate to the required protection of the confidentiality and integrity of the information being transmitted. 1791 1792 This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 1766 ISA‑62443-2-2, D1E4, April 2013 – 51 – 1793 12 Systems acquisition, development and maintenance 1794 12.1 ISA99, WG02, TG02 Introduction 1795 1796 12.2 Security requirements of information systems 1797 12.2.1 Requirement: 1799 1800 Foundational Requirement: 1801 Rationale/Supplemental Guidance: 1802 Requirement Enhancements: 1803 1804 12.3 Correct Processing in Applications 1805 12.3.1 1806 {Requirement} Requirement: 1807 1808 Foundational Requirement: 1809 Rationale/Supplemental Guidance: 1810 Requirement Enhancements: 1811 1812 12.4 Cryptographic Controls 1813 12.4.1 Cryptographic Module Validation 1814 1815 1816 1817 Requirement: If cryptography is required, the IACS shall employ validated cryptographic modules that applicable laws, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module ma y require. 1818 Foundational Requirement: 1819 1820 1821 1822 1823 Rationale/Supplemental Guidance: The use of cryptography is determined after careful consideration of the security needs and the potential ramifications on system performance. The procurement process most effective safeguard is to use a cryptographic module validated by a recognized 3 rd party authority, e.g. the Cryptographic Module Validation Program. 1824 Requirement Enhancements: None. 1825 1826 12.5 Security of System Files 1827 12.5.1 1828 1829 {Requirement} Requirement: This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 1798 {Requirement} ISA‑62443-2-2, D1E4, April 2013 1830 Foundational Requirement: 1831 Rationale/Supplemental Guidance: 1832 Requirement Enhancements: – 52 – ISA99, WG02, TG02 1833 1834 12.6 Security in development and support processes 1835 12.6.1 Requirement: 1837 1838 Foundational Requirement: 1839 Rationale/Supplemental Guidance: 1840 Requirement Enhancements: 1841 1842 12.7 Technical vulnerability management 1843 12.7.1 Configuration Management Policy and Procedures 1844 Requirement: 1845 1846 1847 1848 1849 1850 The organization shall develop, disseminate, and periodically review/update: (i) a formal, documented, configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the configuration management policy and associated configuration management controls. 1851 Foundational Requirement: 1852 1853 1854 1855 1856 1857 Rationale/Supplemental Guidance: The configuration management policy and procedures are consistent with applicable laws, directives, policies, regulations, standards, and guidance. The configuration management policy can be included as part of the general information security policy for the organization. Co nfiguration management procedures can be developed for the security program in general, and for a particular IACS, when required. 1858 1859 Requirement Enhancements: None. 1860 1861 1862 1863 12.7.2 Baseline Configuration Requirement: The organization shall develop, document, and maintain a current baseline configuration of the IACS. 1864 Foundational Requirement: 1865 1866 1867 1868 1869 Rationale/Supplemental Guidance: This requirement establishes a baseline configuration for the IACS. The baseline configuration provides information about a particular component’s makeup (e.g., the standard software load for a workstation or notebook computer including updated patch information) and the component’s logical placement within the IACS architecture. The baseline configuration also provides the organization This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 1836 {Requirement} – 53 – ISA99, WG02, TG02 1870 1871 with a well-defined and documented specification to which the IACS is built and deviations, if required, are documented in support of mission needs/ objectives. 1872 Requirement Enhancements: 1873 1874 (1) The organization updates the baseline configuration of the IACS as an integral part of IACS component installations. 1875 1876 (2) The organization employs automated mechanisms to maintain an up -to-date, complete, accurate, and readily available baseline configuration of the IACS. 1877 1878 1879 12.7.3 Configuration Change Control Requirement: The organization shall authorize, document, and control changes to the IACS. 1880 Foundational Requirement: 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 Rationale/Supplemental Guidance: The organization manages configuration changes to the IACS using an organizationally approved process. Configuration change control involves the systematic proposal, justification, implementation, test/evaluation, review, and disposition of changes to the IACS, including upgrades and modifications. Configuration change control includes changes to the configuration settings for information technology products (e.g., operating systems, firewalls, routers). The organization includes emergency changes in the configuration change control process, including changes resulting from the remediation of flaws. The approvals to implement a change to the IACS include successful results from the security analysis of the change. The organization audits activities associated with configuration changes to the IACS. 1891 Requirement Enhancements: 1892 1893 1894 1895 (1) The organization employs automated mechanisms to: (i) document proposed c hanges to the IACS; (ii) notify appropriate approval authorities; (iii) highlight approvals that have not been received in a timely manner; (iv) inhibit change until necessary approvals are received; and (v) document completed changes to the IACS. 1896 1897 (2) The organization tests, validates, and documents changes (e.g., patches and updates) before implementing the changes on the operational IACS. 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 Foundational Requirement: Rationale/Supplemental Guidance: The organization ensures that testing does not interfere with IACS functions. The individual/group conducting the tests fully understands the organizational information security policies and procedures, the IACS security policies and procedures, and the specific health, safety, and environmental risks associated with a particular facility and/or process. A production IACS may need to be taken off-line, or replicated to the extent feasible, before testing can be conducted. If an IACS must be taken off-line for testing, the tests are scheduled to occur during planned IACS outages whenever possible. In situations where the organization cannot, for operational reasons, conduct live testing of a production IACS, the organization employs compensating controls (e.g., providing a replicated system to conduct testing). 1910 12.7.4 Monitoring Configuration Changes 1911 Requirement: 1912 1913 The organization shall conduct security impact analyses to determine the effects of configuration changes. 1914 Foundational Requirement: This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 – 54 – ISA99, WG02, TG02 1915 1916 1917 1918 1919 1920 1921 1922 Rationale/Supplemental Guidance: Prior to change implementation, and as part of the change approval process, the organization analyzes changes to the IACS for potential adverse security consequences. After the IACS is changed (including upgrades and modifications), the organization checks the security features to verify that the features are still functioning properly. The organization audits activities associated with configuration changes to the IACS. Monitoring configuration changes and conducting security impact analyses are important elements with regard to the ongoing assessment o f security controls in the IACS. 1923 1924 Requirement Enhancements: None. 1925 12.7.5 Access Restrictions for Change 1926 Requirement: 1927 1928 1929 The organization shall: (i) approve individual access privileges and enforces physical and logical access restrictions associated with changes to the IACS; and (ii) generate, retain, and review records reflecting all such changes. 1930 Foundational Requirement: 1931 1932 1933 1934 1935 Rationale/Supplemental Guidance: Planned or unplanned changes to the hardware, software, and/or firmware components of the IACS can have signif icant effects on the overall security of the system. Accordingly, only qualified and authorized individuals obtain access to IACS components for purposes of initiating changes, including upgrades and modifications. 1936 Requirement Enhancements: 1937 1938 1939 (1) The organization employs automated mechanisms to enforce access restrictions and support auditing of the enforcement actions. 1940 1941 1942 1943 1944 1945 1946 12.7.6 Network and Security Configuration Settings Requirement: The IACS vendor shall provide guidelines for recommended network and securi ty configurations. The organization shall, based upon guidelines provided by the vendor: (i) establish mandatory network and security configuration settings for IACS components (ii) configure these settings to the most restrictive mode consistent with ope rational requirements; (iii) document these settings; and (iv) enforce these settings in all components of the IACS. 1947 Foundational Requirement: 1948 1949 Rationale/Supplemental Guidance: These configuration settings are the adjustable parameters of the IACS components. 1950 Requirement Enhancements: 1951 1952 1953 (1) The organization shall employ automated mechanisms to centrally manage, apply, and verify configuration settings. 1954 1955 12.7.7 IACS Component Inventory Requirement: This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 – 55 – ISA99, WG02, TG02 1956 1957 The organization shall develop, document, and maintain a current inventor y of the components of the IACS and relevant ownership information. 1958 Foundational Requirement: 1959 1960 1961 1962 1963 1964 1965 Rationale/Supplemental Guidance: The organization determines the appropriate level of granularity for the IACS components included in the inventory that are subj ect to management control (i.e., tracking, and reporting). The inventory of IACS components includes any information determined to be necessary by the organization to achieve effective property accountability (e.g., manufacturer, model number, serial numb er, software license information, system/component owner). The component inventory is consistent with the accreditation boundary of the IACS. 1966 1967 1968 Requirement Enhancements: (1) The organization updates the inventory of IACS components as an integral part of component installations. 1969 1970 1971 (2) The organization employs automated mechanisms to help maintain an up -to-date, complete, accurate, and readily available inventory of IACS components. 1972 12.7.8 System Maintenance Policy and Procedures 1973 Requirement: 1974 1975 1976 1977 1978 The organization shall develop, disseminate, and periodically review/update: (i) a formal, documented, IACS maintenance policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the IACS maintenance policy and associated system maintenance controls. 1979 Foundational Requirement: 1980 1981 1982 1983 1984 Rationale/Supplemental Guidance: The IACS maintenance policy and procedures are consistent with applicable laws, directives, policies, regulations, standards, and guidance. The IACS maintenance policy can be included as part of the general information security policy for the organization. System maintenance procedures can be developed for the security program in general, and for a particular IACS, when required. 1985 Requirement Enhancements: None. 1986 1987 1988 1989 1990 1991 12.7.9 Controlled Maintenance Requirement: The organization shall schedule, perform, document, and review records of routine preventative and regular maintenance (including repairs) on the components of the IACS in accordance with vendor, system integrator, and/or organizational specifications and requirements. 1992 Foundational Requirement: 1993 1994 1995 1996 1997 1998 1999 Rationale/Supplemental Guidance: All maintenance activities to include routin e, scheduled maintenance and repairs are controlled; whether performed on site or remotely and whether the equipment is serviced on site or removed to another location. Organizational officials approve the removal of the IACS or IACS components from the facility when repairs are necessary. If the IACS or component of the system requires off site repair, the organization removes all information from associated media using approved procedures. After maintenance is performed on the IACS, the organization This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 – 56 – ISA99, WG02, TG02 2000 2001 checks all potentially affected security controls to verify that the controls are still functioning properly. 2002 Requirement Enhancements: 2003 2004 2005 2006 2007 (1) The organization maintains maintenance records for the IACS that include: (i) the date and time of maintenance; (ii) name of the individual performing the maintenance; (iii) name of escort, if necessary; (iv) a description of the maintenance performed; and (v) a list of equipment removed or replaced (including identification numbers, if applicable). 2008 2009 2010 2011 (2) The organization employs automated mechanisms to schedule and conduct maintenance as required, and to create up-to date, accurate, complete, and available records of all maintenance actions, both needed and completed. 2012 12.7.10 Maintenance Tools 2013 Requirement: 2014 2015 The organization shall approve, control, and monitor the use of IACS maintenance tools and maintains the tools on an ongoing basis. 2016 Foundational Requirement: 2017 2018 2019 2020 2021 2022 2023 Rationale/Supplemental Guidance: The intent of this requirement is to address hardware and software brought into the IACS specifically for diagnostic/repair actions (e.g., a hardware or software packet sniffer that is introduced for the purpose of a particular maintenance activity). Hardware and/or software components that may support IACS maintenance, yet are a part of the system (e.g., the software implementing “ping”, “ls”, “ipconfig” or the hardware and software implementing the monitoring port of an Ethernet switch) are not covered by this requirement. 2024 Requirement Enhancements: 2025 2026 (1) The organization inspects all maintenance tools c arried into a facility by maintenance personnel for obvious improper modifications. 2027 Foundational Requirement: 2028 2029 Rationale/Supplemental Guidance: Maintenance tools include, for diagnostic and test equipment used to conduct maintenance on the IACS. example, 2030 2031 (2) The organization checks all media containing diagnostic and test programs for malicious code before the media are used in the IACS. 2032 2033 2034 2035 2036 (3) The organization checks all maintenance equipment with the capability of retaining information so that no organizational information is written on the equipment or the equipment is appropriately sanitized before release; if the equipment cannot be sanitized, the equipment remains within the facility or is destroyed, unless an appropriate organization official explicitly authori zes an exception. 2037 2038 2039 (4) The organization employs automated mechanisms to restrict the use of maintenance tools to authorized personnel only. 2040 2041 2042 2043 12.7.11 Remote Maintenance Requirement: The organization shall authorize, monitor, and control any remotely executed maintenanc e and diagnostic activities, if employed. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 – 57 – ISA99, WG02, TG02 2044 Foundational Requirement: 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058 Rationale/Supplemental Guidance: Remote maintenance and diagnostic activities are conducted by individuals communicating through an external, non -organization-controlled network (e.g., the Internet). The use of remote maintenance and diagnostic tools is consistent with organizational policy and documented in the security plan for the IACS. The organization maintains records for all remote maintenance and diagnostic activities. Other techniques and/or controls to consider for improving the security of remote maintenance include: (i) encryption and decryption of communications; (ii) strong identification and authentication techniques; and (iii) remote disconnect verification. When remote maintenance is completed, the organization (or IACS in certain cases) terminates all sessions and remote connections invoked in the performance of that activity. If password-based authentication is used to accomplish remote maintenance, the organization changes the passwords following each remote maintenance service. The National Security Agency provides a listing of approved media sanitization products at http://www.nsa.gov/ia/government/mdg.cfm . 2059 Requirement Enhancements: 2060 2061 2062 (1) The organization audits all remote maintenance and diagnostic sessions and appropriate organizational personnel review the maintenanc e records of the remote sessions. 2063 2064 2065 (2) The organization addresses the installation and use of remote maintenance and diagnostic links in the security plan for the IACS. 2066 2067 2068 12.7.12 Maintenance Personnel Requirement: The organization shall allow only authorized personnel to perform maintenance on the IACS. 2069 Foundational Requirement: 2070 2071 2072 2073 2074 2075 2076 Rationale/Supplemental Guidance: Maintenance personnel (whether performing maintenance locally or remotely) have appropriate access authorizations to the IACS when maintenance activities allow access to organizational information or could result in a future compromise of confidentiality, integrity, or availability. When maintenance personnel do not have needed access authorizations, organizational personnel with appropriate access authorizations supervise maintenance personnel during the performance of maintenance activities on the IACS. 2077 Requirement Enhancements: None. 2078 12.7.13 Timely Maintenance 2079 Requirement: 2080 2081 2082 The organization shall obtain maintenance support and spare parts for [ Assignment: organizationdefined list of key IACS components] within [Assignment: organization-defined time period] of failure. 2083 Foundational Requirement: 2084 Rationale/Supplemental Guidance: None. 2085 Requirement Enhancements: None. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 ISA-62443.02.02, D1E4, April 2013 2086 13 Incident Management 2087 13.1 – 58 – ISA99, WG02, TG02 Introduction 2088 2089 13.2 Reporting Security Events and Weaknesses 2090 13.2.1 Requirement: 2092 2093 Foundational Requirement: 2094 Rationale/Supplemental Guidance: 2095 Requirement Enhancements: 2096 2097 13.3 Management of Incidents and Improvements 2098 13.3.1 Incident Response Policy and Procedures 2099 Requirement: 2100 2101 2102 2103 2104 The organization shall develop, disseminate, and periodically review/update: (i) a forma l, documented, incident response policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the incident response policy and associated incident response controls. 2105 Foundational Requirement: 2106 2107 2108 2109 2110 Rationale/Supplemental Guidance: The incident response policy and procedures are consistent with applicable laws, directives, policies, regulations, standards, and guidance. The incident response policy can be included as part of the general information security policy for the organization. Incident response procedures can be developed for the security program in general, and for a particular IACS, when required. 2111 2112 Requirement Enhancements: None. 2113 2114 2115 2116 2117 13.3.2 Incident Response Training Requirement: The organization shall train personnel in their incident response roles and responsibilities with respect to the IACS and provides refresher training [ Assignment: organization-defined frequency, at least annually]. 2118 Foundational Requirement: 2119 Rationale/Supplemental Guidance: None. 2120 Requirement Enhancements: 2121 2122 (1) The organization incorporates simulated events into incident response training to facilitate effective response by personnel in crisis situations. 2123 2124 (2) The organization employs automated mechanisms to provide a more thorough and realistic training environment. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 2091 {Requirement} ISA‑62443-2-2, D1E4, April 2013 – 59 – ISA99, WG02, TG02 2125 2127 2128 2129 2130 2131 13.3.3 Incident Response Testing and Exercises Requirement: The organization shall test and/or exercise the incident response capability for the IACS [Assignment: organization-defined frequency, at least annually ] using [Assignment: organization-defined tests and/or exercises] to determine the incident response effectiveness and documents the results. 2132 Foundational Requirement: 2133 Rationale/Supplemental Guidance: None 2134 Requirement Enhancements: 2135 2136 (1) The organization employs automated mechanisms to more thoroughly and effectively test/exercise the incident response capability. 2137 2138 2139 2140 2141 2142 Foundational Requirement: Rationale/Supplemental Guidance: Automated mechanisms can provide the ability to more thoroughly and effectively test or exercise the incident response ca pability by providing more complete coverage of incident response issues, selecting more realistic test/exercise scenarios and environments, and more effectively stressing the response capability. 2143 13.3.4 Incident Handling 2144 Requirement: 2145 2146 The organization shall implement an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery. 2147 Foundational Requirement: 2148 2149 2150 2151 2152 Rationale/Supplemental Guidance: Incident-related information can be obtained from a variety of sources including, but not limited to, audit monitoring, network monitoring, physical access monitoring, and user/administrator reports. The organization incorporates the lessons learned from ongoing incident handling activities into the incident response procedures and implements the procedures accordingly. 2153 Requirement Enhancements: 2154 2155 (1) The organization employs automated mechanisms to support the incident handling process. 2156 13.3.5 Incident Monitoring 2157 Requirement: 2158 The organization shall track and document IACS security incidents on an ongoing basis. 2159 Foundational Requirement: 2160 Rationale/Supplemental Guidance: None. 2161 Requirement Enhancements: 2162 2163 (1) The organization employs automated mechanisms to assist in the tracking of security incidents and in the collection and analysis of incident information. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 2126 ISA-62443.02.02, D1E4, April 2013 2165 2166 ISA99, WG02, TG02 13.3.6 Incident Reporting Requirement: The organization shall promptly reports incident information to appropriate authorities. 2167 Foundational Requirement: 2168 2169 2170 2171 2172 2173 2174 Rationale/Supplemental Guidance: The types of incident information reported, the content and timeliness of the reports, and the list of designated reporting authorities or organizations are consistent with applicable laws, directives, policies, regulations, standards, and guidance. The United States Computer Em ergency Readiness Team (USCERT) maintains the IACS Security Center at http://www.uscert.gov/control_systems. In addition to incident information, weaknesses and vulnerabilities in the IACS are reported to appropriate organizational officials in a timely manner to prevent security incidents. 2175 Requirement Enhancements: 2176 2177 (1) The organization employs automated mechanisms to assist in the reporting of security incidents. 2178 2179 2180 2181 2182 13.3.7 Incident Response Assistance Requirement: The organization shall provide an incident response support resource that offers advice and assistance to users of the IACS for the handling and reporting of security incidents. The support resource is an integral part of the organization’s incident respo nse capability. 2183 Foundational Requirement: 2184 2185 2186 Rationale/Supplemental Guidance: Possible implementations of incident response support resources in an organization include a help desk or an assistance group and access to forensics services, when required. 2187 Requirement Enhancements: 2188 2189 (1) The organization employs automated mechanisms to increase the availability of incident response-related information and support. 2190 2191 13.3.8 IACS Monitoring Tools and Techniques 2192 Requirement: 2193 2194 2195 2196 The organization shall determine the required granularity of the information collected based upon its monitoring objectives and the capability of the IACS to support such activities. This includes monitoring inbound and outbound communications for unusual or unauthorized activities or conditions. 2197 Foundational Requirement: 2198 2199 2200 2201 2202 Rationale/Supplemental Guidance: Organizations consult appropriate legal counsel with regard to all IACS monitoring activities. Organizations heighten the level of IACS monitoring activity whenever there is an indication of increas ed risk to organizational operations, organizational assets, or individuals based on law enforcement information, intelligence information, or other credible sources of information. 2203 Requirement Enhancements: 2204 2205 (1) The organization interconnects and configures individual intrusion detection tools into a system wide intrusion detection system using common protocols. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 2164 – 60 – – 61 – This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 ISA99, WG02, TG02 2206 ISA-62443.02.02, D1E4, April 2013 2207 14 Business Continuity Management 2208 14.1 – 62 – ISA99, WG02, TG02 Introduction 2210 14.2 Security Aspects 2211 14.2.1 Contingency Planning Policy and Procedures 2212 Requirement: 2213 2214 2215 2216 2217 The organization shall develop, disseminates, and periodically reviews/updates: (i) a formal, documented, contingency planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (ii) formal, documented procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls. 2218 Foundational Requirement: 2219 2220 2221 2222 2223 Rationale/Supplemental Guidance: The contingency planning policy and procedures are consistent with applicable laws, directives, policies, regulations, standards, and guidance. The contingency planning policy can be included as part of the general information security policy for the organization. Contingency planning procedures can be develop ed for the security program in general, and for a particular IACS, when required. 2224 Requirement Enhancements: None. 2225 2226 2227 2228 2229 2230 2231 14.2.2 Contingency Plan Requirement: The organization shall develop and implement a contingency plan for the IACS addressing contingency roles, responsibilities, assigned individuals with contact information, and activities associated with restoring the system after a disruption or failure. Designated officials within the organization review and approve the contingency plan and distribute copies of the plan to key contingency personnel. 2232 Foundational Requirement: 2233 2234 2235 2236 2237 2238 Rationale/Supplemental Guidance: The organization defines contingency plans for categories of disruptions or failures. In the event of a loss of processing within the IACS or communication with operational facilities, the IACS executes predetermined procedures (e.g., alert the operator of the failure and then do nothing, alert the operator and then safely shut down the industrial process, alert the operator and then maintain the last operational setting prior to failure). These examples are not exhaustive. 2239 Requirement Enhancements: 2240 2241 (1) The organization coordinates contingency plan development with organizational elements responsible for related plans. 2242 Foundational Requirement: 2243 2244 2245 Rationale/Supplemental Guidance: Examples of related plans include Business Continuity Plan, Disaster Recovery Plan, Continuity of Operations Plan, Business Recovery Plan, Incident Response Plan, and Emergency Action Plan. 2246 2247 2248 (2) The organization conducts capacity planning s o that necessary capacity for information processing, telecommunications, and environmental support exists during crisis situations. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 2209 ISA‑62443-2-2, D1E4, April 2013 2250 2251 2252 2253 ISA99, WG02, TG02 14.2.3 Contingency Training Requirement: The organization shall train personnel in their contingency roles and responsibilities w ith respect to the IACS and provides refresher training [Assignment: organization-defined frequency, at least annually]. 2254 Foundational Requirement: 2255 Rationale/Supplemental Guidance: None. 2256 Requirement Enhancements: 2257 2258 (1) The organization incorporates simulated events into contingency training to facilitate effective response by personnel in crisis situations. 2259 2260 (2) The organization employs automated mechanisms to provide a more thorough and realistic training environment. 2261 2262 2263 2264 2265 2266 2267 14.2.4 Contingency Plan Testing and Exercises Requirement: The organization shall: (i) test and/or exercise the contingency plan for the IACS [ Assignment: organization-defined frequency, at least annually ] using [Assignment: organization-defined tests and/or exercises] to determine the plan’s effectiveness and the organization’s readiness to execute the plan; and (ii) review the contingency plan test/exercise results and initiates corrective actions. 2268 Foundational Requirement: 2269 2270 2271 2272 2273 2274 2275 Rationale/Supplemental Guidance: There are several methods for testing and/or exercising contingency plans to identify potential weaknesses (e.g., full -scale contingency plan testing, functional/tabletop exercises). The depth and rigor of contingency plan 𝑡𝑎𝑟𝑔𝑒𝑡 testing and/or exercises increases with the 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 level of the IACS. Contingency plan testing and/or exercises also include a determination of the effects on organizational operations and assets (e.g., reduction in mission capability) and individuals arising due to contingency operations in accordance with t he plan. 2276 Requirement Enhancements: 2277 2278 (1) The organization coordinates contingency plan testing and/or organizational elements responsible for related plans. exercises with 2279 Foundational Requirement: 2280 2281 2282 Rationale/Supplemental Guidance: Examples of related plans include Business Continuity Plan, Disaster Recovery Plan, Continuity of Operations Plan, Business Recovery Plan, Incident Response Plan, and Emergency Action Plan. 2283 2284 2285 (2) The organization tests/exercises the contingency plan at the alt ernate processing site to familiarize contingency personnel with the facility and available resources and to evaluate the site’s capabilities to support contingency operations. 2286 2287 2288 2289 (3) The organization employs automated mechanisms to more thoroughly and effectivel y test/exercise the contingency plan by providing more complete coverage of contingency issues, selecting more realistic test/exercise scenarios and environments, and more effectively stressing the IACS and supported missions. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 2249 – 63 – ISA-62443.02.02, D1E4, April 2013 – 64 – ISA99, WG02, TG02 2290 2292 2293 2294 2295 2296 14.2.5 Contingency Plan Update Requirement: The organization shall review the contingency plan for the IACS [ Assignment: organizationdefined frequency, at least annually] and revises the plan to address system/organizational changes or problems encountered during plan implementation, execution, or testing. 2297 Foundational Requirement: 2298 2299 2300 2301 2302 Rationale/Supplemental Guidance: Organizational changes include changes in mission, functions, or business processes supported by the IACS. The organization communicates changes to appropriate organizational elements responsible for related plans (e.g., Business Continuity Plan, Disaster Recovery Plan, Continuity of Operations Plan, Business Recovery Plan, Incident Response Plan, Emergency Action Plan). 2303 Requirement Enhancements: None. 2304 2305 2306 2307 2308 14.2.6 Alternate Storage Site Requirement: The organization shall identify an alternate storage site and initiates necessary agreements to permit the storage of IACS backup information. 2309 Foundational Requirement: 2310 2311 2312 Rationale/Supplemental Guidance: The frequency of IACS backups and the transfer rate of backup information to the alternate storage site (if so designated) are consistent with the organization’s recovery time objectives and recovery point objectives. 2313 Requirement Enhancements: 2314 2315 (1) The organization identifies an alternate storage site that is geographically separated from the primary storage site so as not to be susceptible to the same hazards. 2316 2317 (2) The organization configures the alternate storage site to facilitate timely and effective recovery operations. 2318 2319 2320 (3) The organization identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions. 2321 2322 2323 2324 2325 2326 2327 14.2.7 Alternate Control Site Requirement: The organization shall identify an alternate control site an d initiates necessary agreements to permit the resumption of IACS operations for critical mission/business functions within [Assignment: organization-defined time period] when the primary processing capabilities are unavailable. 2328 Foundational Requirement: 2329 2330 Rationale/Supplemental Guidance: Equipment and supplies required to resume operations within the organization-defined time period are either available at the alternate This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 2291 – 65 – ISA99, WG02, TG02 2331 2332 site or contracts are in place to support delivery to the site. Timeframes to resume IA CS operations are consistent with organization-established recovery time objectives. 2333 Requirement Enhancements: 2334 2335 2336 (1) The organization identifies an alternate processing site that is geographically separated from the primary processing site so as not to be suscep tible to the same hazards. 2337 2338 2339 (2) The organization identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions. 2340 2341 (3) The organization develops alternate processing site agreements that contain priorityof-service provisions in accordance with the organization’s availability requirements. 2342 2343 (4) The organization fully configures the alternate processing site so that it is ready to be used as the operational site supporting a minimum required operational capability. 2344 14.2.8 IACS Backup 2345 Requirement: 2346 2347 2348 The frequency of IACS backups and the transfer rate of backup information to alternate storage sites (if so designated) shall be consistent with the organization’s recovery time objectives and recovery point objectives. 2349 Foundational Requirement: 2350 2351 2352 Rationale/Supplemental Guidance: Availability of up-to-date backups is essential for recovery from IACS failure and mis-configuration. Automating this function ensures that all required files are captured, reducing operator overhead. 2353 2354 2355 2356 2357 An organizational assessment of risk guides the use of encryption for backup information. While integrity and availability are the primary concerns for system backup information, protecting backup information from unauthorized disclosure is also an important consideration depending on the type of informati on residing on the backup media and the 𝑡𝑎𝑟𝑔𝑒𝑡 𝑆𝑠𝑦𝑠𝑡𝑒𝑚 level. 2358 Requirement Enhancements: 2359 2360 (1) The organization selectively uses backup information in the restoration of IACS functions as part of contingency plan testing. 2361 2362 2363 (2) The organization stores backup copies of the operating system and other critical IACS software in a separate facility or in a fire-rated container that is not collocated with the operational software. 2364 14.2.9 IACS Recovery and Reconstruction 2365 Requirement: 2366 None. 2367 Foundational Requirement: 2368 2369 2370 2371 2372 2373 2374 Rationale/Supplemental Guidance: IACS recovery and reconstitution to a known secure state means that all system parameters (either default or organization -established) are set to secure values, security-critical patches are reinstalled, security-related configuration settings are reestablished, system documentation and operating procedures are available, application and system software is reinstalled and configured with secure settings, information from the most recent, known secure backups is loaded, and the sy stem is fully tested and functional. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 ISA-62443.02.02, D1E4, April 2013 – 66 – ISA99, WG02, TG02 2375 Requirement Enhancements: 2376 2377 (1) The organization shall include a full recovery and reconstitution of the IACS as part of contingency plan testing. 14.2.10 Power Equipment and Cabling 2379 Requirement: 2380 2381 The organization shall protect power equipment and power cabling for the IACS from damage and destruction. 2382 Foundational Requirement: 2383 Rationale/Supplemental Guidance: None. 2384 Requirement Enhancements: 2385 (1) The organization employs redundant and parallel power cabling paths. 2386 2387 2388 2389 2390 2391 14.3 Telecommunications Services Requirement: The organization shall identify primary and alternate telecommunications services to support the IACS and initiates necessary agreements to permit the resumption of system operations for critical mission/business functions within [ Assignment: organization-defined time period] when the primary telecommunications capabilities are unavailable. 2392 Foundational Requirement: 2393 2394 2395 2396 2397 Rationale/Supplemental Guidance: In the event that the primary and/or alternate telecommunications services are provided by a common carrier, the organization requests Telecommunications Service Priority (TSP) for all telecommunications services used for national security emergency preparedness (see http://tsp.ncs.gov for a full explanation of the TSP program). 2398 Requirement Enhancements: 2399 2400 2401 (1) The organization develops primary and alternate telecommunications service agreements that contain priority-of-service provisions in accordance with the organization’s availability requirements. 2402 2403 (2) The organization obtains alternate telecommunications services that do not share a single point of failure with primary telecommunications services. 2404 2405 2406 (3) The organization obtains alternate telecommunications service providers that are sufficiently separated from primary service providers so as not to be su sceptible to the same hazards. 2407 2408 2409 (4) The organization requires primary and alternate telecommunications service providers to have adequate contingency plans. 2410 14.3.1 Emergency Shutoff 2411 Requirement: 2412 2413 2414 2415 The IACS shall provide, for specific locations within a facility containing concentrations of IACS resources, the capability of shutting off power to any IACS component that may be malfunctioning or threatened without endangering personnel by requiring them to approach the equipment. 2416 Foundational Requirement: This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 2378 – 67 – ISA99, WG02, TG02 2417 2418 2419 2420 Rationale/Supplemental Guidance: Facilities containing concentrations of IACS resources may include, for example, data centers, server rooms, and mainframe rooms. Emergency shutoff capabilities are typically integrated with SIS systems, if present (e.g. automated fail-safe shutdown sequences). 2421 Requirement Enhancements: 2422 2423 2424 (1) The IACS shall protect the emergency power -off capability from accidental or unauthorized activation. 2425 14.3.2 Emergency Power 2426 Requirement: 2427 2428 The organization shall provide a short-term uninterruptible power supply to facilitate an orderly shutdown of the IACS in the event of a primary power source loss. 2429 Foundational Requirement: 2430 Rationale/Supplemental Guidance: None. 2431 Requirement Enhancements: 2432 2433 2434 (1) The organization provides a long-term alternate power supply for the IACS that is capable of maintaining minimally required operational capability in the event of an extended loss of the primary power source. 2435 2436 2437 (2) The organization provides a long-term alternate power supply for the IACS that is self contained and not reliant on external power generation. 2438 14.3.3 Emergency Lighting 2439 Requirement: 2440 2441 2442 The organization shall employ and maintains automatic emergency lighting that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes. 2443 Foundational Requirement: 2444 Rationale/Supplemental Guidance: None. 2445 Requirement Enhancements: None. 2446 2447 14.3.4 Fire Protection 2448 Requirement: 2449 2450 The organization shall employ and maintain fire suppression devices/systems that can be activated in the event of a fire. 2451 Foundational Requirement: 2452 2453 2454 Rationale/Supplemental Guidance: Fire suppression and detection devices/systems include, but are not limited to, sprinkler systems, handheld fire extinguishers, fixed fire hoses, and smoke detectors. 2455 Requirement Enhancements: and detection This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 – 68 – ISA99, WG02, TG02 2456 2457 (1) The organization employs fire detection devices/systems that activate automatically and notify the organization and emergency responders in the event of a fire. 2458 2459 (2) The organization employs fire suppression devices/systems that provide automatic notification of any activation to the organization and emergency responders. 2460 2461 2462 (3) The organization employs an automatic fire suppression capability in facilities that are not staffed on a continuous basis. 2463 14.3.5 Temperature and Humidity Controls 2464 Requirement: 2465 2466 The organization shall regularly maintain, within acceptable levels, and monitor the temperature and humidity within the facility where the IACS resides. 2467 Foundational Requirement: 2468 Rationale/Supplemental Guidance: None. 2469 2470 Requirement Enhancements: None. 2471 14.3.6 Water Damage Protection 2472 Requirement: 2473 2474 2475 The organization shall protect the IACS from water damage resulting from broken plumbing lines or other sources of water leakage by providing master shutoff valves that are accessible, working properly, and known to key personnel. 2476 Foundational Requirement: 2477 Rationale/Supplemental Guidance: None. 2478 Requirement Enhancements: 2479 2480 2481 (1) The organization employs mechanisms that, without the need for manual intervention, protect the IACS from water damage in the event of a significant water leak. 2482 15 Compliance 2483 15.1 2484 15.1.1 2485 General {Requirement} Requirement: 2486 2487 Foundational Requirement: 2488 Rationale/Supplemental Guidance: 2489 Requirement Enhancements: 2490 2491 2492 This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA-62443.02.02, D1E4, April 2013 – 69 – This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA‑62443-2-2, D1E4, April 2013 ISA99, WG02, TG02 2493 ISA-62443.02.02, D1E4, April 2013 – 70 – ISA99, WG02, TG02 Annex A (informative) Foundational Requirements 2494 2495 2496 2497 A.1 Overview 2498 This annex is intended to provide guidance to the reader as to the relevance of the SRs. 2499 A.2 2500 2501 2502 2503 2504 2505 2506 2507 2508 2509 2510 Identify and authenticate IACS users (incl. human users, processes, and devices), assign them to a pre-defined role, and allow them access to the system or assets. 2511 A.3 2512 2513 2514 2515 2516 2517 2518 2519 2520 2521 Enforce the assigned privileges of an authenticated IACS user to perform the requested action on the system or assets, and monitor the use of these privileges. 2522 A.4 2523 2524 2525 2526 2527 2528 2529 2530 2531 Ensure the integrity of information on communication channels and in data repositories to prevent unauthorized manipulation. 2532 A.5 2533 2534 Ensure the confidentiality of information on communication channels and in data repositories to prevent dissemination. 2535 2536 2537 Rationale: Some IACS generated information whether at rest or in transit is of confidential/sensitive nature. This implies that some communication channels and data -stores require protection against eavesdropping and unauthorized access. Rationale: Asset owners will have to develop a list of IACS users and to determine for each device the required level of access control protection. The goal of access control is to protect the system by verifying the identity of a user requesting the access to a de vice of the system before activating the communication. Recommendations and guidelines should include mechanisms that will operate in mixed modes; e.g. some devices on a communication channel require strong access control, i.e. strong authentication mechanism and others do not. By extension, access control requirements need to be extended to data at rest. FR2 USE C ONTROL Rationale: Asset owners will have to assign to each IACS user the privileges defining the authorized use of the system. The goal of use control is to protect against unauthorized actions on IACS resources by verifying if the necessary privileges are granted before allowing performing the action. Examples of actions are read or write data, download program, set configuration, etc. Recommendations and guidelines should include mechanisms that will operate in mixed modes; e.g. some IACS resources require strong use control protection, i.e. restrictive privileges and others do not. By extension, use control requirements need to be extended to data at rest . FR3 D ATA I NTEGRITY Rationale: Using the organization’s risk assessment methodology, asset owners will “select” communication channels that require strong integrity protection. Derived prescriptive recommendations and guidelines should include mechanisms that will operate in mixed modes; e.g. some communication channels require strong integrity protection and others do not. By extension, data integrity requirements need to be extended to data at rest; i.e. protecting the integrity of data that resides in selected repositories. FR4 D ATA CONFIDENTIALITY This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. FR1 ACCESS CONTROL ISA‑62443-2-2, D1E4, April 2013 – 71 – ISA99, WG02, TG02 2538 A.6 FR5 RESTRICT D ATA F LOW 2539 2540 2541 2542 2543 2544 2545 Segment the system via zones and conduits to limit the unnecessary flow of data. 2546 A.7 2547 2548 2549 2550 2551 2552 2553 2554 2555 2556 Respond to security violations by notifying the proper authority, reporting needed forensic evidence of the violation, and taking timely corrective action when incidents are discovered. 2557 A.8 2558 2559 2560 2561 2562 2563 Ensure the availability of the system or assets against the denial of essential services. FR6 T IMELY R ESPONSE TO AN EVENT Rationale: Using the organization’s risk assessment methodology, asset owners will establish policies and proper lines of communication and control needed to respond to security violations. Derived prescriptive recommendations and guidelines shou ld include mechanisms that collect, report and automatically correlate the forensic evidence to ensure timely corrective action. The use of monitoring tools and techniques must not adversely affect the operational performance of the IACS. FR7 RESOURCE AVAILABILITY Rationale: The aim of this series of System Requirements is to ensure that the system is resilient against various types of Denial of Service events. Thi s includes the unavailability of system functionality at various levels. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. Rationale: Using the organization’s risk assessment methodology, asset owners will determine necessary information flow restrictions and thus by extension determine the configuration of the conduits used to deliver these data. Derived prescriptive recommendations and guidelines should include mechanisms that range from disconnecting control networks from business or public networks to using stateful firewalls and DMZ to manage the flow of information. ISA-62443.02.02, D1E4, April 2013 – 72 – ISA99, WG02, TG02 Annex B (informative) Mapping Controls to Foundational Requirements 2564 2565 2566 2567 B.1 2569 2570 This annex is intended to provide guidance to the reader as to the relevance of the specific controls to the various foundational requirements. 2571 2572 NOTE 2573 Overview This annex will be completed as part of the final document generation after the primary content has been finalized. This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. 2568 ISA‑62443-2-2, D1E4, April 2013 2574 2575 – 73 – ISA99, WG02, TG02 BIBLIOGRAPHY 2576 2577 2578 2579 2580 NOTE 2581 References to other parts, both existing and anticipated, of the ISA‑62443 series: 2582 2583 NOTE 2584 2585 [1] ANSI/ISA‑62443-1-1-2007, Security for industrial automation and control systems: Terminology, concepts and models 2586 2587 [2] ANSI/ISA‑TR62443-1-2, Security for industrial automation and control systems: Master glossary of terms and abbreviations 2588 2589 [3] ANSI/ISA‑62443-1-3, Security for industrial automation and control systems: System security compliance metrics 2590 2591 [4] ANSI/ISA‑62443-2-1-2009, Security for industrial automation and control systems: Establishing an industrial automation and control system security program 2592 2593 [5] ANSI/ISA‑TR62443-2-3, Security for industrial automation and control systems: Patch management in the IACS environment 2594 2595 [6] ANSI/ISA‑TR62443-3-1-2007, Security for industrial autom ation and control systems: Security technologies for industrial automation and control systems 2596 2597 [7] ANSI/ISA‑62443-3-2, Security for industrial automation and control systems: Target security assurance levels for zones and conduits 2598 2599 [8] ANSI/ISA‑62443-3-3, Security for industrial automation and control systems: System security requirements and security assurance levels 2600 2601 [9] ANSI/Error! Unknown document property name., Security for industrial automation and control systems: Product development requirements 2602 2603 [10] ANSI/ISA‑62443-4-1, Security for industrial automation and control systems: Embedded devices 2604 [11] ANSI/ISA‑62443-4-2, Security for industrial automation and control systems: Host devices 2605 Other standards references: 2606 [12] 2607 2608 Some of these references are normative references (see Clause 2), published documents, in development, or anticipated. They are all listed here for completeness of the a nticipated parts of the ISA‑62443 series. ISO/IEC Directives, Part 2, Rules for the structure and drafting of International Standards This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. This bibliography includes references to sources used in the creation of this standard as well as references to sources that may aid the reader in developing a greater understanding of cyber security as a whole and developing a management system. Not all references in this bibliography are referred to throughout the text of this standard. The references have been broken down into different categories depending on the type of source they are. – 74 – This document includes working drafts of, or extracts from documents in the ISA-62443 series. New versions will be generated periodically as individual documents are revised. IS TO BE USED SOLELY FOR THE PURPOSES OF FURTHER DEVELOPMENT OF ISA STANDARDS, AND MAY NOT BE OFFERED FOR FURTHER REPRODUCTION OR FOR SALE. THE COPYRIGHT RESTS WITH ISA. ISA-62443.02.02, D1E4, April 2013 ISA99, WG02, TG02 2609