IEC 62443

Last updated

ISA/IEC 62443 is a series of standards that address security for operational technology in automation and control systems. The series is divided into different sections and describes both technical and process-related aspects of automation and control systems security. The series is also known as ISA/IEC 62443 in recognition of the fact that much of the development is done by the ISA99 committee of the International Society for Automation.

Contents

It divides the security topics by principal role including:

The different roles each follow a risk-based approach to prevent and manage security risks in their activities.

History

In 2002, the International Society of Automation (ISA), a professional automation engineering society and ANSI-accredited standards development organization (SDO) established a standards committee (ISA99), which went on to develop a multi-part series of standards and technical reports addressing the security of Automation and Control System cyber security. These work products were submitted by ISA for approval and then published as North American ANSI standards using the designation ANSI/ISA-99 or ISA99 standards.

in c. 2010 the ISA99 committee strengthened its relationship with IEC TC65 WG10, resulting in a renaming of the standards to ANSI/ISA-62443. The available content was submitted to and used by the IEC working groups and since then, the series has been commonly referred to as ISA/IEC 62443.

Meanwhile, the German engineering associations VDI and VDE released the VDI/VDE 2182 guidelines in 2011. The guidelines describe how to handle information security in industrial automation environments and were also submitted to and used by the IEC working groups.

Current Situation

ISA99 and IEC TC65 WG10 have strengthened and formalized their collaboration, creating a series of joint leadership and project teams to continue development of the standards in the 62443 series. This collaboration produces a single set of standards referred to as ISA/IEC 62443. It employs processes and procedures that conform to both the ISA Standards and Practices procedures and the IEC Directives.

In the International Electrotechnical Commission (IEC) standards creation allows all national committees involved to agree upon a common standard. The development method in ISA is somewhat different, involving contributions from individual experts. Taken together, the combination of these methods produces standards that represent a broad view of common industry practice.

The resulting standards are published by ISA as ANSI/ISA 62443 and by IEC as IEC 62443. For a given pat of the series the technical content of the ISA and IEC editions is identical.

Industry Application

The IEC has approved the ISA/IEC 62443 family of standards as 'horizontal standards'. This means that when sector specific standards for operational technology are being developed by subject matter experts, the ISA/IEC 62443 standards must be used at the foundation for requirements addressing security in those standards. This approach serves to avoid the proliferation of partial and/or conflicting requirements for addressing security of automation and control systems across industry sectors where the same or similar technology or products are deployed at operating sites.

In ISA these standards have been viewed as "horizontal" since the ISA99 committee was formed. The scope of the series is described in terms of potential consequences of security incidents, and not as applying to specific industry sectors.

Recent Developments

Structure

ISA/IEC 62443 Industrial communication networks - Network and system security series of standards is organized as per the following table:

GeneralPolicies and ProceduresSystemComponents and Requirements
1-1Technical Specification, Edition 1.0, July 2009 [1] Concepts and models2-1Edition 2.0, 2024 [2] Security program requirements for IACS asset owners3-1Technical Report, Edition 1.0, July 2009 [3] Security technologies for industrial automation and control systems (IAC)4-1Edition 1.0, January 2018 [4] Secure product development lifecycle requirements
2-3Technical Report, Edition 1.0, June 2015 [5] Patch management in the IACS environment3-2Edition 1.0, June 2020 [6] Security risk assessment and system design4-2Edition 1.0, February 2019 [7] Technical security requirements for IACS components
2-4Edition 2.0, December 2023 [8] Requirements for IACS service providers3-3Edition 1.0, August 2013 [9] System security requirements and security levels
1-5Technical Specification, Edition 1.0, September 2023Scheme for ISA/IEC 62443 security profiles

Foundational Concepts

There are several concepts that form the foundation of the ISA/IEC 62443 series.

Maturity Level

The standards describe different maturity levels for processes through so-called "maturity levels". To fulfill a certain level of a maturity level, all process-related requirements must always be practiced during product development or integration, i.e. the selection of only individual criteria ("cherry picking") is not standard-compliant.

The maturity levels are described as follows:

Security Level

Technical requirements for systems (ISA/IEC 62443-3-3) and products (ISA/IEC 62443-4-2) are evaluated in the standard by four so-called Security Levels (SL). The different levels indicate the resistance against different classes of attackers. The standard emphasizes that the levels should be evaluated per technical requirement (see ISA/IEC 62443-1-1) and are not suitable for the general classification of products.

The levels are:

System Segmentation

Application of this concept involves grouping the systems and components of the automation and control system into a set of zones and conduits.

Zones divide a system into homogeneous zones by grouping the (logical or physical) assets with common security requirements. The security requirements are defined by Security Level (SL). The level required for a zone is determined by the risk analysis. Zones have boundaries that separate the elements inside the zone from those outside. Information moves within and between zones. Zones can be divided into sub-zones that define different security levels (Security Level) and thus enable defense-in-depth.

Conduits group the elements that allow communication between two zones. They provide security functions that enable secure communication and allow the coexistence of zones with different security levels.

Conformance to standards

Processes, systems and products used in automation and control environments can be certified as conforming to ISA/IEC 62443. Many testing, inspection, and certification (TIC) companies offer product and process certifications based on ISA/IEC 62443. By accrediting according to the ISO/IEC 17000 series of standards, the companies share a single, consistent set of requirements for ISA/IEC 62443 certifications which elevates the usefulness of the resulting certificates of conformance.

Accredited certification schemes

ISA/IEC 62443 certification schemes have been established by several global testing, inspection, and certification (TIC) companies. The schemes are based on the referenced standards and define test methods, surveillance audit policies, public documentation policies, and other specific aspects of their program. Security certification programs for ISA/IEC 62443 standards are being offered globally by many recognized Certification Bodies (CB), including Bureau Veritas, Intertek, SGS-TÜV Saar, TÜV Nord, TÜV Rheinland, TÜV SÜD and UL.

A global infrastructure of national accreditation bodies (AB) ensures consistent evaluation of the ISA/IEC 62443. The ABs operate per the requirements of ISO/IEC 17011, a standard that contains requirements for the competence, consistency, and impartiality of accreditation bodies when accrediting conformity assessment bodies. ABs are members of the IAF for work in management systems, products, services, and personnel accreditation or the ILAC for laboratory accreditation. A Multilateral Recognition Arrangement (MLA) between ABs will ensure global recognition of accredited CBs.

TIC companies are accredited by an AB to provide inspection according to the ISO/IEC 17020, testing laboratories according to ISO/IEC 17025 and certification of products, processes, and services according to ISO/IEC 17065.

IECEE CB Scheme

The IEC System for Conformity Assessment Schemes for Electrotechnical Equipment and Components (IECEE) Certification Body Scheme (CB Scheme) is a multilateral agreement that facilitates market access for manufacturers of electrical and electronic products. Under the CB Scheme processes, products and systems can be certified according to ISA/IEC 62443.

The origin of the CB Scheme comes from the CEE (former European "Commission for Conformity Testing of Electrical Equipment") and was integrated into the IEC in 1985. Currently, 54 Member Bodies are in the IECEE, 88 NCBs (National Certification Bodies), and 534 CB Test Laboratories (CBTL). In the field of product certification, this procedure is used to reduce the complexity in the approval procedure for manufacturers of products tested and certified according to harmonized standards. A product that has been tested by a CBTL (certified testing laboratory) according to a harmonized standard such as the ISA/IEC 62443, can use the CB report as a basis for a later national certification and approval such as GS, PSE, CCC, NOM, GOST/R, BSMI.

ISCI ISASecure

The ISA Security Compliance Institute (ISCI), a wholly owned subsidiary of the ISA, created an industry consensus conformity assessment scheme that certifies to the ISA/IEC 62443 standards and operates under the ISASecure brand. This scheme is used to certify automation control systems, components and processes. ISASecure certifications were expanded to include the Industrial IOT component certification (ICSA) in December 2022. Certification Bodies in the ISASecure certification scheme are independently accredited by ISO 17011 Accreditation Bodies to the ISASecure technical readiness requirements and the ISO 17025 and ISO 17065 standards. Multilateral recognition agreements under the IAF ensure that the ISASecure certifications are mutually recognized by all global IAF signatories.

The ISCI offers multiple certifications under the ISASecure brand:

See also

Related Research Articles

The Common Criteria for Information Technology Security Evaluation is an international standard for computer security certification. It is currently in version 3.1 revision 5.

A fieldbus is a member of a family of industrial digital communication networks used for real-time distributed control. Fieldbus profiles are standardized by the International Electrotechnical Commission (IEC) as IEC 61784/61158.

<span class="mw-page-title-main">International Society of Automation</span> Non-commercial Organization

The International Society of Automation (ISA) Is a non-profit technical society for engineers, technicians, businesspeople, educators and students, who work, study or are interested in automation and pursuits related to it, such as instrumentation. Originally known as the Instrument Society of America, the society is more commonly known by its acronym, ISA. The society's scope now includes many technical and engineering disciplines.

COBIT is a framework created by ISACA for information technology (IT) management and IT governance.

In functional safety, safety integrity level (SIL) is defined as the relative level of risk-reduction provided by a safety instrumented function (SIF), i.e. the measurement of the performance required of the SIF.

Information security standards are techniques generally outlined in published materials that attempt to protect a user's or organization's cyber environment. This environment includes users themselves, networks, devices, all software, processes, information in storage or transit, applications, services, and systems that can be connected directly or indirectly to networks.

<span class="mw-page-title-main">Product certification</span> Performance and quality assurance

Product certification or product qualification is the process of certifying that a certain product has passed performance tests and quality assurance tests, and meets qualification criteria stipulated in contracts, regulations, or specifications.

IEC 61508 is an international standard published by the International Electrotechnical Commission (IEC) consisting of methods on how to apply, design, deploy and maintain automatic protection systems called safety-related systems. It is titled Functional Safety of Electrical/Electronic/Programmable Electronic Safety-related Systems.

The Common Criteria model provides for the separation of the roles of evaluator and certifier. Product certificates are awarded by national schemes on the basis of evaluations carried by independent testing laboratories.

An independent test organization is an organization, person, or company that tests products, materials, software, etc. according to agreed requirements. The test organization can be affiliated with the government or universities or can be an independent testing laboratory. They are independent because they are not affiliated with the producer nor the user of the item being tested: no commercial bias is present. These "contract testing" facilities are sometimes called "third party" testing or evaluation facilities.

ISO/IEC 27006 is an information security standard published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Part of the ISO/IEC 27000 series of ISO/IEC Information Security Management System (ISMS) standards, it is titled Information technology - Security techniques - Requirements for bodies providing audit and certification of information security management systems.

ISO/IEC 17024: Conformity assessment - General requirements for bodies operating certification of persons is an ISO/IEC standard which specifies criteria for the operation of a certification body for persons. The standard includes requirements for the development and maintenance of the certification scheme for persons upon which the certification is based.

Functional safety is the part of the overall safety of a system or piece of equipment that depends on automatic protection operating correctly in response to its inputs or failure in a predictable manner (fail-safe). The automatic protection system should be designed to properly handle likely systematic errors, hardware failures and operational/environmental stress.

Automotive SPICE is a maturity model adapted for the automotive industry. It assesses the maturity of development processes for electronic and software-based systems. It is based on an initiative of the Special Interest Group Automotive and the Quality Management Center (QMC) in the German Association of the Automotive Industry (VDA).

ISO 26262, titled "Road vehicles – Functional safety", is an international standard for functional safety of electrical and/or electronic systems that are installed in serial production road vehicles, defined by the International Organization for Standardization (ISO) in 2011, and revised in 2018.

Control system security, or automation and control system (ACS) cybersecurity, is the prevention of interference with the proper operation of industrial automation and control systems. These control systems manage essential services including electricity, petroleum production, water, transportation, manufacturing, and communications. They rely on computers, networks, operating systems, applications, and programmable controllers, each of which could contain security vulnerabilities. The 2010 discovery of the Stuxnet worm demonstrated the vulnerability of these systems to cyber incidents. The United States and other governments have passed cyber-security regulations requiring enhanced protection for control systems operating critical infrastructure.

eCOGRA is a London-based testing agency and standards organisation in the realm of online gambling. The company was established in 2003 in the United Kingdom at the behest of the online gaming industry as the first industry self-regulation system. eCOGRA is a testing laboratory, inspection body, and certification body, specializing in the certification of online gaming software and the audit of Information Security Management Systems.

Automotive Safety Integrity Level (ASIL) is a risk classification scheme defined by the ISO 26262 - Functional Safety for Road Vehicles standard. This is an adaptation of the Safety Integrity Level (SIL) used in IEC 61508 for the automotive industry. This classification helps defining the safety requirements necessary to be in line with the ISO 26262 standard. The ASIL is established by performing a risk analysis of a potential hazard by looking at the Severity, Exposure and Controllability of the vehicle operating scenario. The safety goal for that hazard in turn carries the ASIL requirements.

Cantata++, commonly referred to as Cantata in newer versions, is a commercial computer program designed for dynamic testing, with a focus on unit testing and integration testing, as well as run time code coverage analysis for C and C++ programs. It is developed and marketed by QA Systems, a multinational company with headquarters in Waiblingen, Germany.

<span class="mw-page-title-main">Standardisation Testing and Quality Certification</span> Science and technology agency of the Government of India

Standardisation Testing and Quality Certification (STQC) Directorate, established in 1980, is an authoritative body offering quality assurance services to IT and Electronics domains.

References

  1. ISA/IEC 62443-1-1, Industrial communication networks – Network and system security – Part 1-1: Terminology, concepts and models
  2. 1 2 ISA/IEC 62443-2-1:2024, Security for industrial automation and control systems - Part 2-1: Security program requirements for IACS asset owners
  3. ISA/IEC 62443-3-1, Industrial communication networks – Network and system security – Part 3-1: Security technologies for industrial automation and control systems
  4. 1 2 ISA/IEC 62443-4-1, Security for industrial automation and control systems – Part 4-1: Secure product development lifecycle requirements
  5. ISA/IEC 62443-2-3, Security for industrial automation and control systems – Part 2-3: Patch management in the IACS environment
  6. ISA/IEC 62443-3-2, Security for industrial automation and control systems – Part 3-2: Security risk assessment for system design
  7. 1 2 ISA/IEC 62443-4-2, Security for industrial automation and control systems – Part 4-2: Technical security requirements for IACS components
  8. 1 2 ISA/IEC 62443-2-4:2023, Security for industrial automation and control systems – Part 2-4: Security program requirements for IACS service providers
  9. ISA/IEC 62443-3-3, Industrial communication networks – Network and system security – Part 3-3: System security requirements and security levels