Isagca Quick Start Guide Final
Isagca Quick Start Guide Final
CYBERSECURITY
ALLIANCE
www.isagca.org
Quick Start Guide:
An Overview of ISA/IEC 62443 Standards
Security of Industrial Automation
and Control Systems
Executive Summary organization. Finally, the means, resources,
skills and motivation of cyber-attackers have
This document is intended to provide the reader significantly increased. The combination of
with a detailed overview of the ISA/IEC 62443 these trends has made IACS more vulnerable to
series of standards (series) and technical reports. cyberattack. Figure 1 shows some of the notable
The ISA/IEC 62443 series addresses the security cyberattacks that have impacted IACS.
of industrial automation and control systems
(IACS) throughout their lifecycle. These standards Initially, the ISA99 committee considered IT
and technical reports were initially developed for standards and practices for use in the IACS.
the industrial process sector but have since been However, it was soon found that this was not
applied to building automation, medical devices sufficient to ensure the safety, integrity, reliability
and transportation sectors. and security of an IACS. This is because the
consequences of a successful cyberattack on
There are several trends that have made an IACS are fundamentally different. While
cybersecurity an essential property of IACS, along the primary consequences of a successful
with safety, integrity and reliability. First, over cyberattack on IT systems is financial and
the last two decades, IACS technologies have privacy loss due to information disclosure, the
migrated from vendor-proprietary to commercial consequences for an IACS may additionally
off-the-shelf technologies such as Microsoft include loss of life or health, damage to the
Windows™ and TCP/IP networking. Second, the environment or loss of product integrity. There
value of data residing in the IACS for the business are several other differences between IT and
has significantly increased the interconnectivity IACS such as performance requirements,
of IACS both internal and external to the availability requirements, change management,
the time between maintenance windows and
Date Target Method
equipment lifetime. [1]
2010 Iran Uranium Enrichment Stuxnet
2013 ICS Supply Chain attack Havex The International Society of Automation (ISA) and
2015 Ukraine Power Grid BlackEnergy, KillDisk the International Electrotechnical Commission
(IEC) have joined forces to address the need to
2016 Ukraine Substation CrashOverride
improve the cybersecurity of IACS. The ISA99
2017 Global shipping company NotPetya
committee and the IEC Technical Committee 65/
2017 IoT DDos attack BrickerBot Working Group 10 develop and publish the ISA/
2017 Health care, Automotive, WannaCry IEC 62443 series. These documents describe a
many others methodical engineered approach to addressing
2017 Saudi Arabia Petrochemical TRITON/TRISIS the cybersecurity of IACS. They can be purchased
2017 Multinational Confectionary, Food NotPetya from either organization; the technical content
& Beverage Company is identical. The benefits of using a standards-
2019 Norwegian Aluminum Company LockerGaga based approach include reducing the likelihood
of a successful cyberattack, the use of a common
2021 Critical Infrastructure: Pipeline Ransomware
set of requirements among stakeholders,
2023 Asian National Power Grid Chinese malware
security throughout the lifecycle and a reduction
Table 1: Some notable cyberattacks impacting IACS in overall lifecycle cost.
Source: https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents
2
Table of Contents
Executive Summary...............................................................2
Introduction...........................................................................3
Scope and Purpose.......................................................................... 3
ISA/IEC 62443 Series of Standards Development
Introduction Organizations.................................................................................... 4
Summary of ISA/IEC 62443 Series of Standards and
This document provides an overview of the ISA/IEC
Technical Reports............................................................................. 4
62443 series and technical reports which specifies
requirements for the security of IACS. The goal of Fundamental Concepts.........................................................6
the ISA/IEC 62443 series is to improve the safety, Security Program.............................................................................. 6
reliability, integrity and security of IACS using a risk- Risk Management............................................................................. 7
based, methodical and complete process throughout Risk Assessment.......................................................................... 7
the entire lifecycle. The ISA/IEC 62443 series Zones and Conduits................................................................... 7
describes a set of common terms and requirements
Cybersecurity Requirements Specification............................. 7
that can be used by asset owners, product suppliers
Threat Modeling.......................................................................... 8
and service providers to secure their control systems
Foundational Requirements........................................................... 8
and the Equipment Under Control (EUC).
Security Levels................................................................................... 8
Scope and Purpose Maturity Model.................................................................................. 9
The scope of the ISA/IEC 62443 series is the Design Principles............................................................................... 9
security of IACS. An IACS is defined as a collection of Secure by Design........................................................................ 9
personnel, hardware, software and policies involved Reduce Attack Surface............................................................... 9
in the operation of the industrial process and that Defense in Depth........................................................................ 9
can affect or influence its safe, secure and reliable
Essential Functions..................................................................... 9
operation.
Roadmap for the ISA/IEC 62443 Series...............................10
Note that an IACS includes more than the technology
Principal Roles................................................................................. 10
that comprises a control system; it includes the
Component, System, Automation Solution and IACS............... 10
people and work processes needed to ensure the
Hierarchical View............................................................................ 11
safety, integrity, reliability and security of the control
system. Without people who are sufficiently trained, Lifecycle View................................................................................... 12
risk-appropriate technologies, countermeasures and ISA/IEC 62443 Series for Asset Owners...................................... 12
work processes throughout ISA/IEC 62443 Series for Product Suppliers.............................. 12
the security lifecycle, an IACS ISA/IEC 62443 Series for Service Providers................................ 12
could be more vulnerable Integration Service Providers.................................................. 12
to cyberattack. Maintenance Service Providers.............................................. 12
4
• Part 1-2: Master glossary of terms by an operational IACS against the
and definitions is a list of terms and requirements in the ISA/IEC 62443 series
abbreviations used throughout the series of standards
• Part 1-3: System security conformance • Part 2-3: Patch management in the
metrics describes a methodology to IACS environment provides guidance
develop quantitative metrics derived from on patch management for IACS. The
the process and technical requirements intended audience includes anyone who
in the standards has responsibility for the design and
• Part 1-4: IACS security lifecycle and implementation of a patch management
use cases provides a more detailed program
description of the underlying lifecycle for • Part 2-4: Security program
IACS security, as well as several use cases requirements for IACS service
that illustrate various applications providers specifies requirements for
IACS service providers such as system
2. Policies and procedures—Documents in this integrators or maintenance providers.
group focus on the policies and procedures This standard was developed by IEC
associated with IACS security. TC65/WG10
• Part 2-1: Establishing an IACS security • Part 2-5: Implementation guidance for
program describes what is required to IACS asset owners provides guidance on
define and implement an effective IACS what is required to operate an effective
cybersecurity management system. The IACS cybersecurity program. The intended
intended audience includes asset owners audience includes asset owners who have
who have responsibility for the design responsibility for the operation of such a
and implementation of such a program program
• Part 2-2: IACS security program ratings
provides a methodology for evaluating 3. System Requirements—The documents in
the level of protection provided the third group address requirements at the
system level.
4. Component Requirements—The fourth and Finally, the publication date is shown for each
final group includes documents that provide document as of the publication date of this
information about the more specific and document. ISA/IEC standards are on a five-
detailed requirements associated with the year update cycle, so many of the published
development of IACS products. documents are currently in revision.
• Part 4-1: Product security
development lifecycle requirements
describes the requirements for a product Fundamental Concepts
developer’s Security Development
Security Program
Part 2-1 specifies asset owner security program
Part Type Title Date
Overview
The security program for the IACS must be • business and control system assets
coordinated with the overall Information Security • safety related assets
Management System (ISMS) of the organization. • temporarily connected devices
The ISMS sets the overall security governance
and policies for the organization. However, • wireless devices
as mentioned above, the IACS is significantly • devices connected via external networks
different from IT systems, so there are additional
requirements and considerations for its security Cybersecurity Requirements Specification
program. Part 3-2 also requires that required security
countermeasures from the risk assessment as
Risk Management well as security requirements based on company
Risk Assessment
Part 3-2 describes the requirements Start
for addressing the cybersecurity risks
in an IACS, including the use of zones Initial system architecture Updated system architecture
and conduits, and security levels. While diagrams and inventory, ZCR 1 – Identify the diagrams and inventory with
company policies, system under IACS external services and
Part 3-2 includes the requirements for regulations, tolerable risk consideration support identified
guidelines, etc.
the risk assessment process, it does (SUC)
Hosted
product suppliers
Network
devices devices
• Automation Solution is the realization
Independent of IACS environment of a control system at a particular facility.
It includes essential functions such as
Figure 4: Roles, Products, Automation Solution, and IACS safety functions and control functions and
10
other supporting functions such as Part 2-3
historization and engineering Patch management in
the IACS environment
Hierarchical View
Part 1-1 Part 2-1 Part 3-2 Part 2-2
Figure 5 shows the hierarchical relationships Terminology, Establishing an IACS Security risk IACS security
concepts, security program assessment for program ratings
among the ISA/IEC 62443 series of standards. and models system design
Certified System
• E – Instructor-guided online training -
Learn at your own pace when it’s convenient
ISASecure for you to complete the assignments by the
milestone deadline
• Component Security Assurance (CSA) / • M – Self-paced modular training - Learn at
ISA/IEC 62443-4-2 certifies that component your own pace at a time that is convenient
products have the capability to meet the for you
requirements in Part 4-2 and have been • V – Virtual Classroom training - covers the
developed in accordance with an SDLA same material as the classroom course, but
program. Certified component products can in a virtual setting so you can attend remotely
be embedded devices, host devices, network
devices and software applications Visit our course formats webpage for full details
about each course format.
Certified Component
ISASecure
ISAGCA.ORG 13
ISA Cybersecurity Certificates course that provides an overview of how the
ISA/IEC 62443 ISA/IEC 62443 ISA/IEC 62443 ISA/IEC 62443 ISA/IEC 62443
ISA/IEC 62443 series of standards can be
FUNDAMENTALS RISK MAINTENANCE used by the supplier to implement a SDL, and
SPECIALIST ASSESSMENT DESIGN
SPECIALIST EXPERT
to develop IACS systems and components
SPECIALIST SPECIALIST
ISAGCA.ORG 15
GLOBAL
CYBERSECURITY
ALLIANCE
©2024 International Society of Automation
16