Uploaded by Derly Ali Gutierrez Arellano

ISA-62443-4-2-Public 2017

FOR USE AND REVIEW ONLY BY MEMBERS OF ISA99 AND APPROVED PARTIES:
This is a draft of an ISA99 committee work product. It is to be used solely for the purpose of supporting
the further development of ISA-62443 standards. New versions will be generated periodically as
individual documents are revised. It may not be reproduced or distributed to others, offered for sale, or
used for commercial purposes.
Copyright © by the International Society of Automaton. All rights reserved. Not for resale. Printed in
the United States of America. No part of this publication may be reproduced, stored in a retrieval
system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording, or
otherwise), without the prior written permission of the Publisher.
ISA
67 Alexander Drive
P. O. Box 12277
Research Triangle Park, North Carolina 27709
USA
This page intentionally left blank
ISA 62443 4 2
Security for industrial automation and control systems
Technical security requirements for IACS components
Draft 4, Edit 1
January 12, 2017
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
1
2
ISA-62443-4-2, D4E1
2
January 12, 2017
3
4
ISA
Security for industrial automation and control systems
Technical Security Requirements for IACS Components
ISBN: -to-be-assigned-
Copyright © 2017 by ISA. All rights reserved. Not for resale. Printed in the United State s of
America.
ISA
67 Alexander Drive
P. O. Box 12277
Research Triangle Park, NC 27709 USA
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
5
3
ISA-62443-4-2, D4E1
6
PREFACE
7
8
This preface, as well as all footnotes and annexes, is included for information purposes and is not
part of ISA 62443 4 2.
9
10
11
12
13
14
This document has been prepared as part of the service of ISA, the International Society of
Automation, toward a goal of uniformity in the field of instrumentation. To be of real value, this
document should not be static but should be subject to periodic review. Toward this end, the Society
welcomes all comments and criticisms and asks that they be addressed to the Secretary, Standards
and Practices Board; ISA; 67 Alexander Drive; P. O. Box 12277; Research Triangle Park, NC
27709; Telephone (919) 549-8411; Fax (919) 549-8288; E-mail: standards@isa.org.
15
16
17
18
19
20
21
22
23
24
The ISA Standards and Practices Department is aware of the growing need for attention to the
metric system of units in general and the International System of Units (SI) in particular, in the
preparation of instrumentation standards. The Department is further aware of the benefits to USA
users of ISA standards of incorporating suitable references to the SI (and the metric system) in
their business and professional dealings with other countries. Tow ard this end, this Department will
endeavor to introduce SI-acceptable metric units in all new and revised standards, recommended
practices and technical reports to the greatest extent possible. Standard for Use of the International
System of Units (SI): The Modern Metric System, published by the American Society for Testing
and Materials as IEEE/ASTM SI 10-97, and future revisions, will be the reference guide for
definitions, symbols, abbreviations, and conversion factors.
25
26
27
28
29
It is the policy of ISA to encourage and welcome the participation of all concerned individuals and
interests in the development of ISA standards, recommended practices and technical reports.
Participation in the ISA standards-making process by an individual in no way constitutes
endorsement by the employer of that individual, of ISA or of any of the standards, recommended
practices and technical reports that ISA develops.
30
31
32
33
34
CAUTION
ISA adheres to the policy of the American National Standards Institute with
regard to patents. If ISA is informed of an existing patent that is required for use of the
standard, it will require the owner of the patent to either grant a royalty -free license for use
of the patent by users complying with the standard or a license on reasonable terms and
conditions that are free from unfair discrimination.
35
36
37
38
39
40
41
42
Even if ISA is unaware of any patent covering this Standard, the user is cautioned that
implementation of the standard may require use of techniques, processes or materials
covered by patent rights. ISA takes no position on the existence or validity of any patent
rights that may be involved in implementing the standard. ISA is not responsible for
identifying all patents that may require a license before implementation of the standard or
for investigating the validity or scope of any patents brought to its attention. The user should
43
44
45
However, ISA asks that anyone reviewing this standard who is aware of any patents that may
impact implementation of the standard notify the ISA Standards and Practices Department
of the patent and its owner.
46
47
48
49
50
51
52
Additionally, the use of this standard may involve hazardous materials, operations or
equipment. The standard cannot anticipate all possible applications or address all possible
safety issues associated with use in hazardous conditions. The user of this standard must
53
application.
particular circumstances. The user must also consider the applicability of any governmental
regulatory limitations and established safety and health practices before implementing this
standard.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
January 12, 2017
ISA-62443-4-2, D4E1
January 12, 2017
The following people served as active members of ISA99 Working Group 04, Task Group 4 in the
preparation of this document:
Name
Company
Contributor
Reviewer
Kevin Staggs, TG Chair
Honeywell
Dennis Brandl
BR&L Consulting
X
X
Khaled Brown
Intel Security
X
Eric Byres
Byres Security Consulting.
X
Eric Cosman
OIT Concepts, LLC
X
William Cotter
3M Company
X
Ed Crawford
Chevron Energy Technology Co
X
John Cusimano
AE Solutions
Maarten de Caluwé
Dow Benelux BV
Michael Dransfield
NSA
Mark Fabro
Lofty Perch Inc.
X
Forrest Automation & Technology
Solutions LLC
X
Ronald Forrest
Dirk Gebert
Siemens
X
Jim Gilsinn
Kenexis
X
Thomas Good
ICS Security Consultant
X
Evan Hand
Conagra Foods
X
Vic Hammond
Argonne National Laboratory
X
Mark Heard
TMD Consulting
X
Dennis Holstein
OPUS Consulting Group
X
Bruce Honda
City of Federal Way
X
Charles Hoover
Rockwell Automation
Eric Hopp
Rockwell Automation
X
Bob Huba
Consultant
X
Andrew Kling
Schneider Electric
X
Pierre Kobes
Siemens
X
Nate Kube
Consultant
X
Joel Langill
AECOM
X
Suzanne Lightman
NIST
X
Charles Mastromonico
Westinghouse Savannah River Co.
X
Mike Medoff
Exida
X
Jason Moore
Xilinx
Ajay Mishra
Invensys
X
Alex Nicoll
Rockwell Automation
X
Johan Nye
Exxon Mobil
X
Bryan Owen
OSISoft Inc
X
Tom Phinney
Consultant
X
Jeff Potter
Emerson
Tom Phinney
Consultant
X
X
X
X
X
X
X
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
54
55
4
56
5
ISA-62443-4-2, D4E1
Bob Radvanovsky
Infracritical
X
Ragnar Schierholz
ABB
Omar Sherin
Q-Cert
X
Leon Steinocher
Redstone Investors
X
Herman Storey
Herman Storey Consulting
X
Michele Struvay
NXP Semiconductors
Tatsuaki Takebe
KPMG Consulting Co, Ltd
X
Bradley Taylor
University of the District of Columbia
X
Zachary Tudor
SRI International
X
Joseph Weiss
Applied Control Solutions LLC
X
Ludwig Winkel
Siemens AG
X
X
X
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
January 12, 2017
ISA-62443-4-2, D4E1
6
January 12, 2017
CONTENTS
57
59
0
Introduction ....................................................................................................................10
60
61
62
1
0.1
Overview ..............................................................................................................10
0.2
Purpose and intended audience ...........................................................................10
Scope .............................................................................................................................13
63
2
Normative references .....................................................................................................13
64
3
Terms, definitions, abbreviated terms, acronyms, and conventions .................................13
4
3.1 Terms and definitions ............................................................................................13
3.2 Abbreviated terms and acronyms ...........................................................................19
3.3 Conventions ..........................................................................................................22
Common control system security constraints ..................................................................22
5
4.1
4.2
4.3
4.4
4.5
FR 1
Overview ...............................................................................................................22
Support of essential functions ................................................................................23
Compensating countermeasures............................................................................23
Least privilege .......................................................................................................23
Overarching constraints .........................................................................................23
Identification and authentication control ..............................................................24
6
5.1
5.2
5.3
5.4
5.5
5.6
5.7
5.8
5.9
5.10
5.11
5.12
5.13
5.14
5.15
5.16
FR 2
Purpose and SL-C(IAC) descriptions .....................................................................24
Rationale ...............................................................................................................24
CR 1.1 Human user identification and authentication ..........................................25
CR 1.2 Software process and device identification and authentication ................25
CR 1.3 Account management .............................................................................27
CR 1.4 Identifier management ............................................................................27
CR 1.5 Authenticator management .....................................................................28
CR 1.6 Wireless access management .................................................................29
CR 1.7 Strength of password-based authentication.............................................29
CR 1.8 Public key infrastructure certificates .......................................................30
CR 1.9 Strength of public key-based authentication ............................................30
CR 1.10 Authenticator feedback .........................................................................32
CR 1.11 Unsuccessful login attempts .................................................................32
CR 1.12 System use notification .........................................................................33
CR 1.13 Access via untrusted networks ..............................................................33
CR 1.14 Strength of symmetric key-based authentication ...................................33
Use control..........................................................................................................34
6.1
6.2
6.3
6.4
6.5
6.6
6.7
6.8
Purpose and SL-C(UC) descriptions ......................................................................34
Rationale ...............................................................................................................35
CR 2.1 Authorization enforcement ......................................................................35
CR 2.2 Wireless use control ...............................................................................36
CR 2.3 Use control for portable and mobile devices ............................................36
CR 2.4 Mobile code ............................................................................................37
CR 2.5 Session lock ...........................................................................................37
CR 2.6 Remote session termination ....................................................................37
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
58
100
101
102
103
104
105
106
107
7
ISA-62443-4-2, D4E1
7
6.9
6.10
6.11
6.12
6.13
6.14
6.15
FR 3
CR 2.7
CR 2.8
CR 2.9
CR 2.10
CR 2.11
CR 2.12
CR 2.13
System
8
7.1
7.2
7.3
7.4
7.5
7.6
7.7
7.8
7.9
7.10
7.11
7.12
7.13
7.14
7.15
7.16
FR 4
Purpose and SL-C(SI) descriptions ........................................................................42
Rationale ...............................................................................................................42
CR 3.1 Communication integrity .........................................................................42
CR 3.2 Protection from malicious code ...............................................................43
CR 3.3 Security functionality verification .............................................................43
CR 3.4 Software and information integrity ...........................................................44
CR 3.5 Input validation .......................................................................................45
CR 3.6 Deterministic output ................................................................................45
CR 3.7 Error handling .........................................................................................46
CR 3.8 Session integrity .....................................................................................46
CR 3.9 Protection of audit information ................................................................47
CR 3.10 Support for updates ..............................................................................48
CR 3.11 Physical tamper resistance and detection .............................................48
CR 3.12 Provisioning product supplier roots of trust ...........................................48
CR 3.13 Provisioning asset owner roots of trust .................................................48
CR 3.14 Integrity of the boot process ..................................................................48
Data confidentiality..............................................................................................48
125
126
127
128
129
130
9
8.1
8.2
8.3
8.4
8.5
FR 5
Purpose and SL-C(DC) descriptions ......................................................................48
Rationale ...............................................................................................................48
CR 4.1 Information confidentiality .......................................................................48
CR 4.2 Information persistence ..........................................................................49
CR 4.3 Use of cryptography................................................................................50
Restricted data flow ............................................................................................51
131
132
133
134
135
136
9.1
9.2
9.3
9.4
9.5
10 FR 6
Purpose and SL-C(RDF) descriptions ....................................................................51
Rationale ...............................................................................................................51
CR 5.1 Network segmentation ............................................................................51
CR 5.2 Zone boundary protection .......................................................................51
CR 5.3 General purpose person-to-person communication restrictions ...............51
Timely response to events...................................................................................52
137
138
139
140
141
10.1
10.2
10.3
10.4
11 FR 7
Purpose and SL-C(TRE) descriptions ....................................................................52
Rationale ...............................................................................................................52
CR 6.1 Audit log accessibility .............................................................................52
CR 6.2 Continuous monitoring ............................................................................53
Resource availability ...........................................................................................53
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
142
143
144
Concurrent session control .....................................................................38
Auditable events .....................................................................................38
Audit storage capacity ............................................................................39
Response to audit processing failures ...................................................40
Timestamps ..........................................................................................40
Non-repudiation ....................................................................................41
Use of physical diagnostic and test interfaces .......................................42
integrity ..................................................................................................42
11.1 Purpose and SL-C(RA) descriptions ......................................................................53
11.2 Rationale ...............................................................................................................54
11.3 CR 7.1 Denial of service protection.....................................................................54
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
January 12, 2017
8
January 12, 2017
145
146
147
148
149
150
151
11.4 CR 7.2 Resource management ...........................................................................54
11.5 CR 7.3 Control system backup ...........................................................................55
11.6 CR 7.4 Control system recovery and reconstitution .............................................55
11.7 CR 7.6 Network and security configuration settings ............................................56
11.8 CR 7.7 Least functionality ...................................................................................56
11.9 CR 7.8 Control system component inventory ......................................................57
12 Software application requirements ..................................................................................57
152
153
154
155
12.1 Purpose.................................................................................................................57
12.2 SAR 2.4 Mobile code ..........................................................................................57
12.3 SAR 3.2 Protection from malicious code .............................................................58
13 Embedded device requirements ......................................................................................58
156
157
158
159
160
161
162
163
164
165
13.1
13.2
13.3
13.4
13.5
13.6
13.7
13.8
13.9
14 Host
166
167
168
169
170
171
172
173
174
175
14.1 Purpose.................................................................................................................64
14.2 HDR 2.4 Mobile code..........................................................................................64
14.3 HDR 2.13 Use of physical diagnostic and test interfaces ....................................64
14.4 HDR 3.2 Protection from malicious code .............................................................65
14.5 HDR 3.10 Support for updates ............................................................................65
14.6 HDR 3.11 Physical tamper resistance and detection ...........................................66
14.7 HDR 3.12 Provisioning product supplier roots of trust .........................................67
14.8 HDR 3.13 Provisioning asset owner roots of trust ...............................................67
14.9 HDR 3.14 Integrity of the boot process ...............................................................68
15 Network device requirements ..........................................................................................69
176
177
178
179
180
181
182
183
184
185
186
187
188
189
15.1 Purpose.................................................................................................................69
15.2 NDR 1.6 Wireless access management ..............................................................69
15.3 NDR 1.13 Access via untrusted networks ...........................................................69
15.4 NDR 2.4 Mobile code..........................................................................................70
15.5 NDR 2.13 Use of physical diagnostic and test interfaces ....................................70
15.6 NDR 3.2 Protection from malicious code .............................................................71
15.7 NDR 3.10 Support for updates ............................................................................71
15.8 NDR 3.11 Physical tamper resistance and detection ...........................................72
15.9 NDR 3.12 Provisioning product supplier roots of trust .........................................72
15.10 NDR 3.13 Provisioning asset owner roots of trust ...............................................73
15.11 NDR 3.14 Integrity of the boot process ...............................................................74
15.12 NDR 5.2 Zone boundary protection .....................................................................74
15.13 NDR 5.3 General purpose, person-to-person communication restrictions ............75
Annex A (informative) Component catagories........................................................................77
Purpose.................................................................................................................58
EDR 2.4 Mobile code ..........................................................................................59
EDR 2.13 Use of physical diagnostic and test interfaces .....................................59
EDR 3.2 Protection from malicious code .............................................................60
EDR 3.10 Support for updates ............................................................................60
EDR 3.11 Physical tamper resistance and detection ...........................................61
EDR 3.12 Provisioning product supplier roots of trust .........................................62
EDR 3.13 Provisioning asset owner roots of trust ...............................................62
EDR 3.14 Integrity of the boot process ...............................................................63
device requirements ...............................................................................................64
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
ISA-62443-4-2, D4E1
January 12, 2017
195
196
197
198
ISA-62443-4-2, D4E1
A.1
Device categories ..................................................................................................77
A.1.1 Device category: embedded device ...........................................................77
A.1.2 Device category: network device................................................................78
A.1.3 Device category: host device/application ...................................................78
Annex B (informative) Mapping of CRs and REs to FR SL levels 1 -4 .....................................80
B.1
B.2
Figure 1
Overview ...............................................................................................................80
SL mapping table ..................................................................................................80
ISA 62443 Work Products....................................................................................12
199
200
FOREWORD
201
202
203
204
205
206
This standard is part of a multipart standard that addresses the issue of security for the components which are contained
in industrial automation and control systems (IACS). It has been developed by working group 04, task group 4 of the
ISA99 committee in cooperation with IEC TC65/WG10.
This standard prescribes the security requirements for the components that are used to build control systems. These
security requirements are derived from the system requirements for IACS defined in ISA 62443 3 3 [1] 1 and as such,
assigns component security levels (SLs) which are based on the system security levels.
1 Numbers in brackets indicate references in the Bibliography.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
190
191
192
193
194
9
ISA-62443-4-2, D4E1
10
January 12, 2017
207
0
Introduction
208
209
210
211
NOTE
212
0.1
213
214
215
216
217
218
219
Industrial automation and control system (IACS) organizations increasingly use commercial -off-theshelf (COTS) networked devices that are inexpensive, efficient and highly automated. Control
systems are also increasingly interconnected with non -IACS networks for valid business reasons.
These devices, open networking technologies and increased connectivity provide an increased
opportunity for cyber-attack against control system hardware and software. That weakness may
lead to health, safety and environmental (HSE), financial and/or reputational consequences in
deployed control systems.
220
221
222
223
224
225
Organizations choosing to deploy business information technology (IT) cyber security solutions to
address IACS security may not fully comprehend the results of their decision. While many business
IT applications and security solutions can be applied to IACS, they need to be applied in an
appropriate way to eliminate inadvertent consequences. For this reason, the approach used to
define system requirements needs to be based on a combination of functional requirements and
risk assessment, often including an awareness of operational issues as well.
226
227
228
229
230
231
232
233
234
235
236
237
IACS security countermeasures should not have the potential to cause loss of essential services
and functions, including emergency procedures. (IT security countermeasures, as often deployed,
do have this potential.) IACS security goals focus on control system availability, plant protection,
plant operations (even in a degraded mode) and time -critical system response. IT security goals
often do not place the same emphasis on these factors; they may be more concerned with
protecting information rather than physical assets. These different goals need to be clearly stated
as security objectives regardless of the degree of plant integration ach ieved. A key step in the risk
assessment, as required by ISA 62443 2 1 2 [5], should be the identification of which services and
functions are truly essential for operations. (For example, in some facilities engineering support
may be determined to be a non-essential service or function.) In some cases, it may be acceptable
for a security action to cause temporary loss of a non-essential service or function, unlike an
essential service or function that should not be adversely affected.
238
239
240
241
242
243
This standard provides the cyber security technical requirements for the components that make up
an IACS, specifically the embedded devices, network components, host components and software
applications. This standard derives its requirements from the IACS System security requirements
described in ISA 62443 3 3 [11]. The intent of this standard is to specify security capabilities that
enable a component to be integrated into a system environment at a given security level (SL)
without the assistance of compensating countermeasures .
244
245
246
247
248
249
The primary goal of the ISA 62443 series is to provide a flexible framework that facilitates
addressing current and future vulnerabilities in IACS and applying necessary mitiga tions in a
systematic, defensible manner. It is important to understand that the intention of the ISA 62443
series is to build extensions to enterprise security that adapt the requirements for business IT
systems and combines them with the unique requirements for strong integrity and availability
needed by IACS.
250
0.2
251
252
The IACS community audience for this standard is intended to be asset owners, system integrators,
product suppliers, and, where appropriate, compliance authorities. Compliance authorities include
Overview
Purpose and intended audience
2 Many documents in the ISA 62443 series are currently under review or in development.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
The format of this standard follows the ISO/IEC requirements discussed in ISO/IEC Directives, Part 2 [13]. These
directives specify the format of the standard
requirements specified in normative clauses use the conventions discussed in Appendix H of the Directives
document.
11
ISA-62443-4-2, D4E1
253
254
government agencies and regulators with the legal authority to perform audits to verify compliance
with governing laws and regulations.
255
256
257
258
259
260
261
262
263
System integrators will use this standard to assist them in procuring control system components
that make up an IACS solution. The assistance will be in the form of helping system integrators
specify the appropriate security capability level of the individual components they are procuring .
The primary standards for system integrators are ISA 62443 2 1 [5], ISA 62443 2 4 [8],
ISA 62443 3 2 [10] and ISA 62443 3 3 [11] which provide organizational and operational
requirements for a security management system and guide them through the process of defining
security zones for a system and the target security capability levels (SL-T) for those zones. Once
the SL-T for each zone has been defined, the system integrator will procure components that
provide the necessary capabilities to achieve the SL-T for each zone.
264
265
266
267
268
269
270
271
272
273
Product suppliers will use this standard to understand the requirements placed on control system
components for specific security capability level (SL-C)s of those components. A component may
not provide the capability itself but may be designed to integrate with a higher level entity and thus
- for example an embedded device may not be maintaining a
user directory itself, but may integrate with a system wide authentication and authorization service
and thus still meet the requirements to provide individual user authentication, authorization and
management capabilities. This standard will guide product suppliers as to which requirements can
be allocated and which requirements need to be native in the components . As defined in Practice
8 of ISA 62443 4 1 [12], the product supplier will provide documentation of how to properly
integrate the component into a system to meet a specific SL-T.
274
275
276
277
278
The component requirements (CRs) in this standard are derived from the system requirements
(SRs) in ISA 62443 3 3 [11]. The requirements in ISA 62443 3 3 [11] are referred to as SRs,
which are derived from the overall foundational requirements (FRs) defined in ISA 62443 1 1 [1].
CRs may also include a set of requirement enhancements (REs). The combination of CRs and REs
is what will determine the target security level that a component is capable of .
279
280
281
This standard provides component requirements for four types of components: software application,
embedded device, host device and network device. Thus the CRs for each type of component will
be designated as follows:
282
Software application requirements (SAR);
283
Embedded device requirements (EDR);
284
Host device requirements (HDR); and
285
Network device requirements (NDR).
286
287
288
289
The majority of the requirements in this standard are the same for the four types of components
and are thus designated simply as a CR. When there are unique component-specific requirements
then the generic requirement will state that the requirements are component-specific and are
located in the device-specific requirements clauses of this standard.
290
Figure 1 shows a graphical depiction of the ISA 62443 series when this standard was written.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
January 12, 2017
292
12
291
Figure 1
ISA 62443 Work Products
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
ISA-62443-4-2, D4E1
January 12, 2017
1
Scope
294
295
296
297
298
299
300
This standard in the ISA 62443 series provides detailed technical control system component
requirements (CRs) associated with the seven foundational requirements (FRs) described in
ISA 62443 1 1 [1] including defining the requirements for control system capability security levels
and their components, SL-C(component). These requirements would be used by various members
of the industrial automation and control system (IACS) community along with the de fined zones
and conduits for the system under consideration (SuC) while developing the appropriate control
system target SL, SL-T(control system), for a specific asset.
301
As defined in ISA 62443 1 1 there are a total of seven FRs:
302
a) Identification and authentication control (IAC),
303
b) Use control (UC),
304
c) System integrity (SI),
305
d) Data confidentiality (DC),
306
e) Restricted data flow (RDF),
307
f) Timely response to events (TRE), and
308
g) Resource availability (RA).
309
310
311
These seven requirements are the foundation for control system capability SLs, SL-C(component).
Defining security capability at the control system component level is the goal and objective of this
standard as opposed to SL-T or achieved SLs (SL-A), which are out of scope.
312
313
NOTE
314
2
315
316
317
The following referenced documents are indispensable for the application of this standard. For
dated references, only the edition cited applies. For undated references, the latest edition of the
referenced document (including any amendments) applies.
318
319
ISA 62443 1 1
models [1]
320
321
ISA 62443 3 3 Security for industrial automation and control systems, Part 3-3: System security
requirements and security levels [11]
322
323
ISO/IEC 19790:2012 Information technology
cryptographic modules [17]
324
3
325
3.1
326
327
For the purposes of this document, the terms and definitions given in the normative references
specified in Clause 2 apply, in addition to the following.
328
329
330
331
NOTE
332
333
334
335
3.1.1
asset
any physical, logical and informational object that have value to the organization and are associated
with the IACS
Refer to ISA 62443 2 1 [5] for an equivalent set of non-technical, program-related, capability SRs necessary for
fully achieving a SL-T(control system).
Normative references
Security for industrial automation and control systems, Part 1-1: Concepts and
Security techniques
Security requirements for
Terms, definitions, abbreviated terms, acronyms, and conventions
Terms and definitions
Many of the following terms and definitions are originally based on relevant International Organization for
Standardization (ISO), International Electrotechnical Commission (IEC) and U.S. National Institute of Standards
and Technology (NIST) sources, sometimes with minor modifications to en hance suitability for control system
security requirements.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
293
336
337
338
Note 1 to entry: In this specific case, an asset is any item that should be protected as part of the IACS security
management system.
339
340
341
3.1.2
asset owner
individual or company responsible for one or more IACS
342
343
344
Note 1 to entry:
Used in place of the generic term end user to provide differentiation.
Note 2 to entry:
This includes the components that are part of the IACS.
Note 3 to entry:
In the context of this standard, an asset owner also includes the operator of the IACS.
345
346
347
3.1.3
attack
assault on a system that derives from an intelligent threat
348
349
350
351
352
353
354
355
356
357
358
359
Note 1 to entry: For example, an intelligent act that is a deliberate attempt (especially in the sense of a method or
technique) to evade security services and violate the security policy of a system .
360
361
362
3.1.4
authentication
provision of assurance that a claimed characteristic of an identity is correct
363
Note to entry:
364
365
366
3.1.5
authenticator
means used to confirm the identity of a user (human, software process or device)
367
Note to entry:
368
369
370
3.1.6
authenticity
property that an entity is what it claims to be
371
372
Note to entry: Authenticity is typically used in the context of confidence in the identity of an entity, or the validity of a
transmission, a message or message originator.
373
374
375
3.1.7
automatic
process or equipment that, under specified conditions, functions without human intervention
376
377
378
379
3.1.8
availability
property of ensuring timely and reliable access to and use of control system information and
functionality
380
381
382
3.1.9
communication channel
specific logical or physical communication link between IACS assets
383
Note to entry:
Note 2 to entry:
There are different commonly recognized classes of attack:
An "active attack" attempts to alter system resources or affect their operation.
A "passive attack" attempts to learn or make use of information from the system but does not affect system
resources.
An "inside attack" is an attack initiated by an entity inside the security perimeter (an "insider"), for example, an
entity that is authorized to access system res ources but uses them in a way not approved by those who granted
the authorization.
An "outside attack" is initiated from outside the perimeter, by an unauthorized or illegitimate user of the system
(including an insider attacking from outside the security perimeter). Potential outside attackers range from
amateur pranksters to organized criminals, international terrorists and hostile governments.
Authentication is usually a prerequisite to allowing access to resources in a control system.
For example, a password or token may be used as an authenticator.
A channel facilitates the establishment of a connection.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
Note 2 to entry: An asset is not limited to the IACS alone, but can also include the physical assets under its control
384
385
386
387
3.1.10
compensating countermeasure
countermeasure employed in lieu of or in addition to inherent security capabilities to satisfy one or
more security requirements
388
389
390
391
392
393
394
395
396
Note to entry:
397
398
399
400
3.1.11
conduit
logical grouping of communication channels , connecting two or more zones, that share common
security requirements
401
402
Note to entry: A conduit is allowed to traverse a zone as long as the security of the channels contained within the conduit
is not impacted by the zone.
403
404
405
3.1.12
confidentiality
assurance that information is not disclosed to unauthorized individuals, processes, or devices
406
407
Note to entry: When used in the context of an IACS, refers to protecting IACS data and information from unauthorized
access.
408
409
410
411
3.1.13
connection
association established between two or more endpoints that supports the establishment of a
session
412
413
414
3.1.14
consequence
condition or state that logically or naturally follows from an event
415
416
417
3.1.15
control system
hardware and software components of an IACS
418
419
420
421
422
3.1.16
countermeasure
action, device, procedure or technique that reduces a threat, a vulnerability or the consequences
of an attack by eliminating or preventing it, by m inimizing the harm it can cause or by discovering
and reporting it so that corrective action can be taken
423
424
425
Note to entry:
been chosen for this standard
.
426
427
428
429
3.1.17
degraded mode
mode of operation in the presence of faults that have been anticipated in the design of the control
system
430
431
432
433
Note to entry: Degraded modes allow the control system to continue to provide essential functions despite the deficiency
of one or several system elements, for example, malfunction or outage of control equipment , disruption of
communication due to failure or intentional system isolation in response to identified or suspected compromise
of subsystems.
(control system/zone-level): physical access control (guards, gates and guns) to protect a control room to restrict
access to a group of known personnel to compensate for the technical requirement for personnel to be uniquely
identified by the IACS; and
(component-level): a product supplier programmable logic controller (PLC) cannot meet the access control
capabilities from an asset owner, so the product supplier puts a firewall in front of the PLC and sells it as a
system.
oncept in some contexts. The term countermeasure has
process control and
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
Examples include:
(component-level): locked cabinet around a controller that does not have sufficient cyber access control
countermeasures;
3.1.18
device
asset incorporating one or more processors with the capability of sending or receiving data/control
to or from another asset
438
439
Note to entry: Examples include controllers, human-machine interfaces (HMIs), PLCs, remote terminal units (RTUs),
transmitters, actuators, valves, network switches, etc.
440
441
442
443
3.1.19
embedded device
special purpose device running embedded software designed to d irectly monitor, control or actuate
an industrial process
444
445
446
447
448
Note 1 to entry: Typical attributes limited storage, limited number of exposed services, programmed through an external
interface, embedded operating systems (OSs) or firmware equivalent, real-time scheduler, may have an attached
control panel, and may have a communications interface.
449
450
451
452
3.1.20
environment
surrounding objects, region or circumstances which may influence the behavior of the IACS and/or
may be influenced by the IACS
453
454
455
456
3.1.21
essential function
function or capability that is required to maintain health, safety, the environment (HSE) and
availability for the equipment under control
457
458
459
460
Note to entry: Essential functions include, but are not limited to, the safety instrumented function (SIF), the control
function and the ability of the operator to view and manipulate the equipment under control. The loss of essential
functions is commonly termed loss of protection, loss of control and loss of view respectively. In some industries
additional functions such as history may be considered essential.
461
462
463
3.1.22
event
occurrence of or change to a particular set of circumstances
464
465
466
Note to entry: In an IACS this may be an action taken by an individual (authorized or unauthorized), a change detected
within the control system (normal or abnormal) or an automated response from the control system itself (normal
or abnormal).
467
468
469
3.1.23
firecall
method established to provide emergency access to a secure control system
470
471
472
Note to entry: In an emergency situation, unprivileged users can gain access to key systems to correct the problem.
When a firecall is used, there is usually a review process to ensure that the access was used properly to correct
a problem. These methods generally either provide a one -time use user identifier (ID) or one-time password.
473
474
475
476
477
3.1.24
host device
general purpose device running an operating system (for example Microsoft Windows OS or Linux)
capable of hosting one or more software applications, data stores or functions from one or more
suppliers
478
479
Note to entry: Typical attributes include filesystem(s), programmable services , no real time scheduler and full HMI
(keyboard, mouse, etc.).
480
481
482
483
3.1.25
identifier
symbol, unique within its security domain, that identifies, indicates or names an entity that makes
an assertion or claim of identity
Note 2 to entry: Examples include PLCs, field sensor devices, safety instrumented system (SIS) controllers, distributed
control system (DCS) controllers.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
434
435
436
437
3.1.26
identify
assert an identity of
487
488
489
3.1.27
impact
evaluated consequence of a particular event
490
491
492
493
3.1.28
incident
event that is not part of the expected operation of a system or service that causes, or may cause,
an interruption to, or a reduction in, the quality of the service provided by the control system
494
495
496
497
3.1.29
industrial automation and control system
collection of personnel, hardware, software and policies involved in the operation of the industrial
process and that can affect or influence its safe, secure and reliable operation
498
499
500
3.1.30
integrity
intended function based on stated requirements under specific operating conditions
501
502
503
504
3.1.31
least privilege
basic principle that holds that users (humans, software processes or devices) should be assigned
the fewest privileges consistent with their assigned duties and f unctions
505
Note to entry:
506
507
508
509
510
3.1.32
mobile code
511
512
Note to entry: Examples of mobile code include JavaScript, VBScript, Java applets, ActiveX controls, Flash animations,
Shockwave movies, and Microsoft Office macros.
513
3.1.33
514
515
516
517
518
519
mobile device
intelligent electronic device intended for use while mobile
Note to entry: Examples of mobile devices include laptop computers (depending on their usage, laptops can also be
-held programmers, tablet computers and personal
digital assistants.
520
521
522
523
3.1.34
network device
device that facilitates data flow between devices, or restricts the flow of data, but does not directly
interact with a control process
524
525
Note to entry: Typical attributes include embedded OS or firmware, no HMI, no real-time scheduler and configured
through an external interface.
526
527
528
3.1.35
non-repudiation
ability to prove the occurrence of a claimed event or action and its originating entities
529
530
Note to entry: The purpose of non-repudiation is to resolve disputes about the occurrence or non -occurrence of the
event or action and involvement of entities in the event.
Least privilege is commonly implemented as a set of roles in an IACS.
removable media that can be executed unchanged on a local system without explicit installation or
execution by the recipient
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
484
485
486
531
3.1.36
532
533
534
535
536
portable device
intelligent electronic device intended to be used in more than one physical location, but not
intended for use while in transport between locations
537
538
539
3.1.37
product supplier
manufacturer of hardware and/or software product
540
Note to entry:
541
542
543
544
3.1.38
remote access
access to a control system by any user (human, software process or device) communicating from
outside the perimeter of the zone being addressed
545
546
547
548
3.1.39
role
set of connected behaviors, privileges and obligations associated with a given user or group of
users (humans, software processes or devices) of an IACS
549
Note to entry:
550
551
552
3.1.40
safety instrumented system
system used to implement one or more safety-related functions
553
554
555
556
3.1.41
security level
measure of confidence that the IACS or a component thereof is free from vulnerabilities and
functions in the intended manner
557
558
559
560
561
Note to entry: Vulnerabilities can either be designed into the IACS, inserted at any time during its lifecycle or result from
changing threats. Designed-in vulnerabilities may be discovered long after the initial deployment of the IACS,
for example an encryption technique has been broken or an improper policy for account management such as
not removing old user accounts. Inserted vulnerabilities may be the result of a patch or a change in policy that
opens up a new vulnerability.
562
563
564
565
3.1.42
session
semi-permanent, stateful and interactive information interchange between two or more
communicating devices
566
Note to entry:
567
568
569
3.1.43
session ID
identifier used to indicate a specific session entry
570
571
572
573
3.1.44
set point
target value identified within a control system that controls one or more actions within the control
system
574
3.1.45
575
576
577
software application
one or more software programs and their dependencies that are used to interface with the process
or the control system itself (for example, configuration software and historian)
Used in place of the generic word
to provide differentiation.
The privileges to perform certain operations are ass igned to specific roles.
Typically a session has clearly defined start and end processes.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
Note to entry: Examples of portable devices include laptop computers (depending on their usage, laptops can also be
578
579
580
Note 1 to entry: Software applications typically execute on host devices or embedded devices.
581
582
583
584
3.1.46
system integrator
person or company that specializes in bringing together component subsystems into a whole and
ensuring that those subsystems perform in accordance with project specifications
585
586
Note to entry: This may also include other system supplier designations such as General Automation Contractor, Main
Automation Contractor, Main Instrument Vendor, and similar .
587
588
589
590
591
3.1.47
threat
circumstance or event with the potential to adversely affect operations (including mission,
functions, image or reputation), assets, control systems or individuals via unauthorized access,
destruction, disclosure, modification of data and/or denial of service
592
593
594
595
3.1.48
trust
confidence that an operation, data transaction source, network or software process can be relied
upon to behave as expected
596
597
598
Note 1 to entry: Generally, an entity can be said to 'trust' a second entity when it (the first entity) makes the assumption
that the second entity will behave as the first entity expects.
599
600
601
602
3.1.49
unlinkability
assurance that a user may make multiple uses of resources or services without others being able to link
these uses together
603
604
605
3.1.50
untraceability
assurance that information cannot be used to track the time or location of a specific user
606
607
608
3.1.51
untrusted
not meeting predefined requirements to be trusted
609
Note to entry:
610
611
612
613
3.1.52
update
incremental hardware or software change in order to address a security vulnerability, a bug,
reliability or operability issue
614
615
616
3.1.53
upgrade
incremental hardware or software change in order to add a new feature
617
618
619
620
3.1.54
zone
collection of entities that represents partitioning of a System under Conside ration on the basis of
their functional, logical and physical (including location) relationship
621
622
Note to entry: A zone has a clear border. The security policy of a zone is typically enforced by a combination of
mechanisms both at the zone edge and within the zone.
623
3.2
Note 2 to entry:
This trust may apply only for some specific function.
An entity may simply be declared as untrusted.
Abbreviated terms and acronyms
ANSI
American National Standards Institute
API
Application programming interface
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
Note 2 to entry: Dependencies are any software programs that are necessary for the software application to functio n such
as database packages, reporting tools, or any third party or open source software .
Address space layout randomization
AVA_VAN
Common Criteria Class AVA Vulnerability Assessment
CA
Certification authority
CMAC
Cipher-based Message Authentication Code
COTS
Commercial off the shelf
CR
Component requirement
DC
Data confidentiality
DCS
Distributed control system
DEP
Data execution prevention
DMZ
Demilitarized zone
DoS
Denial of service
EAL
Evaluated assurance level
EDR
Embedded device requirement
EICAR
European Institute for Computer Antivirus Research
FAT
Factory acceptance testing
FDA
[US] Food and Drug Administration
FIPS
[US NIST] Federal Information Processing Standard
FR
Foundational requirement
FTP
File transfer protocol
GCM
Galois/Counter mode
GMAC
Galois message authentication c ode
HDR
Host device requirement
HMI
Human-machine interface
HSE
Health, safety and environmental
HTTP
Hypertext transfer protocol
HTTPS
HTTP secure
IAC
Identification and authentication control
IACS
Industrial automation and control system(s)
ID
Identifier
IDS
Intrusion detection system
IED
Intelligent electronic device
IEC
International Electrotechnical Commission
IEEE
Institute of Electrical and Electronics Engineers
IM
Instant messaging
IP
Internet protocol
IPS
Intrusion prevention system
ISA
International Society of Automation
ISO
International Organization for Standardization
IT
Information technology
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
ASLR
Network device requirement
NIST
U.S. National Institute of Standards and Technology
NX
No Execute
OS
Operating system
OWASP
Open Web Application Security Project
PC
Personal computer
PDF
Portable document format
PII
Personally identifiable information
PKI
Public key infrastructure
PLC
Programmable logic controller
PUF
Physically uncloneable function
RA
Resource availability
RADIUS
Remote authentication dial-in user service
RAM
Random access memory
RDF
Restricted data flow
RE
Requirement enhancement
RTOS
Real-time operating system
RTU
Remote terminal unit
SAR
Software application requirements
SAT
Site acceptance testing
SFTP
Secure FTP
SI
System integrity
SIEM
Security information and event management
SIF
Safety instrumented function
SIS
Safety instrumented system
SL
Security level
SL-A
Achieved security level
SL-C
Capability security level
SL-T
Target security level
SNMP
Simple network management protocol
SP
[US NIST] Special Publication
SR
System requirement
SSH
Secure socket shell
SuC
System under consideration
TCP
Transmission control protocol
TPM
Trusted platform module
TRE
Timely response to events
UC
Use control
USB
Universal serial bus
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
NDR
VPN
Virtual private network
3.3
625
626
627
628
629
630
631
632
633
634
635
636
637
638
This standard expands the SRs and REs defined in ISA 62443 3 3 [11] into a series of CRs and
REs for the components contained within an IACS. The types of components of an IACS as defined
in this standard are: software applications, host devices, embedded devices and network devices.
The majority of the SRs and REs are applicable to the four types of components and are combined
into a single Component Requirement (CR). Where there are unique requirements for each type
of component those are covered beginning with clause 12 Software application requirements. To
maintain ease of tracing the CRs to the SRs in ISA 62443 3 3 [11] the CR numbering will match
the associated SR. This will cause some gaps and non -sequential numbering in this standard. To
provide clarity to the reader, rationale and supplemental guidance is provided for each baseline
requirement and notes for any associated REs as is deemed necessary. The baseline requirement
and REs, if present, are then mapped to the component capability security level, SL-C(FR,
component) 1 to 4. The component capability security level, SL-C(FR, component) 1 to 4 is derived
from the control system capability security level defined for the associated SR in ISA 62443 3 3
[11].
639
640
641
642
643
As the security levels are derived from the system security levels defined in ISA 62443 3 3 [11],
these CRs are derived from the seven FRs defined in ISA 62443 1 1 [1]. Each of the seven FRs
has a defined set of four SLs. The control system capability level 0 for a particular FR is implicitly
defined as no requirements. For example, the purpose statement fo r Clause 8 FR 4
Data
confidentiality is:
644
645
Ensure the confidentiality of information on communication channels and in data repositories
to prevent unauthorized disclosure.
646
Conventions
The associated four SLs are defined as:
647
648
SL 1
Prevent the unauthorized disclosure of information via eavesdropping or casual
exposure.
649
650
SL 2 Prevent the unauthorized disclosure of information to an entity actively searching for
it using simple means with low resources, generic skills and low motivation.
651
652
653
SL 3 Prevent the unauthorized disclosure of information to an entity actively searching f or
it using sophisticated means with moderate resources, IACS specific skills and moderate
motivation.
654
655
656
SL 4 Prevent the unauthorized disclosure of information to an entity actively searching for
it using sophisticated means with extended resources, IACS specific skills and high
motivation.
657
658
659
The individual CR and RE assignments are thus based on an incremental increase in overall
component security for that particular FR based on knowledge and expertise from the team creating
this standard.
660
661
662
The SL-C(component), used throughout this standard, signifies a capability required to meet a
given SL rating for a given CR. A complete description of the SL vector concept can be found in
ISA 62443 3 3 [11].
663
4
664
4.1
665
666
667
Per the guidance provided in ISA 62443 3 3 [11], there are a number of system -level common
constraints. These system-level common constraints translate to component-level common
constraints such that the system-level common constraints are satisfied.
Common control system security constraints
Overview
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
624
4.2
Support of essential functions
669
670
As documented in clause 3.1.21
to maintain health,
671
672
Security countermeasures shall not adversely affect essential functions of a high availability
IACS unless supported by a risk assessment.
673
674
675
Thus the component-level CRs, which are derived from the system-level SRs, shall be designed
and implemented such that the essential functions of a high availability IACS are not adversely
affected by security countermeasures.
676
677
678
The components of the system such as software applications, embedded devices, host devices and
network devices shall adhere to specific constraints as described in clause 4 of ISA 62443 3 3
[11], including:
679
680
Access controls (IAC and UC) shall not prevent the operation of essential functions in
software applications and embedded devices with access controls.
681
682
Security countermeasures of embedded devices, host devices or network infrastructure that
provide boundary protection shall not im pact the essential functions of the system.
683
684
A denial of service (DoS) event on the control system or SIS network shall not prevent the
system components that implement the safety instrumented function (SIF) from acting.
685
4.3
Compensating countermeasures
686
687
688
689
690
There will be cases where one or more requirements specified in the document cannot be met the
requirement without the assistance of a compensating countermeasure that is external to the
component. When this is the case the documentation for that component shall describe the
appropriate countermeasures applied by the system to allow the requirement to be met when the
component is integrated into a system.
691
4.4
692
693
694
695
696
When required and appropriate, one or more system components (software applications, embedded
devices, host devices and network devices) shall provide the capability for the system to enforce
the concept of least privilege. Individual system components shall provide the granularity of
permissions and flexibility of mapping those permissions to roles sufficient to support it. Individual
accountability shall be available when required.
697
698
NOTE: Granularity of permissions and assignment is dependent on the type of device and the product documentation for
the device should define this in the product documentation.
699
4.5
700
The following overarching constraints will be referenced by the CR requirements.
701
4.5.1
702
703
All of the components defined in this standard shall be developed and supported following the
secure product development process guidelines described in ISA 62443 4 1 [12].
704
705
706
707
708
Controls described in this document that are not met must be addressed as part of the threat
assessment and mitigation process as described in ISA 62443 4 1 [12].
This includes
documenting security controls which are to be provided by the system into which the component is
installed. This documentation is to be included in the component document as described in
ISA 62443 4 1 [12].
709
4.5.2
710
The critical assets used to provide security shall be protected using hardware security.
Least privilege
Overarching constraints
Software development process
Implementation security
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
668
711
712
risk and threat analysis shows that these
methods are not required, or add no additional protection.
713
4.5.2.1
714
715
716
717
Based on a risk and threat analysis, components shall provide the capability to protect critical
assets via hardware mechanisms according to commonly accepted and proven security practices
and recommendations. This protection involves one or more of the following security objectives:
integrity, authenticity and confidentiality.
718
719
The component security shall match the value of the assets to be protected as part of that software
application/device.
720
721
722
Note: When cryptographic capabilities are required f or higher security level applications and devices t he security design
and implementation of the component a good reference for implementation of the capabilities is ISO/IEC 19790
[17] or FIPS 140-2 [24].
723
724
725
A risk and threat analysis shall be conducted to select the hardware security for the component
and a vulnerability analysis identifying the residual risks shall be conducted once the hardware
security is selected.
726
5
727
5.1
728
729
Identify and authenticate all users (humans, software processes and devices), and allow them
access to the system or assets.
730
731
SL 1
Identify and authenticate all users (humans, software processes and devices) by
mechanisms that protect against casual or coincidental access by unauthenticated entities.
732
733
734
SL 2
Identify and authenticate all users (humans, software processes and devices) by
mechanisms that protect against intentional unauthenticated access by entities using simple
means with low resources, generic skills and low motivation.
735
736
737
SL 3
Identify and authenticate all users (humans, software processes and devices) by
mechanisms that protect against intentional unauthenticated access by entities using
sophisticated means with moderate resources, IACS specific skills and moderate motivation.
738
739
740
SL 4
Identify and authenticate all users (humans, software processes and devices) by
mechanisms that protect against intentional unauthenticated access by entities using
sophisticated means with extended resources, IACS specific skills and high motivation.
FR 1
Identification and authentication control
Purpose and SL-C(IAC) descriptions
741
5.2
Rationale
742
743
744
745
746
747
748
749
750
Suppliers of components will develop a list of roles that are part of the product to enable that
product to securely operate in a system. This is done primarily for software processes and devices.
System integrators will work with end users to define a s et of roles necessary in the system to
support the requirements as specified by the asset owner. The goal of access control is to protect
the component by verifying the identity of any user requesting access to a component before
activating the communication with that component. Recommendations and guidelines should
include mechanisms that will operate in mixed modes. For example, some components on a
communication channel require strong access control, such as strong authentication mechanisms,
and others do not. By extension, access control requirements need to be extended to data at rest.
751
752
753
It is recommended that the number of identification and authentication mechanisms within a single
zone is minimized. The use of multiple identification and authenticati on mechanisms makes the
task of authentication and identification management more difficult to administer.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
Hardware security
754
5.3
755
5.3.1
756
757
758
759
760
Components shall provide the capability to identify and authenticate all human users according to
ISA 62443 3 3 [11] SR 1.1 on all interfaces capable of human user access . This capability shall
enforce such identification and authentication on all interfaces that provide human user access to
the component to support segregation of duties and least privilege in accordance with applicable
security policies and procedures.
761
Note: Applicable security policies are a local matter.
762
5.3.2
763
764
765
766
767
768
769
All human users need to be identified and authenticated for all access to the component.
Authentication of the identity of these users should be accomplished by using methods such as
passwords, tokens, and biometrics or, in the case of multifactor authentication, some combination
thereof. The geographic location of human users can also be used as part of the authentication
process. This requirement should be applied to both local and remote access to the component.
This requirement comes in addition to the requirement of having such an authentication and
identification at the system level.
770
771
772
773
774
775
776
Interfaces capable of human user access are loca l user interfaces such as touchscreens, push
buttons, keyboards, etc. as well as network protocols designed for human user interactions such
as hypertext transfer protocol (HTTP), secure HTTP (HTTPS), file transfer protocol (FTP), secure
FTP (SFTP), protocols used for device configuration tools (which are sometimes proprietary and
other times use open protocols). User identification and authentication may be role -based or groupbased (such as, for some component interfaces, several users may share the same identity). User
identification and authentication should not hamper fast , local emergency actions.
777
778
779
In order to support IAC policies, as defined according to ISA 62443 2 1 [5], the component should
verify the identity of all human users as a first step. In a second step, the permissions assigned to
the identified human user should be enforced (see 6.3).
780
5.3.3
781
(1) Unique identification and authentication:
783
Human user identification and authentication
Requirement
Rationale and supplemental guidance
Requirement enhancements
Components shall provide the capability to uniquely identify and authenticate all human users.
(2) Multifactor authentication for all interfaces
784
785
Components shall provide the capability to employ multifactor authentication for all human user
access to the component.
786
5.3.4
Security levels
787
The requirements for the four security levels that relate to CR 1.1 are:
788
SL-C(IAC,component) 1: CR 1.1
789
SL-C(IAC,component) 2: CR 1.1 (1)
790
SL-C(IAC,component) 3: CR 1.1 (1)
791
SL-C(IAC,component) 4: CR 1.1 (1) (2)
792
5.4
CR 1.2
Software process and device identification and authentication
793
5.4.1
794
795
796
Components shall provide the capability to identify itself and authenticate with any other component
(software application, embedded devices, host devices and network devices), according to
ISA 62443 3 3 [11] SR1.2.
Requirement
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
782
CR 1.1
797
798
799
If the component is running in the context of a human user, in addition, the identification and
authentication of the human user according to ISA 62443 3 3 [11] SR1.1 may be part of the
component identification and authentication process towards the other components.
800
5.4.2
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
The function of identification and authentication is to map an ID to an unknown software process or device
(henceforth referred to as an entity in this sub-clause) so as to make it known before allowing any data
exchange. Allowing rogue entities to send and receive control system specific data can result in
detrimental behavior of the legitimate control system.
829
830
831
In order to support identification and authentication control policies as defined according to ISA 62443 2 1
(99.02.01) [5], the control system verifies the identity of all entities as a first step. In a second step, the
permissions assigned to the identified entity are enforced (see 6.3, CR 2.1 Authorization enforcement)
832
5.4.3
833
(1) Unique identification and authentication
All entities should be identified and authenticated for all access to the control system. Authentication of the
identity of such entities should be accomplished by using methods such as passwords, tokens or location
(physical or logical). This requirement should be applied to both local and remote access to the control
system. However, in some scenarios where individual entities are used to connect to different target
systems (for example, remote vendor support), it may be technically infeasible for an entity to have
multiple identities. In these cases, compensating countermeasures would have to be applied.
Identification and authentication mechanisms for all entities are needed to protect against attacks such as
man-in-the-middle or message spoofing. In some cases, these mechanisms may involve multiple software
processes running on the same physical server, each having their own identity. In other cases, the identity
may be bound to the physical device, such as all processes running on a given PLC.
Special attention needs to be made when identifying and authenticating portable and mobile devices.
These types of devices are a known method of introducing undesired network traffic, malware and/or
information exposure to control systems, including otherwise isolated networks.
Where entities function as a single group, identification and authentication may be role-based, groupbased or entity-based. It is essential that local emergency actions as well as control system essential
functions not be hampered by identification or authentication requirements (see clause 4 for a more
complete discussion). For example, in common protection and control schemes, a group of devices jointly
execute the protection functions and communicate with multicast messages among the devices in the
group. In these cases, group authentication based on shared accounts or shared symmetric keys are
commonly used.
Requirement enhancements
Components shall provide the capability to uniquely and securely identify and authenticate itself
to any other component.
836
5.4.4
Security levels
837
The requirements for the four security levels that relate to CR 1.2 are:
838
SL-C(IAC,component) 1: Not Selected
839
SL-C(IAC,component) 2: CR 1.2
840
SL-C(IAC,component) 3: CR 1.2 (1)
841
SL-C(IAC,component) 4: CR 1.2 (1)
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
834
835
Rationale and supplemental guidance
842
5.5
CR 1.3
Account management
843
5.5.1
844
845
Components shall provide the capability to support the management of all accounts and/or provide
the management of all accounts directly according to ISA 62443 3 3 [11] SR 1.3.
846
5.5.2
847
848
A component may provide this capability by integrating into a higher level account management
system.
849
850
851
852
A common approach meeting this requirement would be a component that delegates the valuation
of authentication to a directory server (for example, using a protocol like remote authentication dialin user service (RADIUS) or Kerberos) which provides the account management capabilities
required by ISA 62443 3 3 [11] SR 1.3.
853
854
855
When a component integrates into a higher level system to provide the account management
capabilities there needs to be consideration for the impact to the component in the event that the
higher level system capability becomes unavailable.
856
5.5.3
857
None
858
5.5.4
859
The requirements for the four security levels that relate to CR 1.3 are:
Rationale and supplemental guidance
Requirement enhancements
Security levels
860
SL-C(IAC,component) 1: CR 1.3
861
SL-C(IAC,component) 2: CR 1.3
862
SL-C(IAC,component) 3: CR 1.3
863
SL-C(IAC,component) 4: CR 1.3
864
5.6
CR 1.4
Identifier management
865
5.6.1
866
867
868
Components shall provide the capability to integrate into a system that supports the management
of identifiers and/or provide the capability to support the management of identifiers directly
according to ISA 62443 3 3 [11] SR 1.4.
869
5.6.2
870
None
871
5.6.3
872
None
873
5.6.4
874
The requirements for the four security levels that relate to CR 1.4 are:
Requirement
Rationale and supplemental guidance
Requirement enhancements
Security levels
875
SL-C(IAC,component) 1: CR 1.4
876
SL-C(IAC,component) 2: CR 1.4
877
SL-C(IAC,component) 3: CR 1.4
878
SL-C(IAC,component) 4: CR 1.4
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
Requirement
879
5.7
CR 1.5
Authenticator management
880
5.7.1
881
Components shall provide the capability to:
882
a) support the use of initial authenticator content;
883
h) support the recognition of changes to default authenticators made at installation time;
884
i)
function properly with periodic authenticator change/refresh operation; and
885
886
887
888
889
j)
protect authenticators from unauthorized disclosure and modification when stored, us ed and
transmitted.
Note: Lockout or loss of control due to security countermeasures is not acceptable. If the control system is required to
have a high level of availability, measures should be taken to maintain this high level of availability (such as
compensating physical countermeasures, duplicate keys and supervisory override).
890
5.7.2
891
892
893
894
895
896
In addition to an identifier (see 5.6) an authenticator is required to prove identity. Control system
authenticators include, but are not limited to, tokens, symmetric keys, private keys (part of a
public/private key pair), biometrics, passwords, physical keys and key cards. There should be
security policies in place instructing that human users must take reasonable measures to safeguard
authenticators, including maintaining possession of their individual authenticators, not loaning or
sharing authenticators with others and reporting lost or compromised a uthenticators immediately.
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
Authenticators have a lifecycle. When an account is created automatically a new authenticator
needs to be created, in order for the account owner to be able to authenticate. For example, in a
password-based system, the account has a password associated with it. Definition of the initial
authenticator content could be interpreted as the administrator defining the initial password that
the account management system sets for all new accounts. Being able to configure these initial
values makes it harder for an attacker to guess the password between account creation and first
account use (which should involve the setting of a new password by the account owner). Some
control systems are installed with unattended installers that create all necessary accounts with
default passwords and some embedded devices are shipped with default passwords. Over time,
these passwords often become general knowledge and are documented on the Internet. Being able
to change the default passwords protects the system against unauthorized users using default
passwords to gain access. Passwords can be obtained from storage or from transmission when
used in network authentication. The complexity of this can be increased by cryptographic
protections such as encryption or hashing or by handshake protocols that do not require
transmission of the password at all. Still, passwords might be subject to attacks, for example , brute
force guessing or breaking the cryptographic protection of passwords in transit or s torage. The
window of opportunity can be reduced by changing/refreshing the passwords periodically. Similar
considerations apply to authentication systems based on cryptographic keys. Enhanced protection
can be achieved by using hardware mechanisms such as hardware security modules like trusted
platform modules (TPMs).
917
918
919
The management of authenticators should be specified in applicable security policies and
procedures, for example, constraints to change default authenticators, refresh periods,
specification of the protection of authenticators or firecall procedures.
Rationale and supplemental guidance
920
921
922
923
924
925
926
927
Besides the capabilities for authenticator management specified in this requirement, the strength
of the authentication mechanism depends on the strength of the chosen authenticator (for example ,
password complexity or key length in public key authentication) and the policies for validating the
authenticator in the authentication process (for example , how long a password is valid or which
checks are performed in public key certificate validation). For the most common authentication
mechanisms, password-based and public key authentication, 5.9, 5.10 and 5.11 provide further
requirements.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
Requirement
928
929
930
931
Use of components for some operations may be restricted, requiring addition al authentication (such
as, tokens, keys and certificates) in order to perform some functions . Different measures to
safeguard authenticators may be required for components than what may be required for
processors.
932
5.7.3
933
(1) Hardware security for authenticators
934
935
936
The authenticators on which the component rely shall be protected via hardware mechanisms.
Note: Examples of hardware authentication include: Password protected memory, OTP memory, hardware data integrity
checks, and device security boot mechanism.
937
5.7.4
938
The requirements for the four security levels that relate to CR 1.5 are:
Security levels
939
SL-C(IAC,component) 1: CR 1.5
940
SL-C(IAC,component) 2: CR 1.5
941
SL-C(IAC,component) 3: CR 1.5 (1)
942
SL-C(IAC,component) 4: CR 1.5 (1)
943
5.8
CR 1.6
944
945
The wireless access management requirements are device-specific and can be located as
requirements for each specific device type in Clauses 15.
946
5.9
947
5.9.1
948
949
950
For components that utilize password-based authentication, those components shall provide or
integrate into a system that provides the capability to enforce configurable password strength based
on minimum length and variety of character types.
951
5.9.2
952
953
954
955
956
The ability to enforce configurable password strength, whether it is based on minimum length,
variety of characters, or duration of time (the minimum being a one -time password) is necessary to
assist in increasing the overall security of user chosen passwor ds. Generally accepted practices
and recommendations can be found in documents such as NIST SP800-63-2, Electronic
Authentication Guideline (Augustl 2013) [27].
957
5.9.3
958
(1) Password generation and lifetime restrictions for human users
CR 1.7
Wireless access management
Strength of password-based authentication
Requirement
Rationale and supplemental guidance
Requirement enhancements
959
Components shall provide, or integrate into a system that provides, the capability to prevent
960
any given human user account from reusing a password for a configurable number of
961
generations. In addition, the component shall provide the capability to enforce password
962
minimum and maximum lifetime restrictions for human users . These capabilities shall conform
963
to commonly accepted security industry practices.
964NOTE The component should provide the capability to prompt the user to change their password upon a configurable time
965
prior to expiration.
966
(2) Password lifetime restrictions for all users (human, software process, or device)
967
968
969
Components shall provide, or integrate into a system that provides , the capability to enforce
password minimum and maximum lifetime restrictions for all users.
Note: Examples may be automated data exchange thru SSH, SFTP or certificate passwords keystore.
970
5.9.4
971
The requirements for the four security levels that relate to CR 1.7 are:
Security levels
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
Requirement enhancements
SL-C(IAC,component) 1: CR 1.7
973
SL-C(IAC,component) 2: CR 1.7
974
SL-C(IAC,component) 3: CR 1.7 (1)
975
SL-C(IAC,component) 4: CR 1.7 (1) (2)
976
5.10
CR 1.8
Public key infrastructure certificates
977
5.10.1
978
979
980
When public key infrastructure (PKI) is utilized, the component shall provide or integrate into a
system that provides the capability to interact and operate in accordance with ISA 62443 3 3 [11]
SR1.8.
981
5.10.2
982
983
984
985
986
987
988
The selection of an appropriate PKI should consi der the orga
ate policy which
should be based on the risk associated with a breach of confidentiality of the protected information.
Guidance on the policy definition can be found in commonly accepted standards and guidelines,
such as the Internet Engineering Task Force (IETF) Request for Comment (RFC) 3647 [31] for
X.509-based PKI. For example, the appropriate location of a certification authority (CA), whether
within the control system versus on the Internet, and the list of trusted CAs should be con sidered
in the policy and depends on the network architecture (see also ISA 62443 2 1 [5]).
989
5.10.3
990
None
991
5.10.4
992
The requirements for the four security levels that relate to CR 1.8 are:
Requirement
Rationale and supplemental guidance
Requirement enhancements
Security levels
993
SL-C(IAC,component) 1: Not selected
994
SL-C(IAC,component) 2: CR 1.8
995
SL-C(IAC,component) 3: CR 1.8
996
SL-C(IAC,component) 4: CR 1.8
997
5.11
998
5.11.1
CR 1.9
Strength of public key-based authentication
Requirement
999
1000
1001
For components that utilize public-key-based authentication, those components shall provide
directly or integrate into a system that provides the capability within the same IACS environment
to:
1002
a) validate certificates by checking the validity of the signature of a given certificate;
1003
1004
k) validate the certificate chain or, in the case of self-signed certificates, by deploying leaf
certificates to all hosts that communicate with the subject to which the certificate is issued;
1005
l)
1006
m) establish user (human, software process or device) control of the corresponding private key;
1007
1008
1009
n) map the authenticated identity to a user (human, software process or device) by checking
either subject name, common name or distinguished name against the requested
destination; and
1010
1011
1012
o) ensure that the algorithms and keys used for the symmetric key authentication comply with
8.5 CR 4.3 Use of cryptography.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
972
5.11.2
1014
1015
1016
1017
To meet the requirements in this clause does not necessarily require a real time connection to a
certificate authority. Alternative out of band methods may be used to meet the requirements in this
clause. For example, a disconnected system could install and update certifications using manual
out-of-band processes.
1018
1019
1020
1021
1022
1023
1024
1025
Rationale and supplemental guidance
and proper handling of the trust relationships. When v erifying a trust between two entities based
on public key authentication, it is essential to trace the public key certificate to a trusted entity. A
signature, but not checking the trust in the signer. In a PKI setting, a signer is trusted if they are a
trusted CA or have a certificate issued by a trusted CA, thus all verifiers need to trace certificates
presented to them back to a trusted CA. If such a chain of trusted CAs cannot be established, the
presented certificate should not be trusted.
1026
1027
1028
1029
1030
1031
1032
1033
If self-signed certificates are used instead of a PKI, the certificate subject itself signed its certificate,
thus there never is a trusted third-party or CA. This should be compensated by deploying the self signed public key certificates to all peers that need to validate them via an otherwise secured
mechanism (for example, configuration of all peers in a trusted environment). Trusted certificates
need to be distributed to peers through secure channels. During the validation process, a self signed certificate should only be trusted if it is already present in the list of trusted certificates of
the validating peer. The set of trusted certificates should be configure d to the minimum necessary
set.
1034
1035
1036
1037
1038
1039
In both cases, validation needs to also consider the possibility that a certificate is revoked. In a PKI
setting this is typically done by maintaining certificate revocation lists (CRLs) or running an online
certificate status protocol (OCSP) server. When revocation checking is not available due to control
system constraints, mechanisms such as a short certificate lifetime can compensate for the lack of
timely revocation information. Note that short lifetime certificates can sometimes create significant
operational issues in a control system environment.
1040
1041
1042
1043
1044
1045
It is expected that most components will integrate into an IACS and leverage the key authentication
mechanisms provided by the underlying IACS. When implementing public key authentication at the
component-level of an IACS, protection of the key becomes a primary concern and objective of key
storage on that component. Care should be taken in the implementation to assure that any private
keys stored within the component cannot be modified or tampered (See 5.7, CR 1.5 Authenticator
management).
1046
1047
NOTE Tamper resistant design methodologies and technologies are available to assist with designing a secure private
key protection mechanism.
1048
5.11.3
1049
(1) Hardware security for public key-based authentication
1050
Requirement enhancements
The control system shall provide the capability to protect the relevant private keys via hardware.
1051
5.11.4
Security levels
1052
The requirements for the four security levels that relate to CR 1.9 are:
1053
SL-C(IAC,component) 1: Not selected
1054
SL-C(IAC,component) 2: CR 1.9
1055
SL-C(IAC,component) 3: CR 1.9 (1)
1056
SL-C(IAC,component) 4: CR 1.9 (1):
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
1013
1057
5.12
CR 1.10
Authenticator feedback
1058
5.12.1
1059
1060
When a component provides an authentication capability, the component shall provide the
capability to obscure feedback of authentication information during the authentication pro cess.
1061
5.12.2
1062
1063
1064
1065
1066
1067
Obscuring feedback protects the information from possible exploitation by unauthorized individuals,
for example, displaying asterisks or other random characters when a human user types in a
username and/or password obscures feedback of authentication information. Other examples
include the entry of secure socket shell (SSH) token entry and one-time passwords. The
authenticating entity should not provide any hint as to the reason for the authentication failu re, such
1068
5.12.3
1069
None
1070
5.12.4
1071
The requirements for the four SL levels that relate to CR 1.10 are:
Rationale and supplemental guidance
Requirement enhancements
Security levels
1072
SL-C(IAC,component) 1: CR 1.10
1073
SL-C(IAC,component) 2: CR 1.10
1074
SL-C(IAC,component) 3: CR 1.10
1075
SL-C(IAC,component) 4: CR 1.10
1076
5.13
CR 1.11
Unsuccessful login attempts
1077
5.13.1
1078
1079
When a component provides an authentication capability, the component shall provide the
capability to:
1080
1081
a) enforce a limit of a configurable number of consecutive invalid access attempts by any user
(human, software process or device) during a configurable time period ; and
1082
1083
1084
b) deny access for a specified period of time or until unlocked by an administrator when this
limit has been reached.
Note: An administrator may unlock an account prior to the expiratio n of the timeout period.
1085
5.13.2
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
Due to the potential for denial of service, the number of consecutive invalid access attempts may
be limited. If enabled, the application or device may automatically reset to zero the number of
access attempts after a predetermined time period established by the applicable security policies
and procedures. Resetting the access attempts to zero will allow users (human, software process
or device) to gain access if they have the correct login identi fier. Automatic denial of access for
control system operator workstations or nodes should not be used when immediate operator
responses are required in emergency situations. All lockout mechanisms should consider functional
requirements for continuous operations so as to mitigate adverse denial of service operating
conditions which could result in total system failure or injury to personnel. Allowing interactive
logins to an account used for critical services could provide a potential for denial of service or other
abuse.
1097
5.13.3
1098
None
Requirement
Rationale and supplemental guidance
Requirement enhancements
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
Requirement
5.13.4
Security levels
1100
The requirements for the four SL levels that relate to CR 1.11 are:
1101
SL-C(IAC,component) 1: CR 1.11
1102
SL-C(IAC,component) 2: CR 1.11
1103
SL-C(IAC,component) 3: CR 1.11
1104
SL-C(IAC,component) 4: CR 1.11
1105
5.14
CR 1.12
System use notification
1106
5.14.1
1107
1108
1109
When a component provides local human user access/HMI, it shall provide the capability to display
a system use notification message before authenticating. The system use notification message
shall be configurable by authorized personnel.
1110
5.14.2
1111
1112
1113
1114
1115
1116
1117
Privacy and security policies and procedures need to be consistent with applicable laws, directives,
policies, regulations, standards and guidance. Often , the main justification for this requirement is
legal prosecution of violators and proving intentional breach. This capability is thus necessary to
support policy requirements, and might improve IACS security because it can be used as a
deterrent. System use notification messages can be implemented in the form of warning banners
displayed when individuals log in to the control system. A warning banner implemented as a posted
physical notice in the control system facility does not prote ct against remote login issues.
1118
Examples of elements for inclusion in the system use notification message are:
1119
a) that the individual is accessing a specific control system;
Requirement
Rationale and supplemental guidance
1120
p) that system usage may be monitored, recorded and subject to audit;
1121
1122
q) that unauthorized use of the system is prohibited and subject to crimi nal and/or civil
penalties; and
1123
r) that use of the system indicates consent to monitoring and recording.
1124
5.14.3
Requirement enhancements
1125
None
1126
5.14.4
1127
The requirements for the four SL levels that relate to CR 1.12 are:
Security levels
1128
SL-C(IAC,component) 1: CR 1.12
1129
SL-C(IAC,component) 2: CR 1.12
1130
SL-C(IAC,component) 3: CR 1.12
1131
SL-C(IAC,component) 4: CR 1.12
1132
5.15
CR 1.13
1133
1134
The access via untrusted networks requirements are device specific and can be located as
requirements for each specific device type in Clauses 12 through 15.
1135
5.16
1136
5.16.1
1137
For components that utilize symmetric keys, the component shall provide the capability to:
1138
a) establish the mutual trust using the symmetric key;
CR 1.14
Access via untrusted networks
Strength of symmetric key-based authentication
Requirement
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
1099
1139
1140
s) store securely the shared secret (the authentication is valid as long as the shared secret
remains secret);
1141
t)
1142
1143
u) ensure that the algorithms and keys used for the symmetric key authenticat ion comply with
CR 4.3 Use of cryptography Section 8.5.
1144
5.16.2
Rationale and supplemental guidance
1145
1146
1147
1148
Means should be defined for installing the keys into the component. This may include installing and
managing the component key using out-of-band methods. This is necessary since a compromise
of any symmetric keys that are stored within the component could lead to a full compromise of the
system using those keys.
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
In practice, there are two basic ways to perform the secure authentication of a device to another :
either using asymmetric cryptography (see 5.11) or by using symmetric cryptography. The choice
between asymmetric and symmetric is dictated by several criteria , like key management, trust
provisioning, legacy support and efficiency. Examples of symmetric key authentication schemes
are Needham-Schröder or Kerberos. When symmetric key authentication is used, the party uses a
secret key they have learned in the past (for example, through trust provisioning). The party proves
their claimed identity by proving knowledge of the secret key ( for example, by answering a
challenge submitted by the other party, the examiner). The examiner has the knowledge of the
same secret (also learned in the past through trust provisioning) and is able to compute the answer
to the challenge performing the same cryptographic operations as the prover. The examiner can
then compare the answer of the prover with its own computation. If they match, the examiner is
convinced that the prover is the one they claim to be and the process can be conducted the other
way around, switching roles, to achieve mutual-authentication. This mechanism is secure only if
the shared secret is only known by the prover and the examiner and if the secret is diversified per
prover. One instance of such a mechanism is the proper use of cipher-based message
authentication code (CMAC) computations or alternatively the Galois counter mode (GCM)/Galois
message authentication code (GMAC) operation modes.
1166
5.16.3
1167
(1) Hardware security for symmetric key-based authentication
1168
1169
The control system shall provide the capability to protect the relevant private keys via hardware
mechanisms.
1170
5.16.4
1171
The requirements for the four SL levels that relate to CR 1.14 are:
Requirement enhancements
Security levels
1172
SL-C(IAC,control system) 1: Not selected
1173
SL-C(IAC,control system) 2: CR 1.14
1174
SL-C(IAC,control system) 3: CR 1.14 (1)
1175
SL-C(IAC,control system) 4: CR 1.14 (1)
1176
6
FR 2
Use control
1177
6.1
1178
1179
Enforce the assigned privileges of an authenticated user (human, software process or device) to
perform the requested action on the component and monitor the use of these privileges.
1180
1181
SL 1 Restrict use of the IACS according to specified privileges to prot ect against casual
or coincidental misuse.
Purpose and SL-C(UC) descriptions
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
restrict access to the shared secret; and
SL 2
Restrict use of the IACS according to specified privileges to protect against
circumvention by entities using simple means with low resources, generic skills and low
motivation.
1185
1186
1187
SL 3
Restrict use of the IACS according to specified privileges to protect against
circumvention by entities using sophisticated means with moderate resources, IACS specific
skills and moderate motivation.
1188
1189
1190
SL 4
Restrict use of the IACS according to specified privileges to protect against
circumvention by entities using sophisticated means with extended resources, IACS specific
skills and high motivation.
1191
6.2
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
Once the user is identified and authenticated, the component has to restrict the allowed actions to
the authorized use of the component. Asset owners and system integrators will have to assign, to
each user (human, software process or device), group, role, etc. (see 4.5) , the privileges defining
the authorized use of the component. The goal of use control is to protect ag ainst unauthorized
actions on the components resources by verifying that the necessary privileges have been granted
before allowing a user to perform the actions. Examples of actions are reading or writing data,
downloading programs and setting configurations. Recommendations and guidelines should
include mechanisms that will operate in mixed modes. For example, some component resources
require strong use control protection, such as restrictive privileges, and others do not. By extension,
use control requirements need to be extended to data at rest. User privileges may vary based on
time-of-day/date, location and means by which access is made.
1203
6.3
1204
6.3.1
1205
1206
Components shall provide an authorization enforcement mechanism for all identified and
authenticated human users based on their assigned responsibilities and least privilege.
1207
6.3.2
1208
1209
There are additional requirements to consider for protection of the authorization information, for
example, 7.3 and 7.6 provide further requirements on integrity protection.
1210
6.3.3
1211
(1) Authorization enforcement for all users (humans, software processes and devices)
1212
1213
1214
1215
1216
1217
1218
1219
1220
Rationale
CR 2.1
Authorization enforcement
Requirement
Rationale and supplemental guidance
Requirement enhancements
Components shall provide an authorization enforcement mechanism for all users based on their
assigned responsibilities and least privilege.
(2) Permission mapping to roles
Components shall, directly or through a compensating security mechanism , provide for an
authorized role to define and modify the mapping of permissions to roles for all human users.
NOTE 1 Roles should not be limited to fixed nested hierarchies in which a higher level role is a super set of a lesser
privileged role. For example, a system administrator should not necessarily encompass operator privileges.
NOTE 2
This RE should be applicable to software processes and devices as well.
(3) Supervisor override
1221
Components shall support a supervisor manual override for a configurable time or sequence of
1222
events.
1223NOTE Implementation of a controlled, audited and manual override of automated mechanisms in the event of emergencies or
1224
other serious events is often needed. This allows a supervisor to enable an operator to quickly react to unusual
1225
conditions without closing the current session and establishing a new session as a higher privilege human user.
1226
1227
1228
(4) Dual approval
Components shall support dual approval when action can result in serious impact on the
industrial process.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
1182
1183
1184
1229NOTE Dual approval should be limited to actions which require a very high level of confidence that they will be performed
1230
reliably and correctly. Requiring dual approval provides emphasis to the seriousness of consequences that would
1231
result from failure of a correct action. An example of a situation in which dual approval is required would be a change
1232
to a set point of a critical industrial process. Dual approval mechanisms should not be employed when an immediate
1233
response is necessary to safeguard HSE consequences, for example, emergency shutdown of an industrial process.
6.3.4
Security levels
1235
The requirements for the four security levels that relate to CR 2.1 are:
1236
SL-C(UC,component) 1: CR 2.1
1237
SL-C(UC,component) 2: CR 2.1 (1) (2)
1238
SL-C(UC,component) 3: CR 2.1 (1) (2) (3)
1239
SL-C(UC,component) 4: CR 2.1 (1) (2) (3) (4)
1240
6.4
CR 2.2
Wireless use control
1241
6.4.1
1242
1243
1244
If a component supports usage through wireless interfaces it shall provide the capability to
authorize, monitor and enforce usage restrictions according to commonly accepted industry
practices.
1245
6.4.2
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
Wireless use control may be implemented in different devices that make up the system. Network
devices may be one of the devices that assist with use control through controls such as network
admission control. For devices and applications that utilize wireless networks those devices should
be able to properly utilize wireless network protection such as network admission control.
Components may also implement different limitations on access based on whether the access is
from wireless devices or wired devices. This does place a need that the component be able to
distinguish whether the interface is through wireless or not. Some network devices provide the
capability to scan for unauthorized wireless network activity in the wireless spectrum . In order to
prevent a negative impact on the performance of the control sy stem functionality, it is a good
practice to deploy dedicated devices to perform checks for unauthorized network activity.
1256
6.4.3
1257
None
1258
6.4.4
1259
The requirements for the four SL levels that relate to CR 2.2 are:
Requirement
Rationale and supplemental guidance
Requirement enhancements
Security levels
1260
SL-C(UC, component) 1: CR 2.2
1261
SL-C(UC, component) 2: CR 2.2
1262
SL-C(UC, component) 3: CR 2.2
1263
SL-C(UC, component) 4: CR 2.2
1264
6.5
CR 2.3
Use control for portable and mobile devices
1265
6.5.1
1266
1267
Portable and mobile devices intended for use in a control system shall be able to operate in an
environment where use restrictions are enforced by the IACS.
1268
6.5.2
1269
Use control for portable and mobile devices is provided by the IACS.
1270
6.5.3
1271
None
Requirement
Rationale and supplemental guidance
Requirement enhancements
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
1234
6.5.4
Security levels
1273
The requirements for the four SL levels that relate to CR 2.3 are:
1274
SL-C(UC, component) 1: CR 2.3
1275
SL-C(UC, component) 2: CR 2.3
1276
SL-C(UC, component) 3: CR 2.3
1277
SL-C(UC, component) 4: CR 2.3
1278
6.6
CR 2.4
1279
1280
The use control requirements for mobile code are device specific and can be located as
requirements for each specific device type in Clauses 12 through 15.
1281
6.7
1282
6.7.1
1283
1284
If a component provides a human user interface, whether accessed locally or via a network, the
component shall provide the capability
1285
1286
a) to prevent further access by initiating a session lock after a configurable time period of
inactivity or by manual initiation;
1287
1288
1289
b) for the session lock to remain in effect until the human user who owns the session , or
another authorized human user, re-establishes access using appropriate identificati on and
authentication procedures; and
1290
1291
c) to comply with session locks requested by the underlying infrastructure (operating system,
control system).
CR 2.5
Mobile code
Session lock
Requirement
1292
6.7.2
Rationale and supplemental guidance
1293
1294
1295
1296
Session locks are used to prevent access to specified workstations or node s. Components should
activate session lock mechanisms automatically after a configurable time period. In most cases ,
the session locks are configured at the system level and thus applications and devices should be
providing the capability to use those configured session locks.
1297
6.7.3
1298
None
1299
6.7.4
1300
The requirements for the four SL levels that relate to CR 2.5 are:
Requirement enhancements
Security levels
1301
SL-C(UC, component) 1: CR 2.5
1302
SL-C(UC, component) 2: CR 2.5
1303
SL-C(UC, component) 3: CR 2.5
1304
SL-C(UC, component) 4: CR 2.5
1305
6.8
CR 2.6
Remote session termination
1306
6.8.1
1307
1308
1309
1310
If a component supports remote sessions, the component shall provide the capability to terminate
a remote session either automatically after a configurable time period of inactivity , manually by a
local authority, or manually by the user (human, software process or device) who initiated the
session.
Requirement
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
1272
6.8.2
Rationale and supplemental guidance
1312
1313
1314
1315
1316
1317
A remote session is initiated whenever a component is accessed across the boundary of a zone
defined by the asset owner based on their risk assessment. This requirement may be limited to
sessions that are used for component monitoring and maintenance activities (not critical
operations) based on the risk assessment of the control system and security policies and
procedures. Some components may not allow sessions to be terminated as the session might be
part of an essential function of the component .
1318
6.8.3
1319
None
1320
6.8.4
1321
The requirements for the four SL levels that relate to CR 2.6 are:
Requirement enhancements
Security levels
1322
SL-C(UC, component) 1: Not Selected
1323
SL-C(UC, component) 2: CR 2.6
1324
SL-C(UC, component) 3: CR 2.6
1325
SL-C(UC, component) 4: CR 2.6
1326
6.9
CR 2.7
Concurrent session control
1327
6.9.1
1328
1329
Components shall provide the capability to limit the number of concurrent sessions per interf ace
for any given user (human, software process or device) .
1330
6.9.2
1331
1332
1333
1334
A resource starvation DoS might occur if a limit is not imposed. There is a trade -off between
potentially locking out a specific user versus locking out all users and services due to a lack of
resources. Product supplier and/or system integrator guidance is likely required to provide sufficient
information as to how the number of concurrent sessions value should be assigned.
1335
6.9.3
1336
None
1337
6.9.4
1338
The requirements for the four SL levels that relate to CR 2.7 are:
Requirement
Rationale and supplemental guidance
Requirement enhancements
Security levels
1339
SL-C(UC, component) 1: Not Selected
1340
SL-C(UC, component) 2: Not Selected
1341
SL-C(UC, component) 3: CR 2.7
1342
SL-C(UC, component) 4: CR 2.7
1343
6.10
CR 2.8
Auditable events
1344
6.10.1
1345
1346
Components shall provide the capability to generate audit records relevant to securit y for the
following categories:
1347
a) access control;
1348
b) request errors;
1349
c) control system events;
1350
d) backup and restore event;
Requirement
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
1311
1351
e) configuration changes; and
1352
f)
1353
Individual audit records shall include:
1354
a) timestamp;
1355
b) source (originating device, software process or human user account);
1356
c) category;
1357
d) type;
1358
e) event ID; and
1359
f)
1360
6.10.2
1361
1362
1363
Devices may contain either embedded firmware or run an OS. While the intent of the requirement
is to cover categories of events, at least all events from the above categories which can be
generated by the firmware or OS are to be included.
1364
NOTE
1365
6.10.3
1366
None
1367
6.10.4
1368
The requirements for the four security levels that relate to CR 2.8 are:
event result.
Rationale and supplemental guidance
Security event categories are only applicable if functionality itself is pro vided by the component.
Requirement enhancements
Security levels
1369
SL-C(UC,component) 1: CR 2.8
1370
SL-C(UC,component) 2: CR 2.8
1371
SL-C(UC,component) 3: CR 2.8
1372
SL-C(UC,component) 4: CR 2.8
1373
6.11
CR 2.9
Audit storage capacity
1374
6.11.1
1375
Components shall
Requirement
1376
1377
a) provide the capability to allocate audit record storage capacity according to commonly
recognized recommendations for log management ; and
1378
1379
b) provide mechanisms to prevent a failure of the component when it reaches or exceeds the
audit storage capacity.
1380
6.11.2
Rationale and supplemental guidance
1381
1382
1383
1384
1385
Components should provide sufficient audit storage capacity, taking into account retention policy,
the auditing to be performed and the online audit proces sing requirements. Components may rely
on the system into which they are integrated to provide the majority of audit storage capacity.
However, the components should provide enough local storage to buffer audit data until it can be
sent to the system.
1386
1387
1388
Guidelines to be considered may include NIST Special Publication (SP) 800-92 [26]. The audit
storage capacity should be sufficient to retain logs for a period of tim e required by applicable
policies and regulations or business requirements.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
audit log events.
1389
6.11.3
1390
(1) Warn when audit record storage capacity threshold reached
Components shall provide the capability to issue a warning when the allocated audit record
storage reaches a configurable threshold.
1393
6.11.4
Security levels
1394
The requirements for the four SL levels that relate to CR 2.9 are:
1395
SL-C(UC,component) 1: CR 2.9
1396
SL-C(UC,component) 2: CR 2.9
1397
SL-C(UC,component) 3: CR 2.9 (1)
1398
SL-C(UC,component) 4: CR 2.9 (1)
1399
6.12
CR 2.10
Response to audit processing failures
1400
6.12.1
1401
Components shall
Requirement
1402
1403
a) provide the capability to prevent the loss of essential services and functions in the event of
an audit processing failure; and
1404
1405
b) provide the capability to support appropriate actions in response to an audit processing
failure according to commonly accepted industry practices and recommendations.
1406
6.12.2
Rationale and supplemental guidance
1407
1408
1409
1410
1411
1412
1413
1414
1415
Audit generation typically occurs at the source of the event. Audit processing involves transmission,
possible augmentation (such as, the addition of a timestamp) and persistent storage of the audit
records. Audit processing failures include, for example, software or hardware errors, failures in the
audit capturing mechanisms and audit storage capacity bei ng reached or exceeded. Guidelines to
be considered when designing appropriate response actions may include the NIST SP 800-92,
Guide to Computer Security Log Management [26]. It should be noted that either overwriting the
oldest audit records or halting audit log generation are possible responses to audit storage capacity
being exceeded but imply the loss of potentially essential forensic information. Also alerting
personnel could be an appropriate supporting action in response to an audit processing failure.
1416
6.12.3
1417
None
1418
6.12.4
1419
The requirements for the four SL levels that relate to CR 2.10 are:
Requirement enhancements
Security levels
1420
SL-C(UC,component) 1: CR 2.10
1421
SL-C(UC,component) 2: CR 2.10
1422
SL-C(UC,component) 3: CR 2.10
1423
SL-C(UC,component) 4: CR 2.10
1424
6.13
CR 2.11
Timestamps
1425
6.13.1
1426
1427
Components shall provide the capability to create timestamps (including date and time) for use in
audit records.
Requirement
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
1391
1392
Requirement enhancements
1428
6.13.2
1429
1430
A good reference for the format of timestamps is ISO/IEC 8601:2004, Data elements and
interchange formats Information interchange Representation of dates and times [15].
1431
6.13.3
1432
(1) Time synchronization
1435
1436
1437
Requirement enhancements
Components shall provide the capability to create timestamps that are synchronized with a
system wide time source.
(2) Protection of time source integrity
The time synchronization mechanism shall provide the capability to detect unautho rized
alteration and cause an audit event upon alteration.
1438
6.13.4
Security levels
1439
The requirements for the four security levels that relate to CR 2.11 are:
1440
SL-C(UC,component) 1: CR 2.11
1441
SL-C(UC,component) 2: CR 2.11
1442
SL-C(UC,component) 3: CR 2.11 (1)
1443
SL-C(UC,component) 4: CR 2.11 (1) (2)
1444
6.14
1445
6.14.1
1446
1447
If a component provides a human user interface, the component shall provide the capability to
determine whether a given human user took a particular action.
1448
1449
Control elements that are not able to support such capability shall be l isted in component
documents.
1450
6.14.2
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
Examples of particular actions taken by a user include performing operator actions, changing
control system configurations, creating information , sending a message, approving information
(such as, indicating concurrence) and receiving a message. Non -repudiation protects against later
false claims by a user of not having taken a specific action, by an author of not having authored a
particular document, by a sender of not having transmitted a message, by a receiver of not having
received a message or by a signatory of not having signed a document. Non -repudiation services
can be used to determine if information originated from a user, if a user took specific actions (for
example, sending an email and approving a work order) or received specific information. Non repudiation services are obtained by employing various techniques or mechanisms (for example,
digital signatures, digital message receipts an d timestamps).
1461
6.14.3
1462
(1) Non-repudiation for all users
1463
1464
CR 2.12
Non-repudiation
Requirement
Rationale and supplemental guidance
Requirement enhancements
Components shall provide the capability to determine whether a given user (human, software
process or device) took a particular action.
1465
6.14.4
Security levels
1466
The requirements for the four SL levels that relate to CR 2.12 are:
1467
SL-C(UC,component) 1: Not selected
1468
SL-C(UC,component) 2: Not selected
1469
SL-C(UC,component) 3: CR 2.12
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
1433
1434
Rationale and supplemental guidance
SL-C(UC,component) 4: CR 2.12 (1)
1471
6.15
CR 2.13
1472
1473
The use of physical diagnostic and test interfaces requirements are device specific and can be
located as requirements for each specific device type in Clauses 12 through 15.
1474
7
1475
7.1
1476
Ensure the integrity of the component to prevent unauthorized manipulation.
FR 3
Use of physical diagnostic and test interfaces
System integrity
Purpose and SL-C(SI) descriptions
1477
SL 1
Protect the integrity of the IACS against casual or coincidental manipulation.
1478
1479
SL 2
Protect the integrity of the IACS against manipulation by someone using simple
means with low resources, generic skills and low motivation.
1480
1481
SL 3
Protect the integrity of the IACS against manipulation by someone using
sophisticated means with moderate resources, IACS specific skills and moderate motivation.
1482
1483
SL 4
Protect the integrity of the IACS against manipulation by someone using
sophisticated means with extended resources, IACS specif ic skills and high motivation.
1484
7.2
Rationale
1485
1486
1487
1488
1489
1490
1491
1492
1493
Components often go through multiple testing cycles (unit testing, system testing, etc.) to establish
that the components will perform as intended before they even begin production. Once operational,
asset owners are responsible for maintaining the integrity of the component. Using their risk
assessment methodology, asset owners may assign different levels of integrity protection to
different systems, communication channels and information in their IACS. The integrit y of physical
assets should be maintained in both operational and non -operational states, such as during
production, when in storage or during a maintenance shutdown. The integrity of logical assets
should be maintained while in transit and at rest, such a s being transmitted over a network or when
residing in a data repository.
1494
7.3
1495
7.3.1
1496
Components shall provide the capability to protect integrity of transmitted information.
1497
7.3.2
1498
1499
1500
1501
1502
1503
1504
Many common network attacks are based on the manipulation of data in transmission, for example
manipulation of network packets. Switched or routed networks provide a greater opportunity for
attackers to manipulate packets as undetected access to these networks is gene rally easier and
the switching and routing mechanisms themselves can also be manipulated in order to get more
access to transmitted information. Manipulation in the context of a control system could include the
change of measurement values communicated from a sensor to a receiver or the alteration of
command parameters sent from a control application to an actuator.
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
Depending on the context (for example transmission within a local network segment versus
transmission via untrusted networks) and the network type used in the transmission (for example
transmission control protocol (TCP) / internet protocol (IP) versus loc al serial links), feasible and
appropriate mechanisms will vary. On a small network with direct links (point -to-point), physical
CR 3.1
Communication integrity
Requirement
Rationale and supplemental guidance
protected as well (see 7.6, CR 3.4 Software and information integrity), while on a network
distributed in areas with regular physical presence of staff or on a wide area network physical
access is likely not enforceable. If a commercial service is used to provide communication
services as a commodity item rather than a fully dedicated service (for example a lea sed line
versus a T1 link), it may be more difficult to obtain the necessary assurances regarding the
implementation of needed security controls for communication integrity (for example because of
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
1470
legal restrictions). When it is infeasible or impractical t o meet the necessary security
requirements it may be appropriate to implement either appropriate compensating
countermeasures or explicitly accept the additional risk.
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
Industrial equipment is often subject to environmental conditions that can lead to inte grity issues
and/or false positive incidents. Many times the environment contains particulates, liquids, vibration,
gases, radiation, and electromagnetic interference (EMI) that can cause conditions that affect the
integrity of the communication wiring and signals. The network infrastructure should be designed
to minimize these physical/environmental effects on communication integrity. For example, when
particulate, liquids, and/or gases are an issue, it may be necessary to use a sealed registered jack
45 (RJ-45) or M12 connector instead of a commercial-grade RJ-45 connector on the wire. The cable
itself may need to use a different jacket instead to handle the particulate, liquid, and/or gas as well.
In cases where vibration is an issue, M12 connectors may b e necessary to prevent the spring pins
on an RJ-45 connector from disconnecting during use. In cases where radiation and/or EMI are an
issue, it may be necessary to use shielded twisted pair or fiber cables to prevent any effect on the
communication signals. It may also be necessary to perform a wireless spectrum analysis in these
areas if wireless networking is planned to verify that it is a viable solution.
1532
7.3.3
1533
(1) Communication authentication
Requirement enhancements
1534
1535
Components shall provide the capability to authenticate information during communication.
NOTE: Communication authentication can be achieved with or without communication confidentiality (encryption).
1536
7.3.4
1537
The requirements for the four SL levels that relate to CR 3.1 are:
Security levels
1538
SL-C(SI, component) 1: CR 3.1
1539
SL-C(SI, component) 2: CR 3.1
1540
SL-C(SI, component) 3: CR 3.1 (1)
1541
SL-C(SI, component) 4: CR 3.1 (1)
1542
7.4
1543
1544
The protection from malicious code requirements are device specific and can be located as
requirements for each specific device type in Clauses 12 through 15.
1545
7.5
1546
7.5.1
1547
1548
Components shall provide the capability to verify the intended operation of security functions
according to ISA 62443 3 3 [11] SR3.3.
1549
7.5.2
1550
1551
1552
1553
1554
The product supplier and/or system integrator should provide guidance on how to test the designed
security controls. Asset owners need to be aware of the possible ramifications of running these
verification tests during normal operations. Details of the execution of these verifications need to
be specified with careful consideration of th e requirements for continuous operations (for example,
scheduling or prior notification).
1555
Examples of security verification functions include:
1556
1557
1558
CR 3.2
CR 3.3
Protection from malicious code
Security functionality verification
Requirement
Rationale and supplemental guidance
Verification of antivirus countermeasures by European Institute for Computer Antivirus
Research (EICAR) testing of the control system file system. Antivirus software should detect
this and appropriate incident handling procedures should be triggered.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
1516
1517
1518
Verification of the identification, authentication and use control countermeasures by
attempting access with an unauthorized account (for some functionality this could be
automated).
1562
1563
1564
1565
Verification of intrusion detection systems (IDSs) as a security control by including a rule in
the IDS that triggers on irregular, but known non-malicious traffic. The test could then be
performed by introducing traffic that triggers this rule and the appropriate IDS monitoring
and incident handling procedures.
1566
1567
Confirmation that audit logging is occurring as required b y security policies and procedures
and has not been disabled by an internal or external entity.
1568
7.5.3
Requirement enhancements
1569
(1) Security functionality verification during normal operation
1570
Components shall provide the capability to support verification of the intended operation of
1571
security functions during normal operations.
1572NOTE This RE needs to be carefully implemented to avoid detrimental effects. It may not be suitable for safety systems.
1573
7.5.4
Security levels
1574
The requirements for the four SL levels that relate to CR 3.3 are:
1575
SL-C(SI, component) 1: CR 3.3
1576
SL-C(SI, component) 2: CR 3.3
1577
SL-C(SI, component) 3: CR 3.3
1578
SL-C(SI, component) 4: CR 3.3 (1)
1579
7.6
1580
7.6.1
1581
1582
1583
Components shall provide the capability to perform or support integrity checks on software,
configuration and other information as well as the recording and reporting of the results of these
checks or be integrated into a system that can perform or support integrity checks.
1584
7.6.2
1585
1586
1587
1588
1589
1590
1591
1592
Unauthorized changes are changes for which the entity attempting the change does not have the
required privileges. This CR complements related CRs from FRs 1 and 2. FRs 1 and 2 involve
enforcing the roles, privileges and use patterns as designed. Integrit y verification methods are
employed to detect, record, report and protect against software and information tampering that may
occur if other protection mechanisms (such as authorization enforcement) have been circumvented.
The control system should employ formal or recommended integrity mechanisms (such as
cryptographic hashes). For example, such mechanisms could be used to monitor field devices for
their latest configuration information to detect security breaches (including unauthorized changes).
1593
7.6.3
1594
(1) Authenticity of software and information
1595
1596
1597
1598
1599
1600
1601
CR 3.4
Software and information integrity
Requirement
Rationale and supplemental guidance
Requirement enhancements
Components shall provide the capability to perform or support authenticity checks on software,
configuration and other information as well as the recording and reporting of the results of these
checks or be integrated into a system that can perform or support authenticity checks.
(2) Automated notification of integrity violations
If the component is performing the integrity check, it shall be capable of automatically providing
notification to a configurable entity upon discovery of an attempt to make an unauthorized
change.
1602
7.6.4
Security levels
1603
The requirements for the four SL levels that relate to CR 3.4 are:
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
1559
1560
1561
SL-C(SI, component) 1: Not Selected
1605
SL-C(SI, component) 2: CR 3.4 (1)
1606
SL-C(SI, component) 3: CR 3.4 (1) (2)
1607
SL-C(SI, component) 4: CR 3.4 (1) (2)
1608
7.7
CR 3.5
Input validation
1609
7.7.1
1610
1611
Components shall validate the syntax and content of any input that is used as an industrial process
control input or input via external interfaces that directly impacts the action of the component.
1612
7.7.2
1613
1614
1615
1616
1617
Rules for checking the valid syntax of input data such as set points should be in place to verify that
this information has not been tampered with and is compliant with the specification. Inputs passed
to interpreters should be pre-screened to prevent the content from being unintentionally interpreted
as commands. Note that this is a security CR, thus it does not address human error, for example
supplying a legitimate integer number which is outside the expected range.
1618
1619
1620
1621
1622
1623
Generally accepted industry practices for input data validation include out -of-range values for a
defined field type, invalid characters in data fields, missing or incomplete data and buffer overflow.
Additional examples where invalid inputs lead to system security issues include SQL injection
attacks, cross-site scripting or malformed packets (as commonly generated by protoco l fuzzers).
Guidelines to be considered should include well-known guidelines such as the Open Web
Application Security Project (OWASP) Code Review Guide [28].
1624
7.7.3
1625
None
1626
7.7.4
1627
The requirements for the four SL levels that relate to CR 3.5 are:
Requirement
Rationale and supplemental guidance
Requirement enhancements
Security levels
1628
SL-C(SI, component) 1: CR 3.5
1629
SL-C(SI, component) 2: CR 3.5
1630
SL-C(SI, component) 3: CR 3.5
1631
SL-C(SI, component) 4: CR 3.5
1632
7.8
CR 3.6
Deterministic output
1633
7.8.1
1634
1635
Components that directly control a process shall provide the capability to set outputs to a
predetermined state if normal operation cannot be maintained as a result of an attack.
1636
7.8.2
1637
1638
1639
1640
1641
1642
The deterministic behavior of control system outputs as a result of threat actions against the control
system devices and software is an important characteristic to ensure the integrity of normal
operations. Ideally, the device continues to operate normally while under attack, but if the control
system cannot maintain normal operation, then the control system outputs need to fail to a
predetermined state. The appropriate predetermined state of contro l system outputs is device
dependent and could be one of the following user configurable options:
Requirement
Rationale and supplemental guidance
1643
Unpowered
1644
Hold
the outputs fail to the unpowered state ;
the outputs fail to the last-known good value; or
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
1604
1645
1646
Fixed
the outputs fail to a fixed value that is determined by the asset owner or an
application; or
1647
Dynamic
the outputs fail to one of the above options based on the current state.
7.8.3
Requirement enhancements
1649
None
1650
7.8.4
1651
The requirements for the four SL levels that relate to CR 3.6 are:
Security levels
1652
SL-C(SI, component) 1: CR 3.6
1653
SL-C(SI, component) 2: CR 3.6
1654
SL-C(SI, component) 3: CR 3.6
1655
SL-C(SI, component) 4: CR 3.6
1656
7.9
CR 3.7
Error handling
1657
7.9.1
1658
1659
1660
1661
Components shall identify and handle error conditions in a manner such that effective remediation
can occur. This shall be done in a manner that does not provide information that could be exploited
by adversaries to attack the IACS unless revealing this information is necessary for the timely
troubleshooting of problems.
1662
7.9.2
1663
1664
1665
1666
1667
1668
The product supplier and/or system integrator should carefully consider the structure and content
of error messages. Error messages generated by the component should provide timely and useful
information without revealing potentially harmful information that could be used by adversaries to
exploit the IACS. Disclosure of this information should be justified by the necessity for timely
resolution of error conditions. Guidelines to be considered could include well-known guidelines
such as the OWASP Code Review Guide.
1669
1670
1671
NOTE: A good example of an error message that could help adversaries attack an IACS would be to provide details of
why authentication with the system failed. For example stating invalid user or invalid password in the feedback
would help an adversary attack the IACS and thus should not be provided.
1672
7.9.3
1673
None
1674
7.9.4
1675
The requirements for the four SL levels that relate to CR 3. 7 are:
Requirement
Rationale and supplemental guidance
Requirement enhancements
Security levels
1676
SL-C(SI, component) 1: CR 3.7
1677
SL-C(SI, component) 2: CR 3.7
1678
SL-C(SI, component) 3: CR 3.7
1679
SL-C(SI, component) 4: CR 3.7
1680
7.10
CR 3.8
Session integrity
1681
7.10.1
1682
Components shall provide mechanisms to protect the integrity of communications sessions.
1683
7.10.2
1684
1685
1686
This control focuses on communications protection at the session, versus packet, level. The intent
of this control is to establish grounds for confidence at each end of a communications session in
the ongoing identity of the other party and in the validity of the information being transmitted. For
Requirement
Rationale and supplemental guidance
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
1648
1687
1688
1689
1690
example, this control addresses man-in-the-middle attacks including session hijacking, insertion of
false information into a session or replay attacks. Use of session integrity mechanisms can have a
significant overhead and therefore their use should be co nsidered in light of requirements for realtime communications.
1691
7.10.3
1692
(1) Invalidation of session IDs after session termination
1695
1696
1697
1698
Components shall provide the capability to invalidate session identifiers upon user logout or
other session termination (including browser sessions).
(2) Unique session ID generation
Components shall provide the capability to generate a unique session identifier for each session
and recognize only session identifiers that are system -generated.
(3) Randomness of session IDs
1699
Components shall provide the capability to generate unique session identifiers with commonly
1700
accepted sources of randomness.
1701NOTE Session hijacking and other man-in-the-middle attacks or injections of false information often take advantage of easy 1702
to-guess session IDs (keys or other shared secrets) or use of session IDs that were not properly invalidated after
1703
session termination. Therefore the validity of a session authenticator should be tightly connected to the lifetime of a
1704
session. Employing randomness in the generation of unique session IDs helps to protect against brute -force attacks
1705
to determine future session IDs.
1706
7.10.4
Security levels
1707
The requirements for the four SL levels that relate to CR 3.8 are:
1708
SL-C(SI, component) 1: Not selected
1709
SL-C(SI, component) 2: CR 3.8
1710
SL-C(SI, component) 3: CR 3.8 (1) (2)
1711
SL-C(SI, component) 4: CR 3.8 (1) (2) (3)
1712
7.11
1713
7.11.1
1714
1715
Components shall protect audit information and audit tools (if present) from unauthorized access,
modification and deletion.
1716
7.11.2
1717
1718
1719
1720
1721
Audit information includes all information (for example, audit records, audit settings and audit
reports) needed to successfully audit control system activity. The audit information is important for
error correction, security breach recovery, investigations and related efforts. Mechanisms for
enhanced protection against modification and deletion include the s torage of audit information to
hardware-enforced write-once media.
1722
7.11.3
1723
(1) Audit records on write-once media
1724
1725
CR 3.9
Protection of audit information
Requirement
Rationale and supplemental guidance
Requirement enhancements
Host devices shall provide the capability to store audit records on hardware -enforced writeonce media.
1726
7.11.4
Security levels
1727
The requirements for the four SL levels that relate to CR 3. 9 are:
1728
SL-C(SI, component) 1: Not selected
1729
SL-C(SI, component) 2: CR 3.9
1730
SL-C(SI, component) 3: CR 3.9
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
1693
1694
Requirement enhancements
1731
SL-C(SI, component) 4: CR 3.9 (1)
1732
7.12
CR 3.10
Support for updates
1734
1735
The support for updates requirements are device specific and can be located as requirements for
each specific device type in Clauses 12 through 15.
1736
7.13
1737
1738
The physical tamper resistance and detection requirements are device specific and can be located
as requirements for each specific device type in Clauses 12 through 15.
1739
7.14
1740
1741
The provisioning product supplier roots of trust requirements are device specific and can be located
as requirements for each specific device type in Clauses 12 through 15.
1742
7.15
1743
1744
The provisioning asset owner roots of trust requirements are device specific and can be located as
requirements for each specific device type in Clauses 12 through 15.
1745
7.16
1746
1747
The integrity of the boot process requirements are device specific and can be located as
requirements for each specific device type in Clauses 12 through 15.
1748
8
1749
8.1
1750
1751
Ensure the confidentiality of information on communication channels and in data repositories to
prevent unauthorized disclosure.
1752
1753
SL 1
Prevent the unauthorized disclosure of information via eavesdropping or casual
exposure.
1754
1755
SL 2 Prevent the unauthorized disclosure of information to an entity actively searching for
it using simple means with low resources, generic skills and low motivation.
1756
1757
1758
SL 3 Prevent the unauthorized disclosure of information to an entity actively searching for
it using sophisticated means with moderate resources, IACS specific skills and moderate
motivation.
1759
1760
1761
SL 4 Prevent the unauthorized disclosure of information to an entity actively searching for
it using sophisticated means with extended resources, IACS specific skills and high
motivation.
CR 3.11
Physical tamper resistance and detection
CR 3.12
Provisioning product supplier roots of trust
CR 3.13
Provisioning asset owner roots of trust
CR 3.14
FR 4
Integrity of the boot process
Data confidentiality
Purpose and SL-C(DC) descriptions
1762
8.2
1763
1764
1765
Some component-generated information, whether at rest or in transit, is of a confi dential or
sensitive nature. This implies that some communication channels and datastores require protection
against eavesdropping and unauthorized access.
1766
8.3
1767
8.3.1
1768
Components shall
1769
1770
Rationale
CR 4.1
Information confidentiality
Requirement
a) provide the capability to protect the confidentiality of information at rest for which explicit
read authorization is supported; and
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
1733
b) support the protection of the confidentiality of information in transit as defined in
ISA 62443 3 3 [11] SR 4.1.
1773
8.3.2
Rationale and supplemental guidance
1774
1775
1776
1777
1778
1779
The decision whether a given information should be protected or not depends on the context and
cannot be made at product design. However, the fact that an organization limits access to
information by configuring explicit read authorizations in the control system is an indicator that this
information should be protected by the organization. Thus, all information for which the component
supports the capability to assign explicit read authorizations should be considered potentially
sensitive and thus the component should also provide the capability to protect its confidentiality.
1780
1781
Confidentiality of information in transit requir es system level capabilities which the component
needs to be able to support.
1782
For confidentiality protection, 8.5 CR 4.3
1783
8.3.3
1784
None
1785
8.3.4
1786
The requirements for the four SL levels that relate to CR 4.1 are:
Use of cryptography provides further requirements.
Requirement enhancements
Security levels
1787
SL-C(DC, component) 1: CR 4.1
1788
SL-C(DC, component) 2: CR 4.1
1789
SL-C(DC, component) 3: CR 4.1
1790
SL-C(DC, component) 4: CR 4.1
1791
8.4
CR 4.2
Information persistence
1792
8.4.1
1793
1794
1795
Components shall provide the capability to erase all information, for which explicit read
authorization is supported, from components to be released from active service and/or
decommissioned.
1796
8.4.2
1797
1798
1799
1800
1801
Removal of a control system component from active service should not provide the opportunity for
unintentional release of information for which explicit read authorization is supported. An example
of
(in the case of some wireless field devices) stored in
non-volatile storage or other cryptographic information that would facilitate unauthorized or
malicious activity.
1802
1803
1804
1805
1806
Information produced by the actions of a user or role (or the actions of a software process acting
on behalf of a user or role) should not be disclosed to a different user or role in an uncontrolled
fashion. Control of control system information or data persistence prevents information stored on
a shared resource from being unintentionally disclosed after that resource has been released back
to the control system.
1807
8.4.3
1808
(1) Erase of shared memory resources
Requirement
Rationale and supplemental guidance
Requirement enhancements
1809
Components shall provide the capability to prevent unauthorized and unintended information
1810
transfer via volatile shared memory resources.
1811NOTE Volatile memory resources are those that generally do not retain information after being released to memory
1812
management. However, there are attacks against random access memory (RAM) which might extract key material
1813
or other confidential data before it is actually over -written. Therefore, when volatile shared memory is released back
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
1771
1772
1814
1815
(2) Erase verification
1817
Components shall provide the capability to verify that the erasure of information occurred.
1818
8.4.4
Security levels
1819
The requirements for the four SL levels that relate to CR 4.2 are:
1820
SL-C(DC, component) 1: Not Selected
1821
SL-C(DC, component) 2: CR 4.2
1822
SL-C(DC, component) 3: CR 4.2 (1) (2)
1823
SL-C(DC, component) 4: CR 4.2 (1) (2)
1824
8.5
CR 4.3
Use of cryptography
1825
8.5.1
1826
1827
If cryptography is required, the component shall use cryptographic security mechanisms according
to internationally recognized and proven security practices and re commendations.
1828
8.5.2
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
The selection of cryptographic protection should match the value of the information being protected,
the consequences of the confidentiality of the information being breached, the time period during
which the information is confidential and control system operating constraints. This can involve
either information at rest, in transit, or both. Note that backups are an example of information at
rest, and should be considered as part of a data confidentiality assessment process. The control
system product supplier should document the practices and procedures relating to cryptographic
key establishment and management. The control system should utilize established and tested
encryption and hash algorithms, such as the advanced encryption standard (AES) and the secure
hash algorithm (SHA) series, and key sizes based on an assigned standard. Key generation needs
to be performed using an effective random number generator. The security policies and procedures
for key management need to address periodic key changes, key destruction, key distribution and
encryption key backup in accordance with defined standards. Generally accepted practices and
recommendations can be found in documents such as NIST SP 800-57, Recommendation for Key
Management, Part 1: General [25]. Implementation requirements can be found for example in FIPS
140-2, Security Requirements for Cryptographic Modules [24] or ISO/IEC 19790:2012, Information
technology Security techniques Security requirements for cryptographic modules [17].
1845
1846
This CR, along with 5.10, CR 1.8 Public key infrastructure certificates may be applicable when
meeting many other requirements defined within this standard.
1847
8.5.3
1848
None
1849
8.5.4
1850
The requirements for the four security levels that relate to CR 4.3 are:
Requirement
Rationale and supplemental guidance
Requirement enhancements
Security levels
1851
SL-C(DC,component) 1: CR 4.3
1852
SL-C(DC,component) 2: CR 4.3
1853
SL-C(DC,component) 3: CR 4.3
1854
SL-C(DC,component) 4: CR 4.3
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
1816
to the control system for use by a different user, all unique data and connections to unique data need to be purged
from the resource so it is not visible or accessible to the new user.
1855
9
FR 5
Restricted data flow
1856
9.1
1857
Segment the control system via zones and conduits to limit the unnecessary flow of data.
1858
SL 1
Prevent the casual or coincidental circumvention of zone and conduit segmentation.
1859
1860
SL 2 Prevent the intended circumvention of zone and conduit segmentation by entities
using simple means with low resources, generic s kills and low motivation.
1861
1862
1863
SL 3 Prevent the intended circumvention of zone and conduit segmentation by entities
using sophisticated means with moderate resources, IACS specific skills and moderate
motivation.
1864
1865
1866
SL 4 Prevent the intended circumvention of zone and conduit segmentation by entities
using sophisticated means with extended resources, IACS specific skills and high
motivation.
1867
9.2
Rationale
1868
1869
1870
1871
1872
1873
Using their risk assessment methodology defined in ISA 62443 3 2, asset owners need to
determine necessary information flow restrictions and thus, by extension, determine the
configuration of the conduits used to deliver this information. Derived prescriptive
recommendations and guidelines should include mechanisms that range from disconnecting control
system networks from business or public networks to using unidirectional gateways, stateful
firewalls and DMZs to manage the flow of information.
1874
9.3
1875
9.3.1
1876
1877
Components shall support a segmented network as defined in ISA 62443 3 2 [10], as needed, to
support the broader network architecture based on logical segm entation and criticality.
1878
9.3.2
1879
None
1880
9.3.3
1881
None
1882
9.3.4
1883
The requirements for the four SL levels that relate to CR 5.1 are:
CR 5.1
Network segmentation
Requirement
Rationale and supplemental guidance
Requirement enhancements
Security levels
1884
SL-C(RDF, component) 1: CR 5.1
1885
SL-C(RDF, component) 2: CR 5.1
1886
SL-C(RDF, component) 3: CR 5.1
1887
SL-C(RDF, component) 4: CR 5.1
1888
9.4
CR 5.2
1889
1890
The zone boundary protection requirements are network device specific and can be located as
requirements for network devices in Clause 15.
1891
9.5
1892
1893
The general purpose person-to-person communication restriction requirements are network device
specific and can be located as requirements for network devices later in Clause 15.
CR 5.3
Zone boundary protection
General purpose person-to-person communication restrictions
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
Purpose and SL-C(RDF) descriptions
1894
10 FR 6
Timely response to events
1895
10.1
1896
1897
Respond to security violations by notifying the proper authority, reporting needed evidence of the
violation and taking timely corrective action when incidents are discover ed.
1898
1899
SL 1 Monitor the operation of the IACS, and respond to incidents when discovered , by
collecting and providing the forensic evidence when queried.
1900
1901
SL 2 Monitor the operation of the IACS, and respond to incidents when discovered , by
actively collecting and periodically reporting forensic evidence.
1902
1903
SL 3 Monitor the operation of the IACS, and respond to incidents when discovered , by
actively collecting and pushing forensic evidence to the proper authority.
1904
1905
SL 4 Monitor the operation of the IACS, and respond to incidents when discovered, by
actively collecting and pushing forensic evidence to the proper authority in near real -time.
1906
10.2
1907
1908
1909
1910
1911
1912
Using their risk assessment methodology, asset owners should establish security policies and
procedures and proper lines of communication and control needed to respond to security violations.
Derived prescriptive recommendations and guidelines should include mechanisms that collect,
report, preserve and automatically correlate the forensic evidence to ensure tim ely corrective
action. The use of monitoring tools and techniques should not adversely affect the operational
performance of the control system.
1913
10.3
1914
10.3.1
1915
1916
Components shall provide the capability for authorized humans and/ or tools to access audit logs
on a read-only basis.
1917
10.3.2
1918
1919
1920
1921
1922
1923
1924
1925
1926
The applications and devices may generate audit records about events occurring in that application
or device (see 6.10). Access to these audit logs is necessary to support filtering audit logs,
identifying and removing information that is redundant, reviewing and reporting activity during after the-fact investigations of security incidents. In general, audit reduction and report generation should
be performed on a separate information system. Manual access to the audit records (such as ,
screen views or printouts) is sufficient for meeting the base requirement, but is insufficient for
higher SLs. Programmatic access is commonly used to provide the audit log information to analysis
mechanisms such as security information and event management ( SIEM). See relevant SRs in
Clauses 5, 6 and 9 regarding the creation of, protection of and access to audit logs.
1927
10.3.3
1928
(1) Programmatic access to audit logs
1929
1930
Rationale
CR 6.1
Audit log accessibility
Requirement
Rationale and supplemental guidance
Requirement enhancements
Components shall provide programmatic access to audit records by either using an application
programming interface (API) or sending the audit logs to a cen tralized system
1931
10.3.4
Security levels
1932
The requirements for the four SL levels that relate to CR 6.1 are:
1933
SL-C(TRE, component) 1: CR 6.1
1934
SL-C(TRE, component) 2: CR 6.1
1935
SL-C(TRE, component) 3: CR 6.1 (1)
1936
SL-C(TRE, component) 4: CR 6.1 (1)
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
Purpose and SL-C(TRE) descriptions
1937
10.4
CR 6.2
Continuous monitoring
1938
10.4.1
1939
1940
1941
When a component provides a security mechanism, that component shall provide the capability to
be continuously monitored using commonly accepted security industry practices and
recommendations to detect, characterize and report secur ity breached in a timely manner.
1942
10.4.2
1943
1944
1945
1946
1947
Control system monitoring capability can be achieved through a variety of tools and techniques (for
example, IDS, intrusion prevention system (IPS), protection from malicious code mechanisms and
network monitoring mechanisms). As attacks become more sophisticated, these monitoring tools
and techniques will need to become more sophisticated as well, including for example behavior based IDS/IPS.
1948
1949
1950
1951
Monitoring devices should be strategically deployed within the control system (for example, at
selected perimeter locations and near server farms supporting critical applications) to collect
essential information. Monitoring mechanisms may also be deployed at ad hoc locations within the
control system to track specific transactions.
1952
1953
1954
1955
1956
Monitoring should include appropriate reporting mechanisms to allow for a timely response to
events. To keep the reporting focused and the amount of reported information to a level that can
be processed by the recipients, mechanisms such as SIEM are commonly applied to correlate
individual events into aggregate reports that establish a larger context in which the raw events
occurred.
1957
10.4.3
1958
None
1959
10.4.4
1960
The requirements for the four SL levels that relate to CR 6.2 are:
Rationale and supplemental guidance
Requirement enhancements
Security levels
1961
SL-C(TRE, component) 1: Not Selected
1962
SL-C(TRE, component) 2: CR 6.2
1963
SL-C(TRE, component) 3: CR 6.2
1964
SL-C(TRE, component) 4: CR 6.2
1965
11 FR 7
Resource availability
1966
11.1
1967
1968
Ensure the availability of the application or device against the degradation or denial of essential
services.
1969
1970
1971
SL 1 Ensure that the control system operates reliably under normal production conditions
and prevents denial-of-service situations caused by the casual or coincidental actions of an
entity.
1972
1973
1974
SL 2
Ensure that the control system operates reliably under normal and abnormal
production conditions and prevents denial-of-service situations by entities using simple
means with low resources, generic skills and low motivation.
1975
1976
1977
SL 3
Ensure that the control system operates reliably under normal, abnormal, and
extreme production conditions and prevents denial -of-service situations by entities using
sophisticated means with moderate resources, IACS specific skills and moderate motivation.
Purpose and SL-C(RA) descriptions
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
Requirement
SL 4
Ensure that the control system operates reliably under normal, abnormal, and
extreme production conditions and prevents denial -of-service situations by entities using
sophisticated means with extended resources, IACS specific skills and high motivat ion.
1981
11.2
1982
1983
1984
1985
The aim of this series of CRs is to ensure that the component is resilient against various types of
DoS events. This includes the partial or total unavailability of component functionality at various
levels. In particular, security incidents in the component should not affect the essential functions
of SIS or other safety-related functions.
1986
11.3
1987
11.3.1
1988
1989
Components shall provide the capability to maintain essential functions in a degraded mode during
a DoS event.
1990
11.3.2
1991
1992
1993
Components may be subjected to different forms of DoS situations. When these occur the
component should be designed in such a manner that it maintains essential functions necessary
for continued safe operations while in a degraded mode.
1994
11.3.3
1995
(1) Manage communication load from component
1996
1997
Rationale
CR 7.1
Denial of service protection
Requirement
Rationale and supplemental guidance
Requirement enhancements
Components shall provide the capability to manage communication loads (such as using rate
limiting) to mitigate the effects of information and/or message flooding types of DoS events.
1998
11.3.4
Security levels
1999
The requirements for the four SL levels that relate to CR 7.1 are:
2000
SL-C(RA, component) 1: CR 7.1
2001
SL-C(RA, component) 2: CR 7.1 (1)
2002
SL-C(RA, component) 3: CR 7.1 (1)
2003
SL-C(RA, component) 4: CR 7.1 (1)
2004
11.4
2005
11.4.1
2006
2007
Components shall provide the capability to limit the use of resources by security functions to
prevent resource exhaustion.
2008
11.4.2
2009
2010
2011
2012
2013
Resource management (for example, network segmentation or priori ty schemes) prevents a lowerpriority software process from delaying or interfering with the control system servicing any higher priority software process. For example, initiating network scans, patching and/or antivirus checks
on an operating system can cause severe disruption to normal operations. Traffic rate limiting
schemes should be considered as a mitigation technique.
2014
11.4.3
2015
None
2016
11.4.4
2017
The requirements for the four SL levels that relate to CR 7.2 are:
2018
CR 7.2
Resource management
Requirement
Rationale and supplemental guidance
Requirement enhancements
Security levels
SL-C(RA, component) 1: CR 7.2
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
1978
1979
1980
2019
SL-C(RA, component) 2: CR 7.2
2020
SL-C(RA, component) 3: CR 7.2
2021
SL-C(RA, component) 4: CR 7.2
11.5
2023
11.5.1
2024
2025
2026
Components shall provide the capability to participate in system level backup operations in order
to safeguard the component state (user- and system-level information). The backup process shall
not affect the normal component operations.
2027
11.5.2
2028
2029
2030
The availability of up-to-date backups is essential for recovery from a control system failure and/or
mis-configuration. Automating this function ensures that all required files are captured, reducing
operator overhead.
2031
2032
2033
2034
2035
2036
2037
2038
2039
2040
When designing to support a backup capability, consideration should be given to information that
will be stored in backups. Some of this information may contain personally identifiable information
(PII), cryptographic keys and other information that is protected through security controls while part
of the system. Once the information is placed into a backup it most like ly will not have the same
controls in place to protect it. Thus the component backup ability needs to include the mechanisms
to support the necessary protection of the information that is contained in the backup . This may
include encryption of the backup, encryption of the sensitive data as part of the backup procedure
or not including the sensitive information as part of the backup . If the backup is encrypted it is
important not to include the cryptographic keys as part of the backup but to backup the
cryptographic keys as part of a separate more secure backup procedure.
2041
11.5.3
2042
(1) Backup integrity verification
2043
2044
2045
2046
2047
CR 7.3
Control system backup
Requirement
Rationale and supplemental guidance
Requirement enhancements
Components shall provide the capability to validate the integrity of backed up information prior
to the initiation of a restore of that information.
(2) Local backup
Components shall provide the capability to perform a local backup independent of system
functionality.
2048
11.5.4
Security levels
2049
The requirements for the four SL levels that relate to CR 7.3 are:
2050
SL-C(RA, component) 1: CR 7.3
2051
SL-C(RA, component) 2: CR 7.3 (1)
2052
SL-C(RA, component) 3: CR 7.3 (1) (2)
2053
SL-C(RA, component) 4: CR 7.3 (1) (2)
2054
11.6
CR 7.4
Control system recovery and reconstitution
2055
11.6.1
2056
2057
Components shall provide the capability to recover and reconstitute to a known secure state after
a disruption or failure.
2058
11.6.2
2059
2060
2061
2062
Control system recovery and reconstitution to a known secure state means that all system
parameters (either default or configurable) are set to secure values, security-critical patches are
reinstalled, security-related configuration settings are reestablished, system documentation and
operating procedures are available, components are reinstalled and configured with estab lished
Requirement
Rationale and supplemental guidance
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
2022
2063
2064
settings, information from the most recent, known secure backups is loaded and the system is fully
tested and functional.
2065
11.6.3
2066
None
2067
11.6.4
2068
The requirements for the four SL levels that relate to CR 7.4 are:
Security levels
2069
SL-C(RA, component) 1: CR 7.4
2070
SL-C(RA, component) 2: CR 7.4
2071
SL-C(RA, component) 3: CR 7.4
2072
SL-C(RA, component) 4: CR 7.4
2073
11.7
2074
11.7.1
2075
2076
2077
2078
Components shall provide the capability to be configured according to recommended network and
security configurations as described in guidelines provided by the control system supplier. The
component shall provide an interface to the currently deployed network and securit y configuration
settings.
2079
11.7.2
2080
2081
2082
2083
2084
These configuration settings are the adjustable parameters of the control system components . By
default the component should be configured to the recommended settings . In order for a component
to detect and correct any deviations from the approved and/or recommended configuration settings,
the component needs to support monitoring and control of changes to the configuration settings in
accordance with security policies and procedures.
2085
11.7.3
2086
(1) Machine-readable reporting of current security settings
2087
2088
CR 7.6
Network and security configuration settings
Requirement
Rationale and supplemental guidance
Requirement enhancements
Components shall provide the capability to generate a report listing the currently deployed
security settings in a machine-readable format.
2089
11.7.4
Security levels
2090
The requirements for the four SL levels that relate to CR 7.6 are:
2091
SL-C(RA, component) 1: CR 7.6
2092
SL-C(RA, component) 2: CR 7.6
2093
SL-C(RA, component) 3: CR 7.6 (1)
2094
SL-C(RA, component) 4: CR 7.6 (1)
2095
11.8
CR 7.7
Least functionality
2096
11.8.1
2097
2098
Components shall provide the capability to specifically restrict the use of unnecessary functions,
ports, protocols and/or services.
2099
11.8.2
2100
2101
2102
2103
2104
Applications and devices are capable of providing a wide variety of functions and services. Some
of the functions and services provided may not be necessary to support IACS functionality.
Therefore, by default, functions beyond a baseline configuration should be disabled. Additionally,
it is sometimes convenient to provide multiple services from a single co mponent of a control system,
but doing so increases the risk compared to limiting the services provided by any one component.
Requirement
Rationale and supplemental guidance
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
Requirement enhancements
2105
11.8.3
Requirement enhancements
2106
None
2107
11.8.4
2108
The requirements for the four SL levels that relate to CR 7.7 are:
2109
SL-C(RA, component) 1: CR 7.7
2110
SL-C(RA, component) 2: CR 7.7
2111
SL-C(RA, component) 3: CR 7.7
2112
SL-C(RA, component) 4: CR 7.7
2113
11.9
CR 7.8
Control system component inventory
2114
11.9.1
2115
2116
Components shall provide the capability to support a control system component inventory according
to ISA 62443 3 3 [11] SR 7.8.
2117
11.9.2
2118
2119
2120
Applications and devices may bring their own set of components into the overall control system .
When this is the case then those applications and devices need to provide a mechanism to augment
the overall component inventory which is compatible with ISA 62443 2 4 [8] SP.06.02.
2121
11.9.3
2122
None
2123
11.9.4
2124
The requirements for the four SL levels that relate to CR 7.8 are:
Requirement
Rationale and supplemental guidance
Requirement enhancements
Security levels
2125
SL-C(RA, component) 1: Not Selected
2126
SL-C(RA, component) 2: CR 7.8
2127
SL-C(RA, component) 3: CR 7.8
2128
SL-C(RA, component) 4: CR 7.8
2129
12 Software application requirements
2130
12.1
2131
2132
The purpose of this set of requirements is to document requirements that are specific to software
applications.
2133
12.2
2134
12.2.1
2135
2136
2137
2138
In the event that a software application utilizes mobile code technologies , that application shall
provide the capability to enforce a security policy for the usage of mobile code technologies. The
security policy must allow, at a minimum, the following a ctions for each mobile code technology
used on the software application:
Purpose
SAR 2.4
Mobile code
Requirement
2139
a) Control execution of mobile code;
2140
2141
b) Define which users (human, software process, or device) are allowed to transfer mobile
code to/from the application;
2142
c) Perform integrity checks on mobile code prior to the code being executed; and
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
Security levels
d) Perform authenticity checks to verify the origin of the mobile code prior to the code being
executed.
2145
12.2.2
2146
2147
2148
2149
2150
2151
2152
2153
Mobile code technologies include, but are not limited to, Java, JavaScript, ActiveX, portable
document format (PDF), Postscript, Shockwave movies, Flash animations and VBScript. Usage
restrictions apply to both the selection and use of mobile code installe d on servers and mobile code
downloaded and executed on individual workstations. Control procedures should prevent the
development, acquisition or introduction of unacceptable mobile code within the control system in
which the component resides. For example, mobile code exchanges may be disallowed directly
within the control system, but may be allowed in a controlled adjacent environment maintained by
IACS personnel.
2154
12.2.3
2155
(1) Mobile code integrity check
2156
2157
Rationale and supplemental guidance
Requirement enhancements
The application shall provide the capability to verify the integrity of the mobile code before
allowing code execution.
2158
12.2.4
Security levels
2159
The requirements for the four SL levels that relate to SAR 2.4 are:
2160
SL-C(UC, component) 1: SAR 2.4
2161
SL-C(UC, component) 2: SAR 2.4
2162
SL-C(UC, component) 3: SAR 2.4 (1)
2163
SL-C(UC, component) 4: SAR 2.4 (1)
2164
12.3
SAR 3.2
Protection from malicious code
2165
12.3.1
2166
2167
The application product supplier shall qualify and document which protection from malicious code
mechanisms are compatible with the application and note any special configuration requirements.
2168
12.3.2
2169
2170
2171
The control system application itself may not perform malicious code (for example, viruses, worms,
Trojan horses and spyware) protection. However, control system applications need to be
compatible with mechanisms designed to protect it from malicious code.
2172
12.3.3
2173
None
2174
12.3.4
2175
The requirements for the four SL levels that relate to SAR 3.2 are:
Requirement
Rationale and supplemental guidance
Requirement enhancements
Security levels
2176
SL-C(SI, component) 1: SAR 3.2
2177
SL-C(SI, component) 2: SAR 3.2
2178
SL-C(SI, component) 3: SAR 3.2
2179
SL-C(SI, component) 4: SAR 3.2
2180
13 Embedded device requirements
2181
13.1
2182
2183
The purpose of this set of requirements is to document requirements that are specific to embedded
devices.
Purpose
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
2143
2144
2184
13.2
EDR 2.4
Mobile code
2185
13.2.1
2186
2187
2188
2189
In the event that an embedded device utilizes mobile code technologies , the embedded device shall
provide the capability to enforce a security policy for the usage of mobile code technologies. The
security policy must allow, at a minimum, the following actions for each mob ile code technology
used on the embedded device:
2190
a) Control execution of mobile code;
2191
2192
b) Define which users (human, software process, or device) are allowed to upload mobile code
to the device;
2193
c) Perform integrity checks on mobile code prior to the code being exec uted; and
2194
2195
d) Perform authenticity checks to verify the origin of the mobile code prior to the code being
executed.
2196
13.2.2
2197
2198
2199
2200
2201
2202
2203
Mobile code technologies include, but are not limited to, Java, JavaScript, ActiveX, PDF, Postscript,
Shockwave movies, Flash animations and VBScript. Usage restrictions apply to both the selection
and use of mobile code installed on servers and mobile code downloaded and executed on
individual workstations. Control procedures should prevent the development, ac quisition or
introduction of unacceptable mobile code within the control system in which the component resides.
For example, mobile code exchanges may be disallowed directly with in the control system, but may
be allowed in a controlled adjacent environment maintained by IACS personnel.
2204
13.2.3
2205
(1) Mobile code integrity check
2206
2207
Rationale and supplemental guidance
Requirement enhancements
The embedded device shall provide the capability to verify the integrity of the mobile code
before allowing code execution.
2208
13.2.4
Security levels
2209
The requirements for the four SL levels that relate to EDR 2.4 are:
2210
SL-C(UC, component) 1: EDR 2.4
2211
SL-C(UC, component) 2: EDR 2.4
2212
SL-C(UC, component) 3: EDR 2.4 (1)
2213
SL-C(UC, component) 4: EDR 2.4 (1)
2214
13.3
EDR 2.13
Use of physical diagnostic and test interfaces
2215
13.3.1
2216
2217
Embedded devices shall prevent unauthorized use of the physical factory diagnostic and test
interface(s) (e.g. JTAG).
2218
13.3.2
2219
2220
2221
2222
2223
Factory diagnostic and test interface(s) are created at various locations within the component to
2224
2225
2226
There may be cases where the factory diagnostic and test interface(s) use network communi cations
with the device. When this is the case those interfaces are to be subjected to all of the requirements
of this standard.
Requirement
Rationale and supplemental guidance
implementation, and when errors are discovered to subsequently remove them from the component.
However, these same interfaces must be carefully protected from access by unauthorized entities
to protect the essential functionality provided by the component to the IACS.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
Requirement
2227
13.3.3
2228
(1) Active monitoring
Embedded devices shall provide active monitoring of the
diagnostic and test
interface(s) and generate a log entry when attempts to access these interface(s) are detected.
2231
13.3.4
Security levels
2232
The requirements for the four SL levels that relate to EDR 2.13 are:
2233
SL-C(SI, component) 1: Not Selected
2234
SL-C(SI, component) 2: EDR 2.13
2235
SL-C(SI, component) 3: EDR 2.13 (1)
2236
SL-C(SI, component) 3: EDR 2.13 (1)
2237
13.4
EDR 3.2
Protection from malicious code
2238
13.4.1
2239
2240
The embedded device shall provide the capability to protect from installation, execution of malicious
code or unauthorized software.
2241
13.4.2
2242
2243
2244
2245
If an embedded device is able to utilize a compensating control, it need not directly support
protection from malicious code. It is assumed that the IACS will be responsible for providing the
required safeguards. However, for scenarios such as having a local universal serial bus (USB) host
access, the need for protection from malicious code should be determined by a risk assessment.
2246
2247
2248
Detection mechanisms should be able to detect integrity violations of application binaries and data
files. Techniques may include, but are not limited to, binary integrity and attributes monitoring,
hashing and signature techniques.
2249
2250
2251
2252
2253
Prevention techniques may include, but are not limited to, removable media control, sandbox
techniques and specific computing platforms mechanisms such as restricted firmware update
capabilities, No Execute (NX) bit, data execution prevention (DEP), addres s space layout
randomization (ASLR), stack corruption detection and mandatory access controls. See 10.4 for an
associated requirement involving control system monitoring tools and techniques.
2254
13.4.3
2255
None
2256
13.4.4
2257
The requirements for the four SL levels that relate to EDR 3.2 are:
Requirement
Rationale and supplemental guidance
Requirement enhancements
Security levels
2258
SL-C(SI, component) 1: EDR 3.2
2259
SL-C(SI, component) 2: EDR 3.2
2260
SL-C(SI, component) 3: EDR 3.2
2261
SL-C(SI, component) 4: EDR 3.2
2262
13.5
EDR 3.10
Support for updates
2263
13.5.1
2264
The embedded device shall support the ability to be updated and upgraded once installed.
2265
13.5.2
2266
2267
Embedded devices over their installed lifetime may have the need for installation of updates and
upgrades. There will be cases where embedded devices are supporting or executing essential
Requirement
Rationale and supplemental guidance
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
2229
2230
Requirement enhancements
2268
2269
2270
2271
functions as well. When this is the case the embedded device needs to have mechanisms in place
to support patching and updating without impacting the essential function (see 4.2 Support of
essential functions). One example for providing this capability would be to support redundancy
within the embedded device.
2272
13.5.3
2273
(1) Update authenticity and integrity
The embedded device shall validate the authenticity and integrity of any update prior to
installation.
2276
13.5.4
Security levels
2277
The requirements for the four SL levels that relate to E DR 3.10 are:
2278
SL-C(SI, component) 1: EDR 3.10
2279
SL-C(SI, component) 2: EDR 3.10
2280
SL-C(SI, component) 3: EDR 3.10 (1)
2281
SL-C(SI, component) 4: EDR 3.10 (1)
2282
13.6
2283
13.6.1
2284
2285
The embedded device shall provide anti-tamper resistance and detection mechanisms for
unauthorized physical access into the device
2286
13.6.2
2287
2288
2289
The purpose of tamper resistance mechanisms is to prevent an attempt by an attacker to execute
an unauthorized physical action against an IACS device. Secondary to prevention, detection and
response are essential should a tampering event occur.
2290
2291
2292
2293
2294
Tamper resistance mechanisms are most effectively used in combinations to prevent access to any
critical components. Tamper resistance consists of using specialized materials to make tampering
of a device or module difficult. This can include such features as hardened enclosures, locks,
encapsulation, or security screws. Putting in place tight airflow paths will increase the difficulty of
probing the product internals.
2295
2296
2297
2298
The purpose of tamper evidence is to ensure that visible or electronic evidence remains when a
tampering event occurs. Many simple evidence techniques are comprised of seals and tapes to
make it obvious that there has been physical tampering . More sophisticated techniques include
switches.
2299
13.6.3
2300
(1) Notification of a tampering attempt
2301
2302
2303
EDR 3.11
Physical tamper resistance and detection
Requirement
Rationale and supplemental guidance
Requirement enhancements
The embedded device shall be capable of automatically providing notification to a configurable
set of recipients upon discovery of an attempt to make an unauthorized physical access. All
notifications of tampering shall be logged as part of the overall audit logging function .
2304
13.6.4
Security levels
2305
The requirements for the four SL levels that relate to EDR 3.11 are:
2306
SL-C(SI, component) 1: Not Selected
2307
SL-C(SI, component) 2: EDR 3.11
2308
SL-C(SI, component) 3: EDR 3.11 (1)
2309
SL-C(SI, component) 4: EDR 3.11 (1)
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
2274
2275
Requirement enhancements
2310
13.7
EDR 3.12
Provisioning product supplier roots of trust
2311
13.7.1
2312
2313
2314
Embedded devices shall provide the capability to provision and protect the confidentiality, integrity,
and authenticity of product supplier keys and
at the
time of manufacture of the device.
2315
13.7.2
2316
2317
2318
2319
2320
2321
2322
2323
2324
2325
2326
2327
2328
2329
2330
In order for a component to be able to validate the authenticity and integrity of the hardware,
software, and data provided by the product supplier, it must possess a trusted source of data t o
2331
13.7.3
2332
None
2333
13.7.4
2334
The requirements for the four SL levels that relate to EDR 3.12 are:
Rationale and supplemental guidance
software, or it may be the public portion of an asymmetri c cryptographic key pair to be used in the
validation of cryptographic signatures. This trusted data is often used to validate critical software,
firmware, and data prior to booting the firmware or operating system of a component, in order to
validate tha
hardware mechanisms, preventing any modification of the data during normal oper ations of the
component. Modification of product supplier root of trust data is typically limited to the product
provisioning of the data. Instead, information to be validated against the root of trust is submitted
to the validation process through a hardware or software API which performs the validation and
returns the results without exposing the protected data.
Requirement Enhancements
Security levels
2335
SL-C(SI, component) 1: Not Selected
2336
SL-C(SI, component) 2: EDR 3.12
2337
SL-C(SI, component) 3: EDR 3.12
2338
SL-C(SI, component) 3: EDR 3.12
2339
13.8
EDR 3.13
Provisioning asset owner roots of trust
2340
13.8.1
2341
Embedded devices shall
Requirement
2342
2343
a) provide the capability to provision and protect the confidentiality, integrity, and authenticity
of asset owner keys and
; and
2344
2345
b) support the capability to provision without reliance on components that may be outside of
the device s security zone.
2346
13.8.2
Rationale and supplemental guidance
2347
2348
2349
2350
2351
2352
2353
2354
Product suppliers have established mechanisms to ensure that the software and firmware on their
components is authentic, and the integrity of that software and firmware has not been compromised.
to operate. However, many product suppliers also provide mechanisms for asset owners to extend
the functionality of their devices through the use of mobile code, user programs, or other such
means. In order to protect the security of the component, it is important that these extensions to
ed, and that the
asset owner has approved of their origins.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
Requirement
In order perform these validations the component must contain data that provides a way to
differentiate between valid and invalid origins. The list of valid and invalid origins will differ from
asset owner to asset owner, and it is unlikely that a product supplier will have a complete list of
every possible valid origin at time of manufacture. Therefore it is important that the product supplier
provide a way for the asset owner to securely provis
2363
2364
2365
2366
Requirements such as EDR 2.4
Mobile code require the component to complete authenticity
checks on mobile code prior to the execution of mobile code. The roots of trust provided by this
requirement provide the data necessary to validate the origin and integrity of mobile code, allowing
the component to independently determine if the code is allowed to execute.
2367
13.8.3
2368
None
2369
13.8.4
2370
The requirements for the four SL levels that relate to EDR 3.13 are:
actors cannot add additional roots of trust that grant them the ability to operate on the component.
Requirement Enhancements
Security levels
2371
SL-C(SI, component) 1: Not Selected
2372
SL-C(SI, component) 2: EDR 3.13
2373
SL-C(SI, component) 3: EDR 3.13
2374
SL-C(SI, component) 4: EDR 3.13
2375
13.9
2376
13.9.1
2377
2378
Embedded devices shall verify the integrity of the firmware, software, and configuration data
boot process prior to it being used in the boot process.
2379
13.9.2
2380
2381
2382
2383
2384
2385
2386
been compromised, it is necessary to ensure that
firmware has not
been tampered with, and that the software and firmware is valid to execute on the component.
Therefore the component must perform checks to validate the integrity and authenticity of the
boot process, to ensure that the component does
not boot into an insecure or invalid operating state that could damage the component or provide a
path for a malicious actor to gain access to additional components, assets, or data.
2387
13.9.3
2388
(1) Authenticity of the boot process
2389
2390
2391
EDR 3.14
Integrity of the boot process
Requirement
Rationale and supplemental guidance
Requirement enhancements
process prior to it being used in the boot process.
2392
13.9.4
Security levels
2393
The requirements for the four SL levels that relate to EDR 3.14 are:
2394
SL-C(SI, component) 1: EDR 3.14
2395
SL-C(SI, component) 2: EDR 3.14 (1)
2396
SL-C(SI, component) 3: EDR 3.14 (1)
2397
SL-C(SI, component) 4: EDR 3.14 (1)
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
2355
2356
2357
2358
2359
2360
2361
2362
2398
14 Host device requirements
2399
14.1
2400
2401
The purpose of this set of requirements is to document requirements that are specific to host
devices.
2402
14.2
2403
14.2.1
2404
2405
2406
2407
In the event that a host device utilizes mobile code technologies, that host device shall provide the
capability to enforce a security policy for the usage of mobile code technologies. The security
policy must allow, at a minimum, the following actions for each mobile code technology used on
the host device:
HDR 2.4
Mobile code
Requirement
2408
a) Control execution of mobile code;
2409
2410
b) Define which users (human, software process, or device) are allowed to transfer mobile
code to/from the host device;
2411
c) Perform integrity checks on mobile code prior to the code being executed; and
2412
2413
d) Perform authenticity checks to verify the origin of the mobile code prior to the code being
executed.
2414
14.2.2
Rationale and supplemental guidance
2415
2416
2417
2418
2419
2420
2421
Mobile code technologies include, but are not limited to, Java, JavaScript, ActiveX, PDF, Postscript,
Shockwave movies, Flash animations and VBScript. Usage restrictions apply to both the selection
and use of mobile code installed on servers and mobile code downloaded and executed on
individual workstations. Control procedures should prevent the development, acquisition or
introduction of unacceptable mobile code within the control system in which the component resides.
For example, mobile code exchanges may be disallowed directly with the control system, but may
be allowed in a controlled adjacent environment maintained by IACS personnel.
2422
14.2.3
2423
None
2424
14.2.4
2425
The requirements for the four SL levels that relate to HDR 2.4 are:
Requirement enhancements
Security levels
2426
SL-C(UC, component) 1: HDR 2.4
2427
SL-C(UC, component) 2: HDR 2.4
2428
SL-C(UC, component) 3: HDR 2.4
2429
SL-C(UC, component) 4: HDR 2.4
2430
14.3
HDR 2.13
Use of physical diagnostic and test interfaces
2431
14.3.1
2432
2433
Host devices shall prevent unauthorized use of the physical factory diagnostic and test interface(s)
(e.g. JTAG).
2434
14.3.2
2435
2436
2437
Factory diagnostic and test interface(s) are created at various locations within t he component to
Requirement
Rationale and supplemental guidance
implementation, and when errors are discovered to subsequently remove them from the component.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
Purpose
However, these same interfaces must be carefully protected fr om access by unauthorized entities
to protect the essential functionality provided by the component to the IACS.
2440
2441
2442
There may be cases where the factory diagnostic and test interface(s) use network communications
with the device. When this is the case those interfaces are to be subjected to all of the requirements
of this standard.
2443
14.3.3
2444
(1) Active monitoring
2445
2446
Requirement enhancements
generate a log entry when attempts to access these interface(s) are detected.
2447
14.3.4
Security levels
2448
The requirements for the four SL levels that relate to HDR 2.13 are:
2449
SL-C(SI, component) 1: Not Selected
2450
SL-C(SI, component) 2: HDR 2.13
2451
SL-C(SI, component) 3: HDR 2.13 (1)
2452
SL-C(SI, component) 3: HDR 2.13 (1)
2453
14.4
2454
14.4.1
2455
2456
2457
There shall be mechanisms on host devices that are qualified by the IACS product supplier to
provide protection from malicious code. The IACS product supplier shall document any special
configuration requirements related to protection from malicious code.
2458
14.4.2
2459
2460
2461
2462
Host devices need to support the use of malicious code (for example, viruses, worms, Trojan horses
and spyware) protection. The product supplier should qualify and document the configuration of
protection from malicious code mechanisms so that the primary mission of t he control system is
maintained.
2463
14.4.3
2464
(1) Report version of code protection
2465
2466
HDR 3.2
Protection from malicious code
Requirement
Rationale and supplemental guidance
Requirement enhancements
The host device shall automatically report th e version of protection from malicious code in use
(as part of overall logging function).
2467
14.4.4
Security levels
2468
The requirements for the four SL levels that relate to HDR 3.2 are:
2469
SL-C(SI, component) 1: HDR 3.2
2470
SL-C(SI, component) 2: HDR 3.2 (1)
2471
SL-C(SI, component) 3: HDR 3.2 (1)
2472
SL-C(SI, component) 4: HDR 3.2 (1)
2473
14.5
HDR 3.10
Support for updates
2474
14.5.1
2475
Host devices shall support the ability to be updated and upgraded once installed.
2476
14.5.2
2477
2478
Host devices over their installed lifetime may have the need for installation of updates and
upgrades. There will be cases where host devices are supporting or executing essential functions
Requirement
Rationale and supplemental guidance
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
2438
2439
2479
2480
2481
2482
as well. When this is the case the host device needs to have mechanisms in place to support
patching and updating without impacting the essential function (see 4.2 Support of essential
functions). One example for providing this capability would be to support redundancy within the
host device.
2483
14.5.3
2484
(1) Update authenticity and integrity
Host devices shall validate the authenticity and integrity of any update prior to installation.
2486
14.5.4
Security levels
2487
The requirements for the four SL levels that relate to HDR 3.10 are:
2488
SL-C(SI, component) 1: HDR 3.10
2489
SL-C(SI, component) 2: HDR 3.10
2490
SL-C(SI, component) 3: HDR 3.10 (1)
2491
SL-C(SI, component) 4: HDR 3.10 (1)
2492
14.6
2493
14.6.1
2494
2495
Host devices shall provide anti-tamper resistance and detection mechanisms for unauthorized
physical access into the device
2496
14.6.2
2497
2498
2499
The purpose of tamper resistance mechanisms is to prevent an attempt by an attacker to execute
an unauthorized physical action against an IACS device. Secondary to prevention, detection and
response are essential should a tampering event occur.
2500
2501
2502
2503
2504
Tamper resistance mechanisms are most effectively used in combinations to prevent access to any
critical components. Tamper resistance consists of using specialized materials to make tampering
of a device or module difficult. This can include such features as hardened enclosures, locks,
encapsulation, or security screws. Putting in place tight airflow paths will increase the difficulty of
probing the product internals.
2505
2506
2507
2508
The purpose of tamper evidence is to ensure that visible or electronic evidence remains when a
tampering event occurs. Many simple evidence techniques are comprised of seals and tapes to
make it obvious that there has been physical tampering . More sophisticated techniques include
switches.
2509
14.6.3
2510
(1) Notification of a tampering attempt
2511
2512
2513
HDR 3.11
Physical tamper resistance and detection
Requirement
Rationale and supplemental guidance
Requirement enhancements
Host devices shall be capable of automatically providing notification to a configurable set of
recipients upon discovery of an attempt to make an unauthorized physical access. All
notifications of tampering shall be logged as part of the overall audit logging function.
2514
14.6.4
Security levels
2515
The requirements for the four SL levels that relate to HDR 3.11 are:
2516
SL-C(SI, component) 1: Not Selected
2517
SL-C(SI, component) 2: HDR 3.11
2518
SL-C(SI, component) 3: HDR 3.11 (1)
2519
SL-C(SI, component) 4: HDR 3.11 (1)
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
2485
Requirement enhancements
2520
14.7
HDR 3.12
Provisioning product supplier roots of trust
2521
14.7.1
2522
2523
2524
Host devices shall provide the capability to provision and protect the confidentiality, integrity, and
2525
14.7.2
2526
2527
2528
2529
2530
2531
2532
2533
2534
2535
2536
2537
2538
2539
2540
In order for a component to be able to validate the authenticity and integrity of the hardware,
software, and data provided by the product supplier, it must possess a trusted source of data to
perform the validation proc
2541
14.7.3
2542
None
2543
14.7.4
2544
The requirements for the four SL levels that relate to HDR 3.12 are:
Requirement
Rationale and supplemental guidance
software, or it may be the public portion of an asymmetric cryptographic key pair to b e used in the
validation of cryptographic signatures. This trusted data is often used to validate critical software,
firmware, and data prior to booting the firmware or operating system of a component, in order to
validate that the component will boot int
hardware mechanisms, preventing any modification of the data during normal operations of the
component. Modification of product supplier root of trust data is typically limited to the product
provisioning of the data. Instead, information to be validated against th e root of trust is submitted
to the validation process through a hardware or software API which performs the validation and
returns the results without exposing the protected data.
Requirement Enhancements
Security levels
2545
SL-C(SI, component) 1: Not Selected
2546
SL-C(SI, component) 2: HDR 3.12
2547
SL-C(SI, component) 3: HDR 3.12
2548
SL-C(SI, component) 3: HDR 3.12
2549
14.8
HDR 3.13
2550
14.8.1
2551
Host devices shall
Provisioning asset owner roots of trust
Requirement
2552
2553
c) provide the capability to provision and protect the confidentiality, integrity, and authenticity
2554
2555
d) support the capability to provision without reliance on components that m ay be outside of
2556
14.8.2
Rationale and supplemental guidance
2557
2558
2559
2560
2561
2562
2563
2564
Product suppliers have established mechanisms to ensure that the software and firmware on their
components is authentic, and the integrity of that software and firmware has n ot been compromised.
to operate. However, many product suppliers also provide mechanisms for asset owners to extend
the functionality of their devices through the use of mobile code, user programs, or other such
means. In order to protect the security of the component, it is important that these extensions to
asset owner has approved of their origins.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
of manufacture of the device.
In order perform these validations the component must contain data that provides a way to
differentiate between valid and invalid origins. The list of valid and invalid origins will differ from
asset owner to asset owner, and it is unlikely that a product supplier will have a complete list of
every possible valid origin at time of manufacture. Therefore it is important that the product supplier
2573
2574
2575
2576
Requirements such as HDR 2.4
Mobile code require the component to complete authentic ity
checks on mobile code prior to the execution of mobile code. The roots of trust provided by this
requirement provide the data necessary to validate the origin and integrity of mobile code, allowing
the component to independently determine if the code is allowed to execute.
2577
14.8.3
2578
None
2579
14.8.4
2580
The requirements for the four SL levels that relate to HDR 3.13 are:
actors cannot add additional roots of trust that grant them the ability to operate on the component.
Requirement Enhancements
Security levels
2581
SL-C(SI, component) 1: Not Selected
2582
SL-C(SI, component) 2: HDR 3.13
2583
SL-C(SI, component) 3: HDR 3.13
2584
SL-C(SI, component) 4: HDR 3.13
2585
14.9
2586
14.9.1
2587
2588
Host devices shall verify the integrity of the firmware, software, and configuration data needed for
2589
14.9.2
2590
2591
2592
2593
2594
2595
2596
HDR 3.14
Integrity of the boot process
Requirement
Rationale and supplemental guidance
been tampered with, and that the software and firmware is valid to execute on the component.
Therefore the component must perform checks to validate the integrity and authenticity of the
not boot into an insecure or invalid operating state that could damage the component or provide a
path for a malicious actor to gain access to additional components, assets, or data.
2597
14.9.3
2598
(1) Authenticity of the boot process
2599
2600
2601
Requirement enhancements
Host devices shall
it being used in the boot process.
2602
14.9.4
Security levels
2603
The requirements for the four SL levels that relate to HDR 3.14 are:
2604
SL-C(SI, component) 1: HDR 3.14
2605
SL-C(SI, component) 2: HDR 3.14 (1)
2606
SL-C(SI, component) 3: HDR 3.14 (1)
2607
SL-C(SI, component) 4: HDR 3.14 (1)
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
2565
2566
2567
2568
2569
2570
2571
2572
2608
15 Network device requirements
2609
15.1
2610
2611
The purpose of this set of requirements is to document requirements that are specific to network
components.
2612
15.2
2613
15.2.1
2614
2615
2616
A network device supporting wireless access management shall provide the capability to identify
and authenticate all users (humans, software processes or devices) engaged in wireless
communication.
2617
15.2.2
2618
2619
2620
2621
2622
Any wireless technology can, and in most cases should, be considered just another com munication
protocol option. Thus, it should be subject to the same IACS security requirements as any other
communication type utilized by the IACS. However, from a security point of view, there is at least
one significant difference between wired and wireless communications. Physical security
countermeasures are typically less effective when using wireless.
2623
15.2.3
2624
(1) Unique identification and authentication
NDR 1.6
Wireless access management
Requirement
Rationale and supplemental guidance
Requirement enhancements
The network device shall provide the capability to uniquely identify and authenticate all users
(humans, software processes or devices) engaged in wireles s communication.
2627
15.2.4
Security levels
2628
The requirements for the four SL levels that relate to NDR 1.6 are:
2629
SL-C(UC, component) 1: NDR 1.6
2630
SL-C(UC, component) 2: NDR 1.6 (1)
2631
SL-C(UC, component) 3: NDR 1.6 (1)
2632
SL-C(UC, component) 4: NDR 1.6 (1)
2633
15.3
2634
15.3.1
2635
2636
The network device supporting device access into a network shall provide the capability to monitor
and control all methods of access to the network device via untrusted networks.
2637
15.3.2
2638
2639
2640
2641
2642
2643
Examples of access to the network device via untrusted networks typically include remote access
methods (such as, dial(non-control system) network. The network device should restrict acc ess achieved through dial-up
connections (for example, limiting dial-up access based upon the source of the request) or protect
against unauthorized connections or subversion of authorized connections (for example, using
virtual private network technology) .
2644
15.3.3
2645
(1) Explicit access request approval
2646
2647
NDR 1.13
Access via untrusted networks
Requirement
Rationale and supplemental guidance
Requirement enhancements
The network device shall provide the capability to deny access requests via untrusted networks
unless explicitly approved by an assigned role.
2648
15.3.4
Security levels
2649
The requirements for the four SL levels that relate to NDR 1.13 are:
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
2625
2626
Purpose
SL-C(UC, component) 1: NDR 1.13
2651
SL-C(UC, component) 2: NDR 1.13
2652
SL-C(UC, component) 3: NDR 1.13 (1)
2653
SL-C(UC, component) 4: NDR 1.13 (1)
2654
15.4
NDR 2.4
Mobile code
2655
15.4.1
2656
2657
2658
2659
In the event that a network device utilizes mobile code technologies , the network device shall
provide the capability to enforce a security policy for the usage of mobile code technologies. The
security policy must allow, at a minimum, the following actions for each mobile code technology
used on the network device:
Requirement
2660
a) Control execution of mobile code;
2661
2662
b) Define which users (human, software process, or device) are allowed to transfer mobile
code to/from the network device;
2663
c) Perform integrity checks on mobile code prior to the code being executed; and
2664
2665
d) Perform authenticity checks to verify the origin of the mobile code prior to the code being
executed.
2666
15.4.2
Rationale and supplemental guidance
2667
2668
2669
2670
2671
2672
2673
Mobile code technologies include, but are not limited to, Java, JavaScript, ActiveX, PDF, Postscript,
Shockwave movies, Flash animations and VBScript. Usage restrictions apply to both the selection
and use of mobile code installed on servers and mobile code downloaded and executed on
individual workstations. Control procedures should prevent the development, acquisition or
introduction of unacceptable mobile code within the control system in which the component resides.
For example, mobile code exchanges may be disallowed directly with in the control system, but may
be allowed in a controlled adjacent environment maintained by IACS personnel.
2674
15.4.3
2675
None
2676
15.4.4
2677
The requirements for the four SL levels that relate to NDR 2.4 are:
Requirement enhancements
Security levels
2678
SL-C(UC, component) 1: NDR 2.4
2679
SL-C(UC, component) 2: NDR 2.4
2680
SL-C(UC, component) 3: NDR 2.4
2681
SL-C(UC, component) 4: NDR 2.4
2682
15.5
NDR 2.13
Use of physical diagnostic and test interfaces
2683
15.5.1
2684
2685
Network devices shall prevent unauthorized use of the physical factory diagnostic and test
interface(s) (e.g. JTAG).
2686
15.5.2
2687
2688
2689
2690
2691
Factory diagnostic and test interface(s) are created at various locations within the component to
Requirement
Rationale and supplemental guidance
implementation, and when errors are discovered to subsequently remove them from the component.
However, these same interfaces must be carefully protected from access by unauthorized entities
to protect the essential functionality provided by the component to the IACS.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
2650
2692
2693
2694
There may be cases where the factory diagnostic and test interface(s) use network communi cations
with the device. When this is the case those interfaces are to be subjected to all of the requirements
of this standard.
2695
15.5.3
2696
(1) Active monitoring
Network devices shall provide active monitoring of the
diagnostic and test interface(s)
and generate a log entry when attempts to access these interface(s) are detected.
2699
15.5.4
Security levels
2700
The requirements for the four SL levels that relate to NDR 2.13 are:
2701
SL-C(SI, component) 1: Not Selected
2702
SL-C(SI, component) 2: NDR 2.13
2703
SL-C(SI, component) 3: NDR 2.13 (1)
2704
SL-C(SI, component) 3: NDR 2.13 (1)
2705
15.6
NDR 3.2
Protection from malicious code
2706
15.6.1
2707
The network device shall provide for protection from malicious code.
2708
15.6.2
2709
2710
2711
2712
2713
If a network device is able to utilize a compensating control, it need not directly support protection
from malicious code. One such possible compensating control would be the use of network packet
filtering devices to identify and remove malicious code while in transit. It is assumed that the IACS
will be responsible for providing the required safeguards. However, for scenarios such as having a
local USB host access, the need for protection from malicious code should be evaluated.
2714
15.6.3
2715
None
2716
15.6.4
2717
The requirements for the four SL levels that relate to NDR 3.2 are:
Requirement
Rationale and supplemental guidance
Requirement enhancements
Security levels
2718
SL-C(SI, component) 1: NDR 3.2
2719
SL-C(SI, component) 2: NDR 3.2
2720
SL-C(SI, component) 3: NDR 3.2
2721
SL-C(SI, component) 4: NDR 3.2
2722
15.7
NDR 3.10
Support for updates
2723
15.7.1
2724
Network devices shall support the ability to be updated and upgraded once installed.
2725
15.7.2
2726
2727
2728
2729
2730
2731
Network devices over their installed lifetime may have the need for installation of updates and
upgrades. There will be cases where network devices are supporting or executing essential
functions as well. When this is the case the network device needs to have mechanisms in place to
support patching and updating without impacting the essential function (see 4.2 Support of
essential functions). One example for providing this capability would be to support redu ndancy
within the network device.
Requirement
Rationale and supplemental guidance
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
2697
2698
Requirement enhancements
2732
15.7.3
2733
(1) Update authenticity and integrity
Network devices shall validate the authenticity and integrity of any update prior to installation.
2735
15.7.4
Security levels
2736
The requirements for the four SL levels that relate to NDR 3.10 are:
2737
SL-C(SI, component) 1: NDR 3.10
2738
SL-C(SI, component) 2: NDR 3.10
2739
SL-C(SI, component) 3: NDR 3.10 (1)
2740
SL-C(SI, component) 4: NDR 3.10 (1)
2741
15.8
2742
15.8.1
2743
2744
Network devices shall provide anti-tamper resistance and detection mechanisms for unauthorized
physical access into the device
2745
15.8.2
2746
2747
2748
The purpose of tamper resistance mechanisms is to prevent an attempt by an attacker to execute
an unauthorized physical action against an IACS device. Secondary to prevention, detection and
response are essential should a tampering event occur.
2749
2750
2751
2752
2753
Tamper resistance mechanisms are most effectively used in combinations to prevent access to any
critical components. Tamper resistance consists of using specialized materials to make tampering
of a device or module difficult. This can include such features as hardened enclosures, locks,
encapsulation, or security screws. Putting in place tight airflow paths will increase the difficulty of
probing the product internals.
2754
2755
2756
2757
The purpose of tamper evidence is to ensure that visible or electronic evidence remains when a
tampering event occurs. Many simple evidence techniques are comprised of seals and tapes to
make it obvious that there has been physical tampering. More sophisticated techniques include
switches.
2758
15.8.3
2759
(1) Notification of a tampering attempt
2760
2761
2762
NDR 3.11
Physical tamper resistance and detection
Requirement
Rationale and supplemental guidance
Requirement enhancements
Network devices shall be capable of automatically providing notification to a configurable set of
recipients upon discovery of an attempt to make an unauthorized physical access. All
notifications of tampering shall be logged as part of the overall audit logging function.
2763
15.8.4
Security levels
2764
The requirements for the four SL levels that relate to NDR 3.11 are:
2765
SL-C(SI, component) 1: Not Selected
2766
SL-C(SI, component) 2: NDR 3.11
2767
SL-C(SI, component) 3: NDR 3.11 (1)
2768
SL-C(SI, component) 4: NDR 3.11 (1)
2769
15.9
NDR 3.12
Provisioning product supplier roots of trust
2770
15.9.1
2771
2772
2773
Network devices shall provide the capability to prov ision and protect the confidentiality, integrity,
Requirement
time of manufacture of the device.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
2734
Requirement enhancements
15.9.2
Rationale and supplemental guidance
2775
2776
2777
2778
2779
2780
2781
2782
2783
2784
2785
2786
2787
2788
2789
In order for a component to be able to validate the authenticity and integrity of the hardware,
software, and data provided by the product supplier, it must possess a trusted source of data to
2790
15.9.3
2791
None
2792
15.9.4
2793
The requirements for the four SL levels that relate to NDR 3.12 are:
software, or it may be the public portion of an asymmetric cryptographic key pair to be used in the
validation of cryptographic signatures. This trusted data is often used to validate critical software,
firmware, and data prior to booting the firmware or operating system of a component, in order to
are known t
hardware mechanisms, preventing any modification of the data during normal operations of the
component. Modification of product supplier root of trust data is typically limit ed to the product
provisioning of the data. Instead, information to be validated against the root of trust is submitted
to the validation process through a hardware or software API which performs the validation and
returns the results without exposing the protected data.
Requirement Enhancements
Security levels
2794
SL-C(SI, component) 1: Not Selected
2795
SL-C(SI, component) 2: NDR 3.12
2796
SL-C(SI, component) 3: NDR 3.12
2797
SL-C(SI, component) 3: NDR 3.12
2798
15.10 NDR 3.13
Provisioning asset owner roots of trust
2799
15.10.1 Requirement
2800
Network devices shall
2801
2802
a) provide the capability to provision and protect the confidentiality, integrity, and authenticity
2803
2804
b) support the capability to provision without reliance on components that may be outside of
the
2805
15.10.2 Rationale and supplemental guidance
2806
2807
2808
2809
2810
2811
2812
2813
Product suppliers have established mechanisms to ensure that the software and firmware on their
components is authentic, and the integrity of that software and firmware has not been compromised.
2814
2815
2816
2817
2818
2819
In order perform these validations the component must contain data that provides a way to
differentiate between valid and invalid origins. The list of valid and invalid origins will differ from
asset owner to asset owner, and it is unlik ely that a product supplier will have a complete list of
every possible valid origin at time of manufacture. Therefore it is important that the product supplier
de the
to operate. However, many product suppliers also provide mechanisms for asset owners to extend
the functionality of their devices through the use of mobile c ode, user programs, or other such
means. In order to protect the security of the component, it is important that these extensions to
asset owner has approved of their origins.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
2774
actors cannot add additional roots of trust th at grant them the ability to operate on the component.
2822
2823
2824
2825
Requirements such as NDR 2.4
Mobile coderequire the component to complete authenticity
checks on mobile code prior to the execution of mobile code. The roots of trust provided by this
requirement provide the data necessary to validate the origin and integrity of mobile code, allowing
the component to independently determine if the code is allowed to execute .
2826
15.10.3 Requirement Enhancements
2827
None
2828
15.10.4 Security levels
2829
The requirements for the four SL levels that relate to NDR 3.13 are:
2830
SL-C(SI, component) 1: Not Selected
2831
SL-C(SI, component) 2: NDR 3.13
2832
SL-C(SI, component) 3: NDR 3.13
2833
SL-C(SI, component) 4: NDR 3.13
2834
15.11 NDR 3.14
2835
15.11.1 Requirement
2836
2837
Network devices shall verify the integrity of the firmware, software, and configuration data needed
2838
15.11.2 Rationale and supplemental guidance
2839
2840
2841
2842
2843
2844
2845
Integrity of the boot process
been tampered with, and that the software and firmware is valid to execute on the component.
Therefore the component must perform checks to validate the integrity and authenticity of the
not boot into an insecure or invalid operating state that could damage the component or provide a
path for a malicious actor to gain access to additional components, assets, or data.
2846
15.11.3 Requirement enhancements
2847
(1) Authenticity of the boot process
2848
2849
2850
s product supplier roots of trust to verity the
process prior to it being used in the boot process.
2851
15.11.4 Security levels
2852
The requirements for the four SL levels that relate to NDR 3.14 are:
2853
SL-C(SI, component) 1: NDR 3.14
2854
SL-C(SI, component) 2: NDR 3.14 (1)
2855
SL-C(SI, component) 3: NDR 3.14 (1)
2856
SL-C(SI, component) 4: NDR 3.14 (1)
2857
15.12 NDR 5.2
Zone boundary protection
2858
15.12.1 Requirement
2859
2860
2861
A network device at a zone boundary shall provide the capability to monitor and control
communications at zone boundaries to enforce the compartmentalization defined in the risk -based
zones and conduits model.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
2820
2821
15.12.2 Rationale and supplemental guidance
2863
2864
2865
2866
2867
2868
Any connections to outside each security zone should occur through managed interfaces consisting
of appropriate boundary protection devices (for example, proxies, gateways, routers, firewalls,
unidirectional gateways, guards and encrypted tunnels) arranged in an effective architecture (for
example, firewalls protecting application gateways residing in a DMZ). Control system boundary
protections at any designated alternate processing sites should provide the same levels of
protection as that of the primary site.
2869
15.12.3 Requirement enhancements
2870
(1) Deny all, permit by exception
2871
2872
2873
The network component shall provide the capability to deny network traffic by default and allow
network traffic by exception (also termed deny all, permit by exception).
(2) Island mode
2874
The network component shall provide the capability to prevent any communication through the
2875
control system boundary (also termed island mode).
2876NOTE Examples of when this capability may be used include where a security violation and/or breach has been detected
2877
within the control system, or an attack is occurring at the enterprise level.
2878
(3) Fail close
2879
The network component shall provide the capability to prevent any communication through the
2880
control system boundary when there is an operational failure of the boundary prote ction
2881
mechanisms (also termed fail close).
2882NOTE Examples of when this capability may be used include scenarios where a hardware failure or power failure causes
2883
boundary protection devices to function in a degraded mode or fail entirely.
2884
15.12.4 Security levels
2885
The requirements for the four SL levels that relate to NDR 5.2 are:
2886
SL-C(SI, component) 1: NDR 5.2
2887
SL-C(SI, component) 2: NDR 5.2 (1)
2888
SL-C(SI, component) 3: NDR 5.2 (1) (2) (3)
2889
SL-C(SI, component) 4: NDR 5.2 (1) (2) (3)
2890
15.13 NDR 5.3
General purpose, person-to-person communication restrictions
2891
15.13.1 Requirement
2892
2893
2894
A network device at a zone boundary shall provide the capability to prevent general purpose ,
person-to-person messages from being received from users or systems external to the control
system.
2895
15.13.2 Rationale and supplemental guidance
2896
2897
2898
2899
2900
General purpose, person-to-person communications systems include but are not limited to: email
systems, forms of social media (Twitter, Facebook, picture galleries, etc.) or any message systems
that permit the transmission of any type of executable file. These systems are usually utilized for
private purposes that are not related to control system operations, and therefore the risks imposed
by these systems normally outweigh any perceived benefit.
2901
2902
2903
2904
These types of general purpose communications systems are commonly used as attack vectors to
introduce malware to the control system, pass information for which read authorization exists to
locations external to the control system and introduce excessive network loading that can be use d
to create security problems or launch attacks on the control system.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
2862
Network devices could realize such restrictions, for example, by blocking specific communications
based on port numbers and source and/or target address as well as more in depth checks by
application layer firewalls.
2908
15.13.3 Requirement enhancements
2909
None
2910
15.13.4 Security levels
2911
The requirements for the four SL levels that relate to NDR 5.3 are:
2912
SL-C(SI, component) 1: NDR 5.3
2913
SL-C(SI, component) 2: NDR 5.3
2914
SL-C(SI, component) 3: NDR 5.3
2915
SL-C(SI, component) 4: NDR 5.3
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
2905
2906
2907
Annex A
(informative)
Component catagories
2916
2917
2918
A.1
Device categories
2920
A.1.1
2921
2922
A.1.1.1
2923
2924
2925
2926
2927
2928
2929
2930
2931
2932
2933
2934
2935
2936
2937
2938
2939
2940
2941
2942
2943
The term PLC is commonly used in the process and discrete manufacturing industries. A PLC is a
device that typically resides on the lower levels of the automation system ( such as level 1 and 2 of
the Purdue Enterprise Reference Architecture in ANSI/ISA-95.00.01 [22]). PLCs commonly use
ruggedized hardware to allow for operation in industrial environments and are commonly base d on
commercial real-time operating systems (RTOS). PLCs are programmed to execute control logic
based on inputs from the process (obtained from instrumentation like temperature sensors,
pressure sensors, vibration sensors, etc.). The control logic's output is used to control the industrial
process (through actuators such as valves, pumps, etc.). The programming is usually done using
engineering software commonly run on host devices ( for example, laptops or PC workstations). A
common programming language for control logic is IEC 61131-3, Programmable controllers Part
3: Programming languages [20]. In larger systems, PLCs often also communicate the process
conditions as obtained from sensors to higher-level servers and/or operator workstations and
receive instructions from higher-level control functions or operator workstati ons, which are
translated into or forwarded as commands to actuators. For the communication to higher -level
functions such as control servers or operator worksta tions, modern PLCs use Ethernet and
Transmission Control Protocol (TCP)/Internet Protocol (IP)-based protocols, while for the
communication to the instrumentation commonly industry standard fieldbuses are used (some of
which are also available on Ethernet carriers, but usually don't use the TCP/IP stack). Special PLCs
are used in SIS which ensure that the process under control remains within the bounds of sa fe
operation at all times. PLCs, especially in SIS, should meet hard real-time and high integrity and
availability requirements.
2944
2945
2946
A.1.1.2
2947
2948
2949
2950
2951
2952
2953
2954
2955
2956
2957
2958
2959
2960
2961
2962
2963
2964
An intelligent electronic device (IED) is conceptually very similar to a PLC, but the term is more
commonly used in power systems (specifically substation automation). An IED receives
measurements from the power equipment (for example, transformers, switches and circuit
breakers) and executes control logic or protection functions. Similar to PLCs, IEDs are commonly
programmed and parameterized using engineering software commonly run on host devices ( for
example laptops and PC workstations). A modern standard way of describing the configuration of
IEDs and their functions is defined in the IEC 61850 standard. The output of the logic executed by
IEDs is transmitted to actuators (switches, circuit breakers , etc.). As opposed to PLCs, IEDs
commonly also have a HMI which allows a human user standing in front of the IED to use the IED's
functionality (often a subset necessary to support essential functions). Also, substations , and
therefore the IEDs used therein, have to be able to operate in complete isolation ( such as without
any communication to higher-level systems outside the substation or even without any
communication to other IEDs or station-level workstations or servers). Modern IEDs usually use
Ethernet and TCP/IP-based protocols to communicate to higher-level components, while
communication to other IEDs may be done using Ethernet -based protocols (in some cases TCP/IPbased, often directly on Ethernet) or fieldbuses (some of which are available also on Ethernet
carriers, but don't use the TCP/IP stack). Similar to PLCs, IEDs should meet hard real-time and
high integrity and availability requirements.
Device category: embedded device
Programmable Logic Controller (PLC) (expanded from the Electropedia
definition 351-32-34 [19])
Intelligent electronic device (expanded from the definition in
IEC TR 61850-1:2013, Communication networks and systems for power utility
automation Part 1: Introduction and overview [21])
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
2919
2965
A.1.2
Device category: network device
2966
A.1.2.1
2967
2968
2969
2970
2971
2972
2973
A switch is a device in computer networks that links multiple network segments or network nodes
together. A switch typically is located at layer 2 (data link layer) of the OSI model ( see ISO/IEC
7498-1 [14]). Modern switches, especially those designed for use in larger networks, typically
provide interfaces for configuration management and network management. These interfaces may
support the configuration of the switch (for example web-based via HTTP/HTTPS, file-based via
FTP/SFTP, command-line-based via SSH or via simple network management protocol ( SNMP)) as
well as log and event management (for example via syslog).
2974
2975
A.1.2.2
2976
2977
2978
2979
2980
2981
2982
2983
2984
2985
2986
2987
2988
2989
2990
Virtual private networks are logical networks that allow for the extension of private networks across
distances that are bridged by public networks. The use of the public network to co ver the distance
is transparent/invisible to the VPN users. VPNs are established by creating a logical tunnel at the
border of the two segments of the private network. The tunnel is established by VPN terminators,
which are devices located at the network border. The data packets from one segment are
encapsulated (commonly also encrypted) at the VPN terminator at then sent through a public
network to the peer VPN terminator. There, the encapsulation is removed (usually involving
decryption) and the original packet is recovered and forwarded into the local network segment.
VPNs are also often used to allow roaming users secure access to resources on their home
network. In this scenario, a client software on the roaming device acts as a local VPN terminator,
encapsulating (and usually encrypting) all data packets and forwarding them to the VPN terminator
on the home network border. Establishment of the tunnel between VPN terminators should be
authenticated, which, in the scenario of roaming users , typically is a user-based authentication.
Hence, VPN terminators may be used to collect data about roaming users , which may allow tracing
their location and other privacy related data.
2991
A.1.3
2992
A.1.3.1
2993
2994
2995
2996
2997
2998
2999
3000
3001
3002
3003
3004
3005
Operator workstations are used in control systems to displa y process information to human users
or operators and to allow them to interact with the control system ( for example initiate operational
actions on the process, such as opening a valve, closing a switch, modifying process set points ,
etc.). Depending on the respective operational requirements, operator workstations are often
required to be continuously available (at least a minimum set of workstations out of all installed
ones) to allow for an uninterrupted view of the process conditions and the opportunit y to interact
with the process immediately, if necessary. In order to obtain the data to be displayed and to send
the commands issued by the human user, operator workstations typically communicate with control
servers and connectivity servers in the control systems, sometimes they also directly communicate
with PLCs. This communication is commonly using Ethernet and TCP/IP-based protocols. Operator
workstations typically do not have to meet hard-real time requirements, but have high integrity and
(at least as a set of operator workstations) high availability requirements. They are typically built
from COTS PC hardware and run COTS client operating systems.
3006
A.1.3.2
3007
3008
3009
3010
3011
3012
3013
3014
3015
Data historians are used in control systems to collect and maintain long -term process history data.
This data is commonly collected from control servers or directly from PLCs using protocols based
on Ethernet and TCP/IP. The data may be used in a variety of analyses, for example, for process
optimization or performance reporting but may also be used in reporting to regulatory entities such
as emission reporting or documentation of the product's production process integrity ( for example,
as required by the US Food and Drug Administration ( FDA) regulations for pharmaceutical
products). They are typically built from COTS PC/server hardware and run COTS client/server
operating systems. Data is commonly stored using COTS database products. Communication to
data access clients and data sources is commonly using TCP/IP-based protocols. Depending on
Virtual Private Network (VPN) terminator (expanded from Electropedia definition
732-01-10)
Device category: host device/application
Operator workstation
Data historian
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
Switch (expanded from Electropedia definition 732-01-22)
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
3016
3017
the criticality of the process history from a business perspective, data historians have moderate
availability and integrity requirements and typically no hard real -time requirements.
Annex B
(informative)
Mapping of CRs and REs to FR SL levels 1-4
3018
3019
3020
B.1
Overview
3022
3023
This annex is intended to provide overall guidance to the reader as to how SL levels 0 to 4 are
differentiated on an FR-by-FR basis via the defined CRs and their associated REs.
3024
B.2
3025
3026
3027
3028
3029
3030
3031
3032
3033
3034
Table B.1 indicates which component level requirements apply to which FRs for a given component
security level capability SL SL-C(xx, component). For a given FR, the required comp onent level
requirements to meet a given SL-C are denoted by a check mark. Thus, as an example, the SL=1
component security capabilities for FR 5 (or SL-C(RDF, component)=1), would include the base
requirements of all four defined CRs. A component unable t o meet all four of these CRs would have
an SL-C(RDF, component)=0. To meeting SL-C(RDF, component)=2, a system needs to support
the four CR base requirements plus RE(1) of CR 5.1 and CR 5.2. As another example, only the CR
6.1 base requirement is required to meet SL-C(TRE, component)=1, but both SRs defined are
required in order to meet SL-C(TRE, component)=2. Refer to ISA 62443 3 3 Annex A for how a
full SL vector would be denoted.
3035
For clarification the following acronyms are used in the table:
SL mapping table
3036
CR
3037
SAR
Software application requirement
3038
EDR
Embedded device requirement
3039
HDR
Host device requirement
3040
NDR
Network device requirement
3041
Component requirement which is common to all types of components
Table B.1
Mapping of CRs and REs to FR SL levels 1-4
SRs and Res
FR 1
CR 1.1
Identification and authentication control (IAC)
Human user identification and
authentication
RE (1) Unique identification and authentication:
RE (2) Multifactor authentication for all
interfaces
CR 1.2
Software process and device identification
and authentication
RE (1) Unique identification and authentication
CR 1.3
Account management
CR 1.4
Identifier management
CR 1.5
Authenticator management
SL 1
SL 2
SL 3
SL 4
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
3021
RE (1) Hardware security for authenticators
NDR 1.6
Wireless access management
3042
Table B.1
Mapping of SRs and REs to FR SL levels 1-4
SRs and Res
CR 1.7
Strength of password-based
authentication
RE (1) Password generation and lifetime
restrictions for human users
RE (2) Password lifetime restrictions for all
users (human, software process, or
device)
CR 1.8
Public key infrastructure certificates
CR 1.9
Strength of public key-based
authentication
RE (1) Hardware security for public key-based
authentication
CR 1.10
Authenticator feedback
CR 1.11
Unsuccessful login attempts
CR 1.12
System use notification
NDR 1.13
Access via untrusted networks
RE (1) Explicit access request approval
CR 1.14
Strength of symmetric key-based
authentication
RE (1) Hardware security for symmetric keybased authentication
FR 2
CR 2.1
Use control (UC)
Authorization enforcement
RE (1) Authorization enforcement for all users
(humans, software processes and
devices)
RE (2) Permission mapping to roles
RE (3) Supervisor override
RE (4) Dual approval
CR 2.2
Wireless use control
CR 2.3
Use control for portable and mobile
devices
SL 1
SL 2
SL 3
SL 4
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
RE (1) Unique identification and authentication
Table B.1
Mapping of SRs and REs to FR SL levels 1-4
SRs and Res
Mobile code
RE (1) Mobile code integrity check
HDR 2.4
Mobile code
NDR 2.4
Mobile code
CR 2.5
Session lock
CR 2.6
Remote session termination
CR 2.7
Concurrent session control
CR 2.8
Auditable events
CR 2.9
Audit storage capacity
RE (1) Warn when audit record storage
capacity threshold reached
CR 2.10
Response to audit processing failures
CR 2.11
Timestamps
RE (1) Time synchronization
RE (2) Protection of time source integrity
CR 2.12
Non-repudiation
RE (1) Non-repudiation for all users
EDR 2.13 Use of physical diagnostic and test
interfaces
RE (1) Active monitoring
HDR 2.13 Use of physical diagnostic and test
interfaces
RE (1) Active monitoring
NDR 2.13 Use of physical diagnostic and test
interfaces
RE (1) Active monitoring
FR 3
SL 3
SL 4
Mobile code
RE (1) Mobile code integrity check
EDR 2.4
SL 2
System integrity (SI)
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
SAR 2.4
SL 1
Table B.1
Mapping of SRs and REs to FR SL levels 1-4
SRs and Res
SAR 3.2
Protection from malicious code
EDR 3.2
Protection from malicious code
HDR 3.2
Protection from malicious code
RE (1) Report version of code protection
NDR 3.2
Protection from malicious code
Security functionality verification
RE (1) Security functionality verification during
normal operation
CR 3.4
Software and information integrity
RE (1) Authenticity of software and information
RE (2) Automated notification of integrity
violations
CR 3.5
Input validation
CR 3.6
Deterministic output
CR 3.7
Error handling
CR 3.8
Session integrity
RE (1) Invalidation of session IDs after session
termination
RE (2) Unique session ID generation
RE (3) Randomness of session IDs
CR 3.9
SL 3
SL 4
Communication integrity
RE (1) Communication authentication
CR 3.3
SL 2
Protection of audit information
RE (1) Audit records on write-once media
EDR 3.10
Support for updates
RE (1) Update authenticity and integrity
HDR 3.10
Support for updates
RE (1) Update authenticity and integrity
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
CR 3.1
SL 1
Table B.1
Mapping of SRs and REs to FR SL levels 1-4
SRs and Res
EDR 3.11 Physical tamper resistance and
detection
RE (1) Notification of a tampering attempt
HDR 3.11 Physical tamper resistance and
detection
RE (1) Notification of a tampering attempt
NDR 3.11 Physical tamper resistance and
detection
RE (1) Notification of a tampering attempt
EDR 3.12 Provisioning product supplier roots of
trust
HDR 3.12 Provisioning product supplier roots of
trust
NDR 3.12 Provisioning product supplier roots of
trust
EDR 3.13
Provisioning asset owner roots of trust
HDR 3.13
Provisioning asset owner roots of trust
NDR 3.13
Provisioning asset owner roots of trust
EDR 3.14
Integrity of the boot process
RE (1) Authenticity of the boot process
Integrity of the boot process
RE (1) Authenticity of the boot process
NDR 3.14
Integrity of the boot process
RE (1) Authenticity of the boot process
FR 4
SL 3
SL 4
Support for updates
RE (1) Update authenticity and integrity
HDR 3.14
SL 2
Data confidentiality (DC)
CR 4.1
Information confidentiality
CR 4.2
Information persistence
RE (1) Erase of shared memory resources
RE (2) Erase verification
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
NDR 3.10
SL 1
Table B.1
Mapping of SRs and REs to FR SL levels 1-4
SRs and Res
FR 5
Restricted data flow (RDF)
Network segmentation
NDR 5.2
Zone boundary protection
RE (1) Deny all, permit by exception
RE (2) Island mode
RE (3) Fail close
NDR 5.3 General purpose, person-to-person
communication restrictions
CR 6.1
Timely response to events (TRE)
Audit log accessibility
RE (1) Programmatic access to audit logs
CR 6.2
FR 7
CR 7.1
Continuous monitoring
Resource availability (RA)
Denial of service protection
RE (1) Manage communication load from
component
CR 7.2
Resource management
CR 7.3
Control system backup
RE (1) Backup integrity verification
RE (2) Local backup
CR 7.4
Control system recovery and
reconstitution
CR 7.6
Network and security configuration
settings
RE (1) Machine-readable reporting of current
security settings
3043
SL 3
SL 4
Use of cryptography
CR 5.1
FR 6
SL 2
CR 7.7
Least functionality
CR 7.8
Control system component inventory
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
CR 4.3
SL 1
3045
3046
3047
3048
3049
NOTE
3050
References to other parts, both existing and anticipated, of the ISA 62443 series:
3051
3052
NOTE
Some of these references are normative references (see Clause 2), published documents, in development, or
anticipated. They are all listed here for completeness of the currently authorized parts of the ISA 62443 series.
3053
3054
[1]
ANSI/ISA 62443 1 1 (99.01.01), Security for industrial automation and control systems,
Part 1-1: Concepts and models 3
3055
3056
[2]
ANSI/ISA TR62443 1 2 (TR99.01.02), Security for industrial automation and control
systems, Part 1-2: Master glossary of terms and abbreviations
3057
3058
[3]
ANSI/ISA 62443 1 3 (99.01.03), Security for industrial automation and control systems,
Part 1-3: System security conformance metrics
3059
3060
[4]
ANSI/ISA TR62443 1 4 (TR99.01.04), Security for industrial automation and control
systems, Part 1-4: IACS security life-cycle and use-cases
3061
3062
[5]
ANSI/ISA 62443 2 1 (99.02.01), Security for industrial automation and control systems,
Part 2-1: Requirements for an IACS security management system 3
3063
3064
[6]
ANSI/ISA TR62443 2 2 (TR99.02.02), Security for industrial automation and control
systems, Part 2-2: Implementation guidance for an IACS security management system
3065
3066
[7]
ANSI/ISA TR62443 2 3 (TR99.02.03), Security for industrial automation and control
systems, Part 2-3: Patch management in the IACS environment
3067
3068
[8]
ANSI/ISA 62443 2 4 (99.02.04), Security for industrial automation and control systems,
Part 2-4: Requirements for IACS solution suppliers
3069
3070
[9]
ANSI/ISA TR62443 3 1 (TR99.03.01), Security for industrial automation and control
systems, Part 3-1: Security technologies for IACS3
3071
3072
[10]
ANSI/ISA 62443 3 2 (99.03.02), Security for industrial automation and control systems,
Part 3-2: Security risk assessment and system design
3073
3074
[11]
ANSI/ISA 62443 3 3 (99.03.03), Security for industrial automation and control systems,
Part 3-3: System security requirements and security levels
3075
3076
[12]
ANSI/ISA 62443 4 1 (99.04.01), Security for industrial automation and control systems,
Part 4-1: Product development requirements
3077
3078
NOTE
This standard is ANSI/ISA 62443 4 2 (99.04.02), Security for industrial automation and control systems:
Part 4-2, Technical security requirements and for IACS components
3079
Other standards references:
3080
[13]
This bibliography includes references to sources used in the creation of this standard as well as references to
sources that may aid the reader in developing a greater understanding of cyber security as a whole and
developing a management system. Not all references in this bibliography are referred to throughout the text of
this standard. The references have been broken down into different categories depending on the type of source
they are.
ISO/IEC Directives, Part 2, Rules for the structure and drafting of International Standards
3 Currently under revision.
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
BIBLIOGRAPHY
3044
3081
3082
[14]
ISO/IEC 7498-1:1994, Information technology
Reference Model: The Basic Model
Open Systems Interconnection
Basic
3083
3084
[15]
ISO/IEC 8601:2004, Data elements and interchange formats
Representation of dates and times
3085
3086
[16]
ISO/IEC 15408-1:2009, Information technology Security techniques
for IT security Part 1: Introduction and general model
3087
3088
[17]
ISO/IEC 19790:2012, Information technology
requirements for cryptographic modules
Security techniques
Security
3089
3090
[18]
ISO/IEC 27002:2013, Information technology
information security management
Security techniques
Code of practice for
3091
[19]
IEC 60050, International Electrotechnical Vocabulary , or Electropedia
3092
[20]
IEC 61131-3, Programmable controllers
3093
3094
[21]
IEC TR 61850-1:2013, Communication networks and systems for power utility automation
Part 1: Introduction and overview
3095
3096
[22]
ANSI/ISA-95.00.01-2010 (IEC 62264-1 Mod) Enterprise-Control System Integration
Part 1: Models and Terminology
3097
[23]
ISO/IEC 11889-1:2015, Trusted platform module library
Evaluation criteria
Part 3: Programming languages
Part1: Architecture
3098
3099
Other documents and published resources:
3100
[24]
FIPS 140-2, Security Requirements for Cryptographic Modules
3101
[25]
NIST SP 800-57, Recommendation for Key Management, Part 1: General
3102
[26]
NIST SP 800-92, Guide to Computer Security Log Management
3103
[27]
NIST SP800-63-2, Electronic Authentication Guideline (A ugustl 2013)
3104
Websites:
3105
3106
[28]
OWASP Code Review Guide, available at <
https://www.owasp.org/index.php/Code_Review_Guide >>
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.
Information interchange
This information is to be used solely for the purpose of supporting the further development of ISA-62443 standards.
It is subject to change without notice. It may not be reproduced or distributed to others, offered for sale, or used for commercial purposes.