Operational Technology Cybersecurity
Operational Technology Cybersecurity
This marking protocol is widely used around the world. It has four colors (traffic lights):
White – No Restriction
Table of Contents
Table of Table
Table 1: Relationship Between OTCC and ECC Domain 5 14
Table of Figures
Figure 1: Overlapping Scope of OTCC and ECC 10
Figure 2: Main Domain and Subdomain Relationship between OTCC and ECC 11
Figure 3: Main Domains and Subdomains of OTCC 13
Figure 4. Main Steps to Apply Operational Technology Cybersecurity Controls 16
The following principles were taken into account while developing the OTCC
document :
• The security requirements stated in the OTCC document are an extension to the
security requirements in the ECC controls.
• The OTCC cybersecurity controls leverage existing work that has been practiced
by other leading countries or international standards in OT/ICS fields.
• The OTCC cybersecurity controls were mapped to international documents in
order to allow organizations to make use of international practices.
• ISA/IEC 62443 Series on Security for industrial automation and control systems
(IACS), specifically:
◼ 62443-2-1, Draft 3, Edit 8 Committee Draft for Vote (Approved), Security
program requirements for IACS asset owners.
◼ 62443-3-2:2020, Security risk assessment for system design.
◼ 62443-3-3:2013, System security requirements and security levels.
Operational Technology
Cybersecurity Controls
)OTCC(
Essential
Cybersecurity
Controls (ECC)
The main domains and subdomains of ECC and OTCC are aligned in a similar
structure. Four of the five ECC main domains are in the OTCC. In addition, 20
subdomains of the ECC subdomains are OTCC subdomains with additional OT
specific contorols. (shown in light grey in Figure 2). One new subdomain was added
to the OTCC document (shown in dark blue in Figure 2). Two subdomains were
modified in the OTCC document (shown in light blue in Figure 2). Four ECC
subdomains do not have specific controls for OT/ICS environments (shown in grey in
Figure 2).
Cybersecurity
Cybersecurity in Industrial
Cybersecurity Policies and Cybersecurity Risk Control
Roles and
Procedures Management System Project
Responsibilities
Management
Cybersecurity
Governance Compliance
Periodical
with Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity Cybersecurity in Human Awareness
in Change Review and
Standards, Resources and Training
Management Audit
Law and Program
Regulations
System and Network
Identity Mobile
Asset Processing Email Security
and Access Devices
Management Facility Protection Management
Management Security
Protection
Data and
Backup and Recovery
Cybersecurity Information Cryptography Vulnerabilities Management
Management
Defense Protection
Cybersecurity
Cybersecurity Web
Event
Penetration Incident Physical Security Application
Logs and
Testing and Threat Security
Monitoring
Management
Management
Cybersecurity
Resilience Cybersecurity Resilience Aspects of Business Continuity Management (BCM)
ECC and OTCC ECC and OTCC New OTCC ECC Subdomains without
Subdomains modified Subdomains Subdomains additional OTCC
Figure 2: Relationship between OTCC and ECC Main Domains and Subdomains
Cybersecurity
Cybersecurity Policies and
Roles and Cybersecurity Risk Management
Procedures
Responsibilities
Cybersecurity
Cybersecurity
Governance Cybersecurity
in Industrial Cybersecurity Periodical Cybersecurity
Awareness
Control in Change Cybersecurity in Human
and Training
System Project Management Review and Audit Resources
Program
Management
Data and
Backup and Recovery Vulnerabilities
Cybersecurity Information Cryptography
Management Management
Defense Protection
Cybersecurity
Penetration Cybersecurity Incident and
Event Logs and
Testing Threat Management Physical Security
Monitoring
Management
Cybersecurity
Resilience Cybersecurity Resilience Aspects of Business Continuity Management (BCM)
Third-Party
Cybersecurity Third-Party Cybersecurity
The ECC Domain 5 “Industrial Control System Protection” includes controls and
sub-controls for enhancing the cybersecurity level of OT/ICS environment in general.
However, Operational Technology Cybersecurity Controls (OTCC-1:2022) specifies
more detailed controls to increase the protection of OT/ICS systems.
Table (1) below illustrates the relationship between the cybersecurity controls stated in
ECC domain 5 and the cybersecuirty controls stated in the OTCC document.
Overview
This section provides a thorough process on how organizations assign appropriate
levels to different facilities within their OT/ICS environment. Assigning the
appropriate facility level must be based on the defined criteria to ensure appropriate
controls are assigned to appropriate facilities.
• Level 3 (L3): The criticality level of the facility is low and have moderate adverse
effects, consequences, and/or impacts to operations, assets, resources, or Health,
Safety, and Environment (HSE) of the organization.
Each organization utilizes the Facility Level Identification Tool (OTCC-1:2022) when
they identify the criticality level for their facilities based on the following criteria:
1. Negative impact to onsite and/or offsite population.
2. Negative environmental impact onsite and/or offsite areas.
3. Negative impact on national security.
4. Negative impact on the Kingdom’s reputation and public image.
5. Unauthorized disclosure of data that is classified as Secret or Top Secret.
6. Disruption to the national economy.
7. Negative impact to a large number of beneficiaries.
8. National infrastructure interdependencies.
9. Facility interdependencies.
If an organizations owns industrial control systems with different criticality levels
within the same facility, the criticality level of the facility will be based on the system
with the highest criticality level.
1 Cybersecurity Governance
1-3-1-2 ORG 2.1, ZCR 5.1, - ID.RA-4 RA-3, ISBR 5 002-R1, TVM-1d,
ORG 2.4, ZCR 5.3, SA-11 (2), 008-R1 TVM-1g,
AVAIL 1.2, ZCR 5.4, SA-15 (4), RM-2e,
AVAIL 1.2, ZCR 5.5, PM-16, RM-1c
NET 1.5 ZCR 5.7,
ZCR 5.10,
ZCR 5.11,
ZCR 5.13,
ZCR 6.1,
ZCR 6.6
1-3-1-3 ORG 2.1 ZCR 5.13 - ID.RA-6 RA-3 ISBR 2 - -
1-3-1-4 ORG 2.1 ZCR 5.13 - ID.GV-4 - - - RM-2a,
RM-1c
1-3-1-5 COMP 3.5 - - PR.IP-3 - ISBR 10 003-R1, COMP 3.5
003-R2,
010-R1,
010-R2
1-3-1-6 - - - - PL-8, PL-2 ISBR 6 - CPM-3b,
1-3-1-7 - - - - PL-8, PL-2 ISBR 6 - CPM-3b,
رقم الضابط DOE C2M2 NERC CIP NOG 104 NIST NIST CSF 62443-3-3 62443-3-2 62443-2-1
SP800-
53/82
PR.AT-1,
004-R1, WM-3a,
1-8-1 ORG 1.4 - - PR.AT-2, PR.AT-1 ISBR 5
004-R2 WM-3d
PR.AT-5
1-8-2
PR.AT-2, 004-R1,
1-8-2-1 ORG 1.5 - - PR-AT-3 ISBR 5 WM-3i
PR.AT-5 004-R2
PR.AT-2, 004-R1,
1-8-2-2 ORG 1.5 - - PR-AT-3 ISBR 5 WM-3i
PR.AT-5 004-R2
2 Cybersecurity Defense
2-3-1-1 COMP 1.1, - SR 3.2, SR DE.CM-4 SI-3 ISBR 13 007-R3, SA-2b, SA-
COMP 2.2 5.2 007-R4, 2e, SA-2j
010-R1,
010-R2
2-3-1-2 COMP 1.1, - - PR.PT-3 CM-6, ISBR 6 007-R2 TVM-2c
USER 1.5, CM-7
COMP 3
2-3-1-3 COMP 1.1, - - PR.PT-3 CM-6, ISBR 6 007-R2 TVM-2c
USER 1.5, CM-7
COMP 3
2-3-1-4 - - SR 7.7 PR.IP-1 CM-7 - - -
2-3-1-5 DATA 1.3 - SR 5.2 - AU-5 (4), - 010-R1, -
RE(3) CP-12 010-R2
2-3-1-6 - - SR 7.7 PR.IP-1 CM-7 - - -
SR 3.2
2-3-1-7 NET 1.3, ZCR 3.1, SR 5.1 PR.IP-3, SA-17 (7) ISBR 6 005-R1, SA-4a,
COMP 1.1, ZCR 3.3 RE(3), SR PR.AC-4 010-R1, IAM-2d,
COMP 3.3, 2.1 RE(1) 010-R2
EVENT 1.1,
EVENT 1.5
2-3-1-8 COMP 1.2, - SR 3.2 PR.PT-2, MA-3 (2), ISBR 13 004-R2, IAM-1a,
COMP 2.1 RE(1) DE.CM-4 MP (all) 007-R1, IAM-2a
007-R3,
007-R4,
010-R4
2-3-1-9 COMP 1.2, - SR 3.2 PR.PT-2, MA-3 (2), ISBR 13 004-R2, IAM-1a,
COMP 2.1 RE(1) DE.CM-4 MP (all) 007-R1, IAM-2a
007-R3,
007-R4,
010-R4
2-3-1-10 - - SR 2.8, PR.PT-1 AU-1* - 001-R4 -
SR 2.9, SR 002-R4
2.10, SR 003-R4
2.11, SR
2.12
2-3-1-11 ORG 2.2 - SR 2.8 DE.CM-4 CA-7 ISBR 13 007-R4 SA-2d
2-3-1-12 ORG 2.2 - SR 2.8 DE.AE-7 CA-7 ISBR 13 007-R4 SA-2b
2-3-1-13 EVENT 1.7 - SR 2.8 DE.AE-3 AU-6 (4) ISBR 2 007-R4 SA-1c,
RE(1) SA-1e
2-3-2 COMP 1.1, - SR 3.2, SR DE.CM-4 SI-3 ISBR 13 007-R3, SA-2b, SA-
COMP 2.2 5.2 007-R4, 2e, SA-2j
010-R1,
010-R2
2-4-1-1 NET 1.1 - SR 5.1 PR.AC-5, AC-17, ISBR 4 005-R1, SA-2b, SA-
(all), SR PR.PT-4 SC-7 006-R1 2e, SA-2j
5.2 (all)
2-4-1-2 NET 1.1, ZCR 3.2 SR 5.1 PR.AC-5, SC-7 ISBR 4 005-R1, CPM-3
NET 1.3 (all), SR PR.PT-4 006-R1 (all)
5.2 (all)
2-4-1-3 NET 1.3 ZCR 3.3 SR 5.1 PR.AC-5, SC-7 ISBR 4 002-R1, CPM-3
(all), SR PR.PT-4 005-R1, (all)
5.2 (all) 006-R1
2-4-1-4 NET 2 ZCR 3.5 SR 5.1 PR.AC-5, AC-18 ISBR 4 - CPM-3
(ALL) (all), SR PR.PT-4 (all), SI-4 (all)
5.2 (all) (14)
2-4-1-5 NET 2.2, ZCR 3.5 SR 1.6, SR PR.AC-5, AC-18 (all) ISBR 4 - CPM-3
NET 1.6 5.1 (all), PR.PT-4 (all)
SR 5.2
(all)
2-4-1-6 NET 1.7 ZCR 3.6 SR 1.6, SR PR.AC-5 MA-4 (4), ISBR 4 005-R1, CPM-3
5.1 (all), SC-7 (5) 007-R1 (all)
SR 5.2
(all)
2-4-1-7 USER 1.16 - SR 2.5, SR - AC-11, AC- - 003-R1, CPM-3
2.6 12, SI-14 005-R1, (all)
005-R2
2-4-1-8 NET 3 - SR 5.1 PR.AC-3, MA-4 (4), ISBR 4 005-R1 -
(ALL) (all), SR PR.AC-5, SC-7
5.2 (all) PR.PT-4
2-4-1-9 NET 3 ZCR 3.2 SR 1.6, SR PR.AC-3, MA-4 (4), ISBR 4 005-R2 CPM-3
(ALL) 5.1 (all), PR.AC-5, SC-7, SC-7 (all)
SR 5.2 PR.PT-4 (8)
(all)
2-4-1-10 NET 3 ZCR 3.2 SR 1.6, SR PR.AC-3, MA-4 (4), ISBR 4 005-R2 CPM-3
(ALL) 5.1 (all), PR.AC-5, SC-7, SC-7 (all)
SR 5.2 PR.PT-4 (8)
(all)
2-4-1-11 NET 3 ZCR 3.2 SR 1.6, SR PR.AC-3, MA-4 (4), ISBR 4 005-R2 CPM-3
(ALL) 5.1 (all), PR.AC-5, SC-7, SC-7 (all)
SR 5.2 PR.PT-4 (8)
(all)
2-4-1-12 NET 3 ZCR 3.2 SR 1.6, SR PR.AC-3, MA-4 (4), ISBR 4 005-R2 CPM-3
(ALL) 5.1 (all), PR.AC-5, SC-7, SC-7 (all)
SR 5.2 PR.PT-4 (8)
(all)
2-4-1-13 NET 3 - SR 5.1 PR.AC-3, MA-4 (4), ISBR 4 005-R1 CPM-3
(ALL) (all), SR PR.AC-5, SC-7 (all)
5.2 (all) PR.PT-4
2-4-1-14 NET 3 - SR 5.1 PR.AC-3, MA-4 (4), ISBR 4 005-R1 CPM-3
(ALL) (all), SR PR.AC-5, SC-7 (all)
5.2 (all) PR.PT-4
2-4-1-15 NET 1.2 ZCR 6.3 - ID.AM-3, CA-9, SI-4, ISBR 11 005-R1 CPM-3
DE.AE-1 CA-3 (all)
2-4-1-16 NET 1.2 ZCR 6.3 - ID.AM-3, CA-9, SI-4, ISBR 11 005-R1 CPM-3
DE.AE-1 CA-3 (all)
2-4-2 NET 1.1 - SR 5.1 PR.AC-5, AC-17, ISBR 4 005-R1, CPM-3
(all), SR PR.PT-4 SC-7 006-R1 (all)
5.2 (all)
2-7 Cryptography
Standards
OTCC
DOE C2M2 NERC CIP NOG 104 NIST NIST CSF 62443-3-3 62443-3-2 62443-2-1
Control ID SP800-
53/82
2-9-1-1 ORG 2.2, ZCR 5.13 - ID.RA-1, RA-3, RA-5 ISBR 6, 010-R3 TVM-2 (all)
EVENT 1.9 PR.IP-12 ISBR 10,
ISBR 12
2-9-1-2 EVENT 1.9 ZCR 5.13 SR 3.3 PR.IP-12 CA-5 ISBR 13 010-R3 TVM-2f
2-9-1-3 ORG 2.1 - - - RA-5 - 003-R1, -
010-R3
2-9-2 EVENT 1.9 ZCR 5.13 SR 3.3 PR.IP-12 CA-5 ISBR 13 010-R3 TVM-2f
2-11-1
2-12-1-1 EVENT 1.8 - - RS.RP (all) IR-1, IR-8 ISBR 16 008-R1, IR-3f
008-R2,
008-R3
2-12-1-2 EVENT 1.7 - - RS.AN-2, IR-4 ISBR 16 008-R3 IR-3h
RS.AN-3
2-12-1-3 EVENT 1.8, - - RS.RP (all) IR-4, IR-1 ISBR 15 009-R1, IR-4b
AVAIL 2.5 009-R2,
009-R3
2-12-1-4 EVENT 1.8 - - RS.CO (all) IR-8 ISBR 16 008-R1, IR-3c
009-R1
2-12-1-5 - - - - - - 008-R1, IR-4c
008-R2,
008-R3
2-12-1-6 ORG 2.3 - - PR.IP-2 CM-9, - - EDM-2e,
SA-3, SA-4 CPM-2f,
(3), SA-8, CPM-4b
SA-15
2-12-1-7 - - SR 3.3 PR.IP-10 IR-3 - - -
2-12-1-8 - ZCR 5.1, - ID.RA-2 SA-12 (8) ISBR 5, - TVM-1a,
ZCR 6.6 ISBR 13 TVM-1e,
TVM-1f,
TVM-1j
2-12-2 EVENT 1.8 - - RS.RP (all) IR-1, IR-8 ISBR 16 008-R1, TVM-1a,
008-R2, TVM-1e,
008-R3 TVM-1f,
TVM-1j
2-13-2 - - - - PE-1 - - -
3 Cybersecurity Resilience
4 Third-Party Cybersecurity