CSA 311 Functional Security Assessment For Compone
CSA 311 Functional Security Assessment For Compone
Embedded Device
Network Device
Host Device
Validation by
Validation Source of Capability Security
Requirement ID Reference Name Requirement Description Independent Test Rationale and Supplemental Guidance
Activity Requirement Level
Required (Yes/No)
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 1 of 42
CSA-311 Tree
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device
Capability
Section Requirement ID and Reference Name
Security Level
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 2 of 42
CSA-311 Tree
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device
Capability
Section Requirement ID and Reference Name
Security Level
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 3 of 42
CSA-311 Tree
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device
Capability
Section Requirement ID and Reference Name
Security Level
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 4 of 42
CSA-311 CCSC
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Rationale and
Independent Source of Capability
Requirement ID Reference Name Requirement Description Validation Activity Supplemental
Test Required Requirement Security Level
Guidance
(Yes/No)
Verify that the supplier has performed and documented analysis and testing
Access Controls (IAC and UC) shall not prevent the operation of
to confirm that verifying and recording operator actions to enforce non-
essential functions, specifically:
repudiation does not add significant delay to system response time (see ISA-62443-4-2:
x x x x FSA-CCSC 1B Support of essential functions - non-repudiation - Verifying and recording operator actions to enforce non-repudiation No 1, 2, 3, 4
FSA-CR 2.12 – Non-repudiation). Record one of: CCSC 1
shall not add significant delay to system response time (see 6.14, SR
a. Met
2.12 – Non-repudiation).
b. Not met
If public key authentication is used by the component, determine by asking
the supplier, if this is a high availability component.
If public key authentication is used by the component and the supplier
asserts it is a high availability component, verify that the supplier has a test
case to confirm that the component maintains its essential functions upon
Access Controls (IAC and UC) shall not prevent the operation of failure of the certificate authority. Verify that this test has passed (See FSA-
essential functions, specifically: CR 1.8 – Public key infrastructure (PKI) certificates). Record one of:
Support of essential functions - failure of certificate ISA-62443-4-2:
x x x x FSA-CCSC 1C - For high availability control systems, the failure of the certificate a. Met No 1, 2, 3, 4
authority CCSC 1
authority shall not interrupt essential functions (see 5.10, SR 1.8 – b. Not met
Public key infrastructure (PKI) certificates). If public key authentication is not used by the component, record:
c. Not relevant - public key authentication not used
If public key authentication is used but the supplier does not assert this is a
high availability component, record:
d. Not relevant - not high availability component
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 5 of 42
CSA-311 CCSC
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Rationale and
Independent Source of Capability
Requirement ID Reference Name Requirement Description Validation Activity Supplemental
Test Required Requirement Security Level
Guidance
(Yes/No)
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 6 of 42
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
The function of identification and authentication is to map a known identity to an unknown software process or device (henceforth referred
to as an entity in 5.4.2) so as to make it known before allowing any data exchange. Allowing rogue entities to send and receive control
Components shall provide the capability system specific data can result in detrimental behavior of the control system.
to identify itself and authenticate to any All entities should be identified and authenticated for all access to the control system. Authentication of the identity of such entities should
other component (software application, be accomplished by using methods such as passwords, tokens or location (physical or logical). This requirement should be applied to
embedded devices, host devices and Vendor shall provide list of all software both local and remote access to the control system. However, in some scenarios where individual entities are used to connect to different
network devices), according to processes and devices to which the target systems (for example, remote vendor support), it may be technically infeasible for an entity to have multiple identities. In these
ISA‑62443‑3‑3 [11] SR1.2. component can connect. Verify that cases, compensating countermeasures would have to be applied.
If the component, as in the case of an evidence exists that the component can Special attention needs to be made when identifying and authenticating portable and mobile devices. These types of devices are a known
Software process and device ISA-62443-4-2:
x x x x FSA-CR 1.2 application, is running in the context of a identify itself and authenticate to each listed No 2, 3, 4 method of introducing undesired network traffic, malware and/or information exposure to control systems, including otherwise isolated
identification and authentication CR 1.2
human user, in addition, the process and device. networks.
identification and authentication of the Record one of: Where entities function as a single group, identification and authentication may be role-based, group-based or entity-based. It is essential
human user according to a. Met that local emergency actions as well as control system essential functions not be hampered by identification or authentication
ISA‑62443‑3‑3 [11] SR1.1 may be part b. Not met requirements (see clause 4 for a more complete discussion). For example, in common protection and control schemes, a group of
of the component identification and devices jointly execute the protection functions and communicate with multicast messages among the devices in the group. In these
authentication process towards the cases, group authentication based on shared accounts or shared symmetric keys are commonly used.
other components. In order to support identification and authentication control policies as defined according to ISA‑62443‑2‑1 [5], the control system verifies
the identity of all entities as a first step. In a second step, the permissions assigned to the identified entity are enforced (see 6.3, CR 2.1 –
Authorization enforcement)
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 7 of 42
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
In addition to an identifier (see 5.6) an authenticator is required to prove identity. Control system authenticators include, but are not limited
to, tokens, symmetric keys, private keys (part of a public/private key pair), biometrics, passwords, physical keys and key cards. There
should be security policies in place instructing that human users must take reasonable measures to safeguard authenticators, including
maintaining possession of their individual authenticators, not loaning or sharing authenticators with others and reporting lost or
compromised authenticators immediately.
Authenticators have a lifecycle. When an account is created automatically a new authenticator needs to be created, in order for the
account owner to be able to authenticate. For example, in a password-based system, the account has a password associated with it.
Definition of the initial authenticator content could be interpreted as the administrator defining the initial password that the account
If component provides the capability to management system sets for all new accounts. Being able to configure these initial values makes it harder for an attacker to guess the
identify and authenticate users of any type password between account creation and first account use (which should involve the setting of a new password by the account owner).
(humans, software processes or devices), Some control systems are installed with unattended installers that create all necessary accounts with default passwords and some
either directly or by integration into a embedded devices are shipped with default passwords. Over time, these passwords often become general knowledge and are
system, verify user documents indicate documented on the Internet. Being able to change the default passwords protects the system against unauthorized users using default
ability to define initial authenticator content. passwords to gain access. Passwords can be obtained from storage or from transmission when used in network authentication. The
Components shall provide the capability
Authenticator management - Record one of: ISA-62443-4-2: complexity of this can be increased by cryptographic protections such as encryption or hashing or by handshake protocols that do not
x x x x FSA-CR 1.5A to support the use of initial authenticator No 1, 2, 3, 4
initialize authenticator content a. Met CR 1.5(a) require transmission of the password at all. Still, passwords might be subject to attacks, for example, brute force guessing or breaking the
content.
b. Not met cryptographic protection of passwords in transit or storage. The window of opportunity can be reduced by changing/refreshing the
If component does not provide the passwords periodically. Similar considerations apply to authentication systems based on cryptographic keys. Enhanced protection can be
capability to identify and authenticate users achieved by using hardware mechanisms such as hardware security modules like trusted platform modules (TPMs).
of any type as described above, record: The management of authenticators should be specified in applicable security policies and procedures, for example, constraints to change
c. Not relevant default authenticators, refresh periods, specification of the protection of authenticators or firewall procedures.
Besides the capabilities for authenticator management specified in this requirement, the strength of the authentication mechanism
depends on the strength of the chosen authenticator (for example, password complexity or key length in public key authentication) and the
policies for validating the authenticator in the authentication process (for example, how long a password is valid or which checks are
performed in public key certificate validation). For the most common authentication mechanisms, password-based and public key
authentication, 5.9, 5.10 and 5.11 provide further requirements.
Use of components for some operations may be restricted, requiring additional authentication (such as, tokens, keys and certificates) in
order to perform some functions.
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 8 of 42
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 9 of 42
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 10 of 42
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 11 of 42
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Review user documentation and determine To meet the requirements in 5.11.1 does not necessarily require a real time connection to a certificate authority. Alternative out-of-band
if public key authentication is used. methods may be used to meet the requirements in 5.11.1. For example, a disconnected system could install and update certifications
using manual out-of-band processes.
If public key authentication is used, verify in Public/private key cryptography strongly depends on the secrecy of a given subject’s private key and proper handling of the trust
user documentation that signature validity relationships. When verifying a trust between two entities based on public key authentication, it is essential to trace the public key
can be determined, either directly or by certificate to a trusted entity. A common implementation error in certificate validation is to only check the validity of a certificate’s signature,
integration into a system, without but not checking the trust in the signer. In a PKI setting, a signer is trusted if they are a trusted CA or have a certificate issued by a trusted
communicating outside the same IACS CA, thus all verifiers need to trace certificates presented to them back to a trusted CA. If such a chain of trusted CAs cannot be
environment, such as out to the Internet or established, the presented certificate should not be trusted.
For components that utilize public-key- to a less secure IACS zone. If self-signed certificates are used instead of a PKI, the certificate subject itself signed its certificate, thus there never is a trusted third-
based authentication, those party or CA. This should be compensated by deploying the self-signed public key certificates to all peers that need to validate them via an
components shall provide directly or If the component directly supports the otherwise secured mechanism (for example, configuration of all peers in a trusted environment). Trusted certificates need to be distributed
Strength of public key-based
integrate into a system that provides the capability, also verify with the following test ISA-62443-4-2: to peers through secure channels. During the validation process, a self-signed certificate should only be trusted if it is already present in
x x x x FSA-CR 1.9A authentication - check validity of 2, 3, 4
capability within the same IACS in an environment without an Internet Yes CR 1.9(a) the list of trusted certificates of the validating peer. The set of trusted certificates should be configured to the minimum necessary set.
signature of a given certificate
environment to validate certificates by connection. Provide a certificate with an In both cases, validation needs to also consider the possibility that a certificate is revoked. In a PKI setting this is typically done by
checking the validity of the signature of invalid signature to the component. Verify maintaining certificate revocation lists (CRLs) or running an online certificate status protocol (OCSP) server. When revocation checking is
a given certificate. that this problem is detected and reported not available due to control system constraints, mechanisms such as a short certificate lifetime can compensate for the lack of timely
to the user. Record one of: revocation information. Note that short lifetime certificates can sometimes create significant operational issues in a control system
a. Met by component environment.
b. Met by integration in system It is expected that most components will integrate into an IACS and leverage the key authentication mechanisms provided by the
c. Not met underlying IACS. When implementing public key authentication at the component-level of an IACS, protection of the key becomes a
primary concern and objective of key storage on that component. Care should be taken in the implementation to assure that any private
If public key authentication is not used, keys stored within the component cannot be retrieved or tampered with (See 5.7, CR 1.5 – Authenticator management).
record: NOTE Tamper resistant design methodologies and technologies are available to assist with designing a secure private key protection
d. Not relevant mechanism.
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 12 of 42
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 13 of 42
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 14 of 42
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
The network device should protect against unauthorized connections or subversion of authorized connections.
Examples of access to the network device via untrusted networks typically include remote access methods (such as, dial-up, broadband
and wireless) as well as connections from a company’s office (non-control system) network. The network device may provide ACL
The network device supporting device (Access Control List) functionality to restrict access by:
access into a network shall provide the Layer 2 forwarding devices such as Ethernet switches:
ISA-62443-4-2:
x FSA-NDR 1.13 Access via untrusted networks capability to monitor and control all Future entry Future entry 1, 2, 3, 4 a) MAC address
NDR 1.13
methods of access to the network b) VLAN
device via untrusted networks. Layer 3 forwarding devices such as routers, gateways and firewalls:
a) IP address
b) Port and protocol
c) Virtual Private Networks
Means should be defined for installing the keys into the component. This may include installing and managing the component key using
Review user documentation and determine out-of-band methods. This is necessary since a compromise of any symmetric keys that are stored within the component could lead to a
if symmetric key authentication is used. full compromise of the system using those keys.
In practice, there are two basic ways to perform the secure authentication of a device to another: either using asymmetric cryptography
If symmetric key authentication is used, (see 5.11) or by using symmetric cryptography. The choice between asymmetric and symmetric is dictated by several criteria, like key
For components that utilize symmetric verify user documents indicate ability for the management, trust provisioning, legacy support and efficiency. Examples of symmetric key authentication schemes are Needham-
keys, the component shall provide the component to establish mutual trust using Schröder or Kerberos. When symmetric key authentication is used, the party uses a secret key they have learned in the past (for
Strength of symmetric key-based ISA-62443-4-2:
x x x x FSA-CR 1.14A capability to establish the mutual trust the symmetric key. Record one of: No 2, 3, 4 example, through trust provisioning). The party proves their claimed identity by proving knowledge of the secret key (for example, by
authentication - establish trust CR 1.14(a)
using the symmetric key. a. Met answering a challenge submitted by the other party, the examiner). The examiner has the knowledge of the same secret (also learned in
b. Not met the past through trust provisioning) and is able to compute the answer to the challenge performing the same cryptographic operations as
the prover. The examiner can then compare the answer of the prover with its own computation. If they match, the examiner is convinced
If symmetric key authentication is not used, that the prover is the one they claim to be and the process can be conducted the other way around, switching roles, to achieve mutual-
record: authentication. This mechanism is secure only if the shared secret is only known by the prover and the examiner and if the secret is
c. Not relevant diversified per prover. One instance of such a mechanism is the proper use of cipher-based message authentication code (CMAC)
computations or alternatively the Galois counter mode (GCM)/Galois message authentication code (GMAC) operation modes.
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 15 of 42
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 16 of 42
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 17 of 42
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Use control for portable and mobile There is no component level requirement ISA-62443-4-2:
FSA-CR 2.3 No validation activity
devices associated with ISA‑62443‑3‑3 SR 2.3. CR 2.3
Mobile code technologies include, but are not limited to, Java, JavaScript,
In the event that a software application utilizes
ActiveX, portable document format (PDF), Postscript, Shockwave movies, Flash
mobile code technologies, that application shall
animations and VBScript. Usage restrictions apply to both the selection and use
provide the capability to enforce a security policy
of mobile code installed on servers and mobile code downloaded and executed
for the usage of mobile code technologies. The ISA-62443-4-2:
x FSA-SAR 2.4A Mobile code - control execution Future entry Future entry 1, 2, 3, 4 on individual workstations. Control procedures should prevent the development,
security policy shall allow, at a minimum, for SAR 2.4(a)
acquisition or introduction of unacceptable mobile code within the control
each mobile code technology used on the
system in which the component resides. For example, mobile code exchanges
software application, action to control execution
may be disallowed directly within the control system, but may be allowed in a
of mobile code.
controlled adjacent environment maintained by IACS personnel.
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 18 of 42
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
If the embedded device uses mobile code technologies, Mobile code technologies include, but are not limited to, Java, JavaScript,
In the event that an embedded device utilizes
review user documentation and verify that there is a ActiveX, PDF, Postscript, Shockwave movies, Flash animations and VBScript.
mobile code technologies, the embedded device
configurable option to prevent each mobile code Usage restrictions apply to both the selection and use of mobile code installed
shall provide the capability to enforce a security
technology used, either from being transferred to the on servers and mobile code downloaded and executed on individual
policy for the usage of mobile code technologies. ISA-62443-4-2:
x FSA-EDR 2.4A Mobile code - control execution device or from being executed on the device. Record one No 1, 2, 3, 4 workstations. Control procedures should prevent the development, acquisition
The security policy shall allow, at a minimum, for EDR 2.4(a)
of: or introduction of unacceptable mobile code within the control system in which
each mobile code technology used on the
a. Met the component resides. For example, mobile code exchanges may be
embedded device, action to control execution of
b. Not met disallowed directly within the control system, but may be allowed in a controlled
mobile code.
adjacent environment maintained by IACS personnel.
If the embedded device does not use mobile code
technologies, record:
c. Not relevant
In the event that an embedded device utilizes If the embedded device uses mobile code technologies,
mobile code technologies, the embedded device review component documentation and verify that there is
shall provide the capability to enforce a security a mechanism to control, for each mobile code technology,
policy for the usage of mobile code technologies. which users (human, software process, or device) are
ISA-62443-4-2:
x FSA-EDR 2.4.B Mobile code - control upload by user The security policy shall allow, at a minimum, for allowed to upload mobile code to the device. Record one No 1, 2, 3, 4 See FSA-EDR 2.4A
EDR 2.4(b)
each mobile code technology used on the of:
embedded device, action to control which users a. Met
(human, software process, or device) are b. Not met
allowed to upload mobile code to the device.
If the embedded device does not use mobile code
technologies, record:
c. Not relevant
Mobile code technologies include, but are not limited to, Java, JavaScript,
In the event that a host device utilizes mobile ActiveX, PDF, Postscript, Shockwave movies, Flash animations and VBScript.
code technologies, the host device shall provide Usage restrictions apply to both the selection and use of mobile code installed
the capability to enforce a security policy for the on servers and mobile code downloaded and executed on individual
ISA-62443-4-2:
x FSA-HDR 2.4A Mobile code - control execution usage of mobile code technologies. The security Future entry Future entry 1, 2, 3, 4 workstations. Control procedures should prevent the development, acquisition
HDR 2.4(a)
policy shall allow, at a minimum, for each mobile or introduction of unacceptable mobile code within the control system in which
code technology used on the host device, action the host device resides. For example, mobile code exchanges may be
to control execution of mobile code. disallowed directly with the control system, but may be allowed in a controlled
adjacent environment maintained by IACS personnel.
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 19 of 42
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Mobile code technologies include, but are not limited to, Java, JavaScript,
ActiveX, PDF, Postscript, Shockwave movies, Flash animations and VBScript.
Usage restrictions apply to both the selection and use of mobile code installed
In the event that a network device utilizes mobile on servers and mobile code downloaded and executed on individual
code technologies, the network device shall workstations. Control procedures should prevent the development, acquisition
provide the capability to enforce a security policy or introduction of unacceptable mobile code within the control system in which
for the usage of mobile code technologies. The ISA-62443-4-2: the component resides. For example, mobile code exchanges may be
x FSA-NDR 2.4A Mobile code - control execution Future entry Future entry 1, 2, 3, 4
security policy shall allow, at a minimum, for NDR 2.4(a) disallowed directly within the control system, but may be allowed in a controlled
each mobile code technology used on the adjacent environment maintained by IACS personnel.
network device, action to control execution of Mobile code could be secured by adding integrity, authenticity, and
mobile code. authorization checks to the code itself (application layer), or for “just-in-time”
code execution through transmitting the mobile code via a secure
communications tunnel which provides these attributes, or any mechanism
equivalent to these options.
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 20 of 42
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 21 of 42
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Audit generation typically occurs at the source of the event. Audit processing
involves transmission, possible augmentation (such as, the addition of a
Verify via design documentation that software or hardware timestamp) and persistent storage of the audit records. Audit processing failures
errors related to audit processing, or failures in the audit include, for example, software or hardware errors, failures in the audit capturing
Components shall provide the capability to capturing mechanisms, do not cause loss of essential mechanisms and audit storage capacity being reached or exceeded. Guidelines
Response to audit processing protect against the loss of essential services and functions of the component. Record: ISA-62443-4-2: to be considered when designing appropriate response actions may include the
x x x x FSA-CR 2.10A No 1, 2, 3, 4
failures - maintain essential functions functions in the event of an audit processing a. Met CR 2.10(a) NIST SP 800-92, Guide to Computer Security Log Management [26]. It should
failure. b. Not met be noted that either overwriting the oldest audit records or halting audit log
Note that validation for FSA-CR 2.9B separately validates generation are possible responses to audit storage capacity being exceeded but
another aspect this requirement. imply the loss of potentially essential forensic information. Also alerting
personnel could be an appropriate supporting action in response to an audit
processing failure.
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 22 of 42
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
If the component provides such a human user interface, Examples of particular actions taken by a user include performing operator
verify component requirements documentation states that actions, changing control system configurations, creating information, sending a
all actions taken by human users, and the human user message, approving information (such as, indicating concurrence) and receiving
If a component provides a human user interface, responsible for those actions, are logged in the audit a message. Non-repudiation protects against later false claims by a user of not
the component shall provide the capability to records. Further verify that supplier test cases are mapped having taken a specific action, by an author of not having authored a particular
determine whether a given human user took a to this requirement and have passed. Record one of: document, by a sender of not having transmitted a message, by a receiver of
ISA-62443-4-2:
x x x x FSA-CR 2.12 Non-repudiation particular action. a. Met No 1, 2, 3, 4 not having received a message or by a signatory of not having signed a
CR 2.12
Control elements that are not able to support b. Not met document. Non-repudiation services can be used to determine if information
such capability shall be listed in component originated from a user, if a user took specific actions (for example, sending an
documents. If a component does not provide a such a human user email and approving a work order) or received specific information. Non-
interface, verify that the user manual for the component repudiation services are obtained by employing various techniques or
documents that the component does not have the ability mechanisms (for example, user identification and authorization, digital
to log user actions. If this can be verified, record: signatures, digital message receipts and timestamps).
a. Not relevant
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 23 of 42
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Factory diagnostic and test interface(s) are created at various locations within
the host device to assist the component’s developers and factory personnel as
they test the functional implementation, and when errors are discovered to
subsequently remove them from the component. However, these same
interfaces must be carefully protected from access by unauthorized entities to
protect the essential functionality provided by the component to the IACS.
There may be cases where the factory diagnostic and test interface(s) use
Host devices shall protect against unauthorized
Use of physical diagnostic and test ISA-62443-4-2: network communications with the device. When this is the case those
x FSA-HDR 2.13 use of the physical factory diagnostic and test Future entry Future entry 2, 3, 4
interfaces HDR 2.13 interfaces are to be subjected to all of the requirements of this document.
interface(s) (e.g. JTAG debugging).
If a diagnostic and test interface does not provide an ability to control the host
device or to access non-public information, then it will not need an
authentication mechanism. This shall be determined via a threat and risk
assessment. An example of this would be JTAG debugging, in which JTAG is
used to take control of the processor and execute arbitrary commands, versus a
JTAG boundary scan where JTAG is used to simply read information (which
may be publicly available information).
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 24 of 42
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Factory diagnostic and test interface(s) are created at various locations within
the component to assist the component’s developers and factory personnel as
they test the functional implementation, and when errors are discovered to
subsequently remove them from the component. However, these same
interfaces must be carefully protected from access by unauthorized entities to
protect the essential functionality provided by the component to the IACS.
Network devices shall protect against There may be cases where the factory diagnostic and test interface(s) use
Use of physical diagnostic and test unauthorized use of the physical factory ISA-62443-4-2: network communications with the device. When this is the case those
x FSA-NDR 2.13 Future entry Future entry 2, 3, 4
interfaces diagnostic and test interface(s) (e.g. JTAG NDR 2.13 interfaces are to be subjected to all of the requirements of this document.
debugging). Note that if a diagnostic and test interface does not provide the ability to control
the product, or to access non-public information, then it will not need an
authentication mechanism. This should be determined via a threat assessment.
An example of this would be JTAG debugging, in which JTAG is used to take
control of the processor and execute arbitrary commands, versus a JTAG
boundary scan where JTAG is used to simply read information (which may be
publicly available information).
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 25 of 42
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Many common network attacks are based on the manipulation of data in transmission, for example manipulation of
network packets. Switched or routed networks provide a greater opportunity for attackers to manipulate packets as
undetected access to these networks is generally easier and the switching and routing mechanisms themselves can also
be manipulated in order to get more access to transmitted information. Manipulation in the context of a control system
could include the change of measurement values communicated from a sensor to a receiver or the alteration of
command parameters sent from a control application to an actuator.
Depending on the context (for example transmission within a local network segment versus transmission via untrusted
networks) and the network type used in the transmission (for example transmission control protocol (TCP) / internet
protocol (IP) versus local serial links), feasible and appropriate mechanisms will vary. On a small network with direct
Examine design and user documents and
links (point-to-point), physical access protection to all nodes may be sufficient on lower SLs if the endpoints’ integrity is
determine if the component provides the
protected as well (see 7.6, CR 3.4 – Software and information integrity), while on a network distributed in areas with
capability to protect the data it transmits against
regular physical presence of staff or on a wide area network physical access is likely not enforceable. If a commercial
changes to message content. Protection
service is used to provide communication services as a commodity item rather than a fully dedicated service (for
provided shall be beyond that provided by the
Components shall provide the example a leased line versus a T1 link), it may be more difficult to obtain the necessary assurances regarding the
transport layer. An example is the use of ISA-62443-4-2:
x x x x FSA-CR 3.1 Communication integrity capability to protect integrity of No 1, 2, 3, 4 implementation of needed security controls for communication integrity (for example because of legal restrictions). When
cryptographic hashes. Record one of: CR 3.1
transmitted information. it is infeasible or impractical to meet the necessary security requirements it may be appropriate to implement either
a. Met
appropriate compensating countermeasures or explicitly accept the additional risk.
b. Not met
Industrial equipment is often subject to environmental conditions that can lead to integrity issues and/or false positive
incidents. Many times the environment contains particulates, liquids, vibration, gases, radiation, and electromagnetic
interference (EMI) that can cause conditions that affect the integrity of the communication wiring and signals. The
network infrastructure should be designed to minimize these physical/environmental effects on communication integrity.
For example, when particulate, liquids, and/or gases are an issue, it may be necessary to use a sealed registered jack 45
(RJ-45) or M12 connector instead of a commercial-grade RJ-45 connector on the wire. The cable itself may need to use
a different jacket instead to handle the particulate, liquid, and/or gas as well. In cases where vibration is an issue, M12
connectors may be necessary to prevent the spring pins on an RJ-45 connector from disconnecting during use. In cases
where radiation and/or EMI are an issue, it may be necessary to use shielded twisted pair or fiber cables to prevent any
effect on the communication signals. It may also be necessary to perform a wireless spectrum analysis in these areas if
wireless networking is planned to verify that it is a viable solution.
Unauthorized software may contain malicious code and thus be harmful to the component. If an embedded device is
able to utilize a compensating control, it need not directly support protection from malicious code. It is assumed that the
Verify that design or user documents contain IACS will be responsible for providing the required safeguards. However, for scenarios such as having a local universal
The embedded device shall evidence that the embedded device supports serial bus (USB) host access, the need for protection from malicious code should be determined by a risk assessment.
Protection from malicious provide the capability to protect protections from installation and execution of ISA-62443-4-2: Detection mechanisms should be able to detect integrity violations of application binaries and data files. Techniques may
x FSA-EDR 3.2 No 1, 2, 3, 4
code from installation and execution unauthorized software. Record one of: EDR 3.2 include, but are not limited to, binary integrity and attributes monitoring, hashing and signature techniques.
of unauthorized software. a. Met Prevention techniques may include, but are not limited to, removable media control, sandbox techniques and specific
b. Not met computing platforms mechanisms such as restricted firmware update capabilities, No Execute (NX) bit, data execution
prevention (DEP), address space layout randomization (ASLR), stack corruption detection and mandatory access
controls. See 10.4 for an associated requirement involving control system monitoring tools and techniques.
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 26 of 42
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
If a network device is able to utilize a compensating control, it need not directly support protection from malicious code.
The network device shall One such possible compensating control would be the use of network packet filtering devices to identify and remove
Protection from malicious ISA-62443-4-2:
x FSA-NDR 3.2 provide for protection from Future entry Future entry 1, 2, 3, 4 malicious code while in transit. It is assumed that the IACS will be responsible for providing the required safeguards.
code NDR 3.2
malicious code. However, for scenarios such as having a local USB host access, the need for protection from malicious code should be
evaluated.
The product supplier and/or system integrator should provide guidance on how to test the designed security controls.
Asset owners need to be aware of the possible ramifications of running these verification tests during normal operations.
Details of the execution of these verifications need to be specified with careful consideration of the requirements for
Verify component provides methods to test continuous operations (for example, scheduling or prior notification).
security functions during FAT, SAT and Examples of security verification functions include:
Components shall provide the scheduled maintenance. These security • Verification of antivirus countermeasures by European Institute for Computer Antivirus Research (EICAR) testing of the
capability to support verification functions shall include all those necessary to control system file system. Antivirus software should detect the EICAR test samples and appropriate incident handling
Security functionality ISA-62443-4-2:
x x x x FSA-CR 3.3 of the intended operation of support the security requirements specified in No 1, 2, 3, 4 procedures should be triggered.
verification CR 3.3
security functions according to the ISA-62443-4-2 standard. • Verification of the identification, authentication and use control countermeasures by attempting access with an
ISA‑62443‑3‑3 [11] SR3.3. Record one of: unauthorized account (for some functionality this could be automated).
a. Met • Verification of intrusion detection systems (IDSs) as a security control by including a rule in the IDS that triggers on
b. Not met irregular, but known non-malicious traffic. The test could then be performed by introducing traffic that triggers this rule
and the appropriate IDS monitoring and incident handling procedures.
• Confirmation that audit logging is occurring as required by security policies and procedures and has not been disabled
by an internal or external entity.
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 27 of 42
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
No validation activity for the FSA element of Rules for checking the valid syntax of input data such as set points should be in place to verify that this information has
Components shall validate the certification. not been tampered with and is compliant with the specification. Inputs passed to interpreters should be pre-screened to
syntax, length and content of prevent the content from being unintentionally interpreted as commands. Note that this is a security CR, thus it does not
any input data that is used as an This requirement is covered in the SDLPA address human error, for example supplying a legitimate integer number which is outside the expected range.
ISA-62443-4-2:
x x x x FSA-CR 3.5 Input validation industrial process control input element of certification, by the validations for No 1, 2, 3, 4 Generally accepted industry practices for input data validation include out-of-range values for a defined field type, invalid
CR 3.5
or input via external interfaces ISA-62443-4-1 requirements SVV-1 and SI-2, characters in data fields, missing or incomplete data and buffer overflow. Additional examples where invalid inputs lead
that directly impacts the action defined in the ISASecure document SDLA-312 to system security issues include SQL injection attacks, cross-site scripting or malformed packets (as commonly
of the component. as requirements SDLA-SVV-1C and SDLA-SI- generated by protocol fuzzers). Guidelines to be considered should include well-known guidelines such as the Open
2E. Web Application Security Project (OWASP) Code Review Guide [28].
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 28 of 42
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 29 of 42
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Host devices over their installed lifetime may have the need for installation of updates and upgrades. There will be
Host devices shall support the cases where host devices are supporting or executing essential functions as well. When this is the case the host device
ISA-62443-4-2:
x FSA-HDR 3.10 Support for updates ability to be updated and Future entry Future entry 1, 2, 3, 4 should have mechanisms in place to support patching and updating without impacting the essential functions of high
HDR 3.10
upgraded. availability systems (see 4.2 CSSC 1 Support of essential functions). One example for providing this capability would be
to support redundancy within the host device.
Network devices over their installed lifetime may require installation of updates and upgrades. There will be cases
Network devices shall support where network devices are supporting or executing essential functions as well. When this is the case the network device
ISA-62443-4-2:
x FSA-NDR 3.10 Support for updates the ability to be updated and Future entry Future entry 1, 2, 3, 4 should have mechanisms in place to support patching and updating without impacting the essential functions of high
NDR 3.10
upgraded. availability systems (see 4.2 CCSC 1 Support of essential functions). One example for providing this capability would be
to support redundancy within the network device.
The purpose of tamper resistance mechanisms is to prevent an attempt by an attacker to execute an unauthorized
Examine the threat model for the component to
physical action against an IACS device. Secondary to prevention, detection and response are essential should a
verify that it enumerates possible integrity and
tampering event occur.
The embedded device shall confidentiality threats to the component due to
Tamper resistance mechanisms are most effectively used in combinations to prevent access to any critical components.
provide tamper resistance and physical access. Verify for each of these
Physical tamper resistance ISA-62443-4-2: Tamper resistance consists of using specialized materials to make tampering of a device or module difficult. This can
x FSA-EDR 3.11 detection mechanisms to threats, that either they are prevented with No 2, 3, 4
and detection EDR 3.11 include such features as hardened enclosures, locks, encapsulation, or security screws. Putting in place tight airflow
protect against unauthorized physical mechanisms,or that carrying out the
paths will increase the difficulty of probing the product internals.
physical access into the device. threat creates tamper evidence. Record one of:
The purpose of tamper evidence is to ensure that visible or electronic evidence remains when a tampering event occurs.
a. Met
Many simple evidence techniques are comprised of seals and tapes to make it obvious that there has been physical
b. Not met
tampering. More sophisticated techniques include switches.
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 30 of 42
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
The purpose of tamper resistance mechanisms is to prevent an attempt by an attacker to execute an unauthorized
physical action against an IACS device. Secondary to prevention, detection and response are essential should a
Host devices shall provide the tampering event occur.
capability to support tamper Tamper resistance mechanisms are most effectively used in combinations to prevent access to any critical components.
Physical tamper resistance resistance and detection ISA-62443-4-2: Tamper resistance consists of using specialized materials to make tampering of a device or module difficult. This can
x FSA-HDR 3.11 Future entry Future entry 2, 3, 4
and detection mechanisms to protect against HDR 3.11 include such features as hardened enclosures, locks, encapsulation, or security screws. Putting in place tight airflow
unauthorized physical access paths will increase the difficulty of probing the product internals.
into the device The purpose of tamper evidence is to ensure that visible or electronic evidence remains when a tampering event occurs.
Many simple evidence techniques are comprised of seals and tapes to make it obvious that there has been physical
tampering. More sophisticated techniques include switches.
The purpose of tamper resistance mechanisms is to prevent an attempt by an attacker to execute an unauthorized
physical action against an IACS device. Secondary to prevention, detection and response are essential should a
tampering event occur.
Network devices shall provide
Tamper resistance mechanisms are most effectively used in combinations to prevent access to any critical components.
tamper resistance and detection
Physical tamper resistance ISA-62443-4-2: Tamper resistance consists of using specialized materials to make tampering of a device or module difficult. This can
x FSA-NDR 3.11 mechanisms to protect against Future entry Future entry 2, 3, 4
and detection NDR 3.11 include such features as hardened enclosures, locks, encapsulation, or security screws. Putting in place tight airflow
unauthorized physical access
paths will increase the difficulty of probing the product internals.
into the device.
The purpose of tamper evidence is to ensure that visible or electronic evidence remains when a tampering event occurs.
Many simple evidence techniques are comprised of seals and tapes to make it obvious that there has been physical
tampering. More sophisticated techniques include switches.
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 31 of 42
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
In order for a component to be able to validate the authenticity and integrity of the hardware, software, and data
provided by the product supplier, it must possess a trusted source of data to perform the validation process. This trusted
source of data is referred to as the “root of trust” for the system. This trusted source of data may be a set of
Host devices shall provide the
cryptographic hashes of “known good” software, or it may be the public portion of an asymmetric cryptographic key pair
capability to provision and
to be used in the validation of cryptographic signatures. This trusted data is often used to validate critical software,
protect the confidentiality,
Provisioning product firmware, and data prior to booting the firmware or operating system of a component, in order to validate that the
integrity, and authenticity of ISA-62443-4-2:
x FSA-HDR 3.12 supplier roots of trust - Future entry Future entry 2, 3, 4 component will boot into a “known good” state in which all security mechanisms are known to be operational and
product supplier keys and data HDR 3.12
protection uncompromised. “Root of trust” data can be protected by software or hardware implemented mechanisms to prevent
to be used as one or more
any modification of the data during normal operations of the component. Modification of product supplier root of trust
“roots of trust” at the time of
data is typically limited to the product supplier’s provisioning process, where the product supplier has a trusted process
manufacture of the device.
to perform the provisioning of the data. Instead, information to be validated against the root of trust is submitted to the
validation process through a hardware or software API which performs the validation and returns the results without
exposing the protected data.
In order for a component to be able to validate the authenticity and integrity of the hardware, software, and data
provided by the product supplier, it must possess a trusted source of data to perform the validation process. This trusted
source of data is referred to as the “root of trust” for the system. This trusted source of data may be a set of
Network devices shall provide
cryptographic hashes of “known good” software, or it may be the public portion of an asymmetric cryptographic key pair
the capability to provision and
to be used in the validation of cryptographic signatures. This trusted data is often used to validate critical software,
protect the confidentiality,
firmware, and data prior to booting the firmware or operating system of a component, in order to validate that the
integrity, and authenticity of ISA-62443-4-2:
x FSA-NDR 3.12 Future entry Future entry 2, 3, 4 component will boot into a “known good” state in which all security mechanisms are known to be operational and
product supplier keys and data NDR 3.12
uncompromised. “Root of trust” data is often protected by software or hardware implemented mechanisms to prevent
to be used as one or more
any modification of the data during normal operations of the component. Modification of product supplier root of trust
“roots of trust” at the time of
data is typically limited to the product supplier’s provisioning process, where the product supplier has a trusted process
manufacture of the device.
to perform the provisioning of the data. Instead, information to be validated against the root of trust is submitted to the
validation process through a hardware or software API which performs the validation and returns the results without
exposing the protected data.
Product suppliers have established mechanisms to ensure that the software and firmware on their components is
Examine user documentation to verify that after authentic, and the integrity of that software and firmware has not been compromised. This allows the product supplier to
an asset owner has assumed responsibility for a provide the asset owner with a “known good” state from which to operate. However, many product suppliers also
device, a process exists for the asset owner to provide mechanisms for asset owners to extend the functionality of their devices through the use of mobile code, user
create and use roots of trust for the device. programs, or other such means. In order to protect the security of the component, it is important that these extensions to
Verify in design documentation that the asset the component’s functionality also be validated to ensure that they are authorized, and that the asset owner has
owner keys amd data to be used as roots of approved of their origins.
Embedded devices shall provide trust, are handled within the device such that In order to perform these validations the component must contain data that provides a way to differentiate between valid
the capability to provision and they cannot be accessed in any manner other and invalid origins. The list of valid and invalid origins will differ from asset owner to asset owner, and it is unlikely that a
Provisioning asset owner protect the confidentiality, than by the functions in the device that require ISA-62443-4-2: product supplier will have a complete list of every possible valid origin at time of manufacture. Therefore it is important
x FSA-EDR 3.13A No 2, 3, 4
roots of trust - protection integrity, and authenticity of the usage of this information. Verify that the EDR 3.13(a) that the product supplier provide a way for the asset owner to securely provision their own “roots of trust” which provide
asset owner keys and data to be threat model analyzes threats to the the ability to distinguish between origins allowed by the asset owner’s security policy, and those that are not. The
used as “roots of trust”. confidentiality, integrity, and authenticity of the authenticity and integrity of these “roots of trust” must be protected so that malicious actors cannot add additional roots
asset owner roots of trust and that these threats of trust that grant them the ability to operate on the component.
have been mitigated. Use of a trusted store or a A root of trust can also be used as a basis communications security, such as communications integrity required by CR
trusted zone are examples of methods to meet 3.1 – Communication integrity or communications confidentiality required by CR 4.1 – Information confidentiality.
this requirement. Record one of: Requirements such as EDR 2.4 – Mobile code require the component to complete authenticity checks on mobile code
a. Met prior to the execution of mobile code. The roots of trust provided by this requirement provide the data necessary to
b. Not met validate the origin and integrity of mobile code, allowing the component to independently determine if the code is
allowed to execute.
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 32 of 42
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Product suppliers have established mechanisms to ensure that the software and firmware on their components is
authentic, and the integrity of that software and firmware has not been compromised. This allows the product supplier to
provide the asset owner with a “known good” state from which to operate. However, many product suppliers also
provide mechanisms for asset owners to extend the functionality of their devices through the use of mobile code, user
programs, or other such means. In order to protect the security of the component, it is important that these extensions to
the component’s functionality also be validated to ensure that they are authorized, and that the asset owner has
approved of their origins.
Host devices shall provide the In order to perform these validations the component must contain data that provides a way to differentiate between valid
capability to provision and and invalid origins. The list of valid and invalid origins will differ from asset owner to asset owner, and it is unlikely that a
Provisioning asset owner protect the confidentiality, ISA-62443-4-2: product supplier will have a complete list of every possible valid origin at time of manufacture. Therefore it is important
x FSA-HDR 3.13A Future entry Future entry 2, 3, 4
roots of trust - protection integrity, and authenticity of HDR 3.13(a) that the product supplier provide a way for the asset owner to securely provision their own “roots of trust” which provide
asset owner keys and data to be the ability to distinguish between origins allowed by the asset owner’s security policy, and those that are not. The
used as “roots of trust”. authenticity and integrity of these “roots of trust” must be protected so that malicious actors cannot add additional roots
of trust that grant them the ability to operate on the component.
Requirements such as HDR 2.4 – Mobile code require the component to complete authenticity checks on mobile code
prior to the execution of mobile code. The roots of trust provided by this requirement provide the data necessary to
validate the origin and integrity of mobile code, allowing the component to independently determine if the code is
allowed to execute.
A root of trust can also be used as a basis communications security, such as communications integrity required by CR
3.1 – Communication integrity or communications confidentiality required by CR 4.1 – Information confidentiality.
Product suppliers have established mechanisms to ensure that the software and firmware on their components is
authentic, and the integrity of that software and firmware has not been compromised. This allows the product supplier to
provide the asset owner with a “known good” state from which to operate. However, many product suppliers also
provide mechanisms for asset owners to extend the functionality of their devices through the use of mobile code, user
programs, or other such means. In order to protect the security of the component, it is important that these extensions to
the component’s functionality also be validated to ensure that they are authorized, and that the asset owner has
approved of their origins.
Network devices shall provide In order to perform these validations the component must contain data that provides a way to differentiate between valid
the capability to provision and and invalid origins. The list of valid and invalid origins will differ from asset owner to asset owner, and it is unlikely that a
Provisioning asset owner protect the confidentiality, ISA-62443-4-2: product supplier will have a complete list of every possible valid origin at time of manufacture. Therefore it is important
x FSA-NDR 3.13A Future entry Future entry 2, 3, 4
roots of trust - protection integrity, and authenticity of NDR 3.13(a) that the product supplier provide a way for the asset owner to securely provision their own “roots of trust” which provide
asset owner keys and data to be the ability to distinguish between origins allowed by the asset owner’s security policy, and those that are not. The
used as “roots of trust”. authenticity and integrity of these “roots of trust” must be protected so that malicious actors cannot add additional roots
of trust that grant them the ability to operate on the component.
Requirements such as NDR 2.4 – Mobile coderequire the component to complete authenticity checks on mobile code
prior to the execution of mobile code. The roots of trust provided by this requirement provide the data necessary to
validate the origin and integrity of mobile code, allowing the component to independently determine if the code is
allowed to execute.
A root of trust is used to provide communications security, such as communications integrity required by CR 3.1 –
Communication integrity or communications confidentiality required by CR 4.1 – Information confidentiality.
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 33 of 42
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Host devices shall verify the In order to make assurances to an asset owner that a component’s security functionality has not been compromised, it is
integrity of the firmware, necessary to ensure that the component’s software and firmware has not been tampered with, and that the software and
software, and configuration data ISA-62443-4-2: firmware is valid to execute on the component. Therefore the component must perform checks to validate the integrity
x FSA-HDR 3.14 Integrity of the boot process Future entry Future entry 1, 2, 3, 4
needed for component’s boot HDR 3.14 and authenticity of the component’s firmware and/or software prior to the boot process, to ensure that the component
process prior to it being used in does not boot into an insecure or invalid operating state that could damage the component or provide a path for a
the boot process. malicious actor to gain access to additional components, assets, or data.
Network devices shall verify the In order to make assurances to an asset owner that a component’s security functionality has not been compromised, it is
integrity of the firmware, necessary to ensure that the component’s software and firmware has not been tampered with, and that the software and
software, and configuration data ISA-62443-4-2: firmware is valid to execute on the component. Therefore the component must perform checks to validate the integrity
x FSA-NDR 3.14 Integrity of the boot process Future entry Future entry 1, 2, 3, 4
needed for component’s boot NDR 3.14 and authenticity of the component’s firmware and/or software prior to the boot process, to ensure that the component
process prior to it being used in does not boot into an insecure or invalid operating state that could damage the component or provide a path for a
the boot process. malicious actor to gain access to additional components, assets, or data.
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 34 of 42
CSA-311 FR 4
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Test Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Required Requirement
Level
(Yes/No)
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 35 of 42
CSA-311 FR 4
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Test Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Required Requirement
Level
(Yes/No)
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 36 of 42
CSA-311 FR 5
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Test Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Required Requirement
Level
(Yes/No)
Any connections to outside each security zone should occur through managed
A network device at a zone boundary
interfaces consisting of appropriate boundary protection devices (for example, proxies,
shall provide the capability to monitor and
gateways, routers, firewalls, unidirectional gateways, guards and encrypted tunnels)
control communications at zone ISA-62443-4-2:
x FSA-NDR 5.2 Zone boundary protection Future entry Future entry 1, 2, 3, 4 arranged in an effective architecture (for example, firewalls protecting application
boundaries to enforce the NDR 5.2
gateways residing in a DMZ). Control system boundary protections at any designated
compartmentalization defined in the risk-
alternate processing sites should provide the same levels of protection as that of the
based zones and conduits model.
primary site.
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 37 of 42
CSA-311 FR 5
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Test Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Required Requirement
Level
(Yes/No)
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 38 of 42
CSA-311 FR 6
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
The applications and devices may generate audit records about events
occurring in that application or device (see 6.10). Access to these audit
logs is necessary to support filtering audit logs, identifying and removing
information that is redundant, reviewing and reporting activity during after-
Verify that the component provides a means for the-fact investigations of security incidents. In general, audit reduction
Components shall provide the
authorized humans and/or authorized external tools to and report generation should be performed on a separate information
capability for authorized humans ISA-62443-4-2:
x x x x FSA-CR 6.1 Audit log accessibility access audit logs on a read-only basis. Record one of: No 1, 2, 3, 4 system. Manual access to the audit records (such as, screen views or
and/or tools to access audit logs on a CR 6.1
a. Met printouts) is sufficient for meeting the base requirement, but is
read-only basis.
b. Not met insufficient for higher SLs. Programmatic access is commonly used to
provide the audit log information to analysis mechanisms such as
security information and event management (SIEM). See relevant SRs in
Clauses 5, 6 and 9 regarding the creation of, protection of and access to
audit logs.
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 39 of 42
CSA-311 FR 7
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Verify that the threat model for the component identifies DoS
threats and their mitigations using a systematic analysis
Components shall provide the capability method. Verify that the supplier has test cases to show that the Components may be subjected to different forms of DoS situations.
to maintain essential functions when component maintains essential functions when subjected to ISA-62443-4-2: When these occur the component should be designed in such a
x x x x FSA-CR 7.1 Denial of service protection No 1, 2, 3, 4
operating in a degraded mode as the DoS attack. Verify that those tests have passed. Record one CR 7.1 manner that it maintains essential functions necessary for continued
result of a DoS event. of: safe operations while in a degraded mode.
a. Met
b. Not met
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 40 of 42
CSA-311 FR 7
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 41 of 42
CSA-311 FR 7
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 1.5
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 42 of 42