CSA-311 Functional Security Assessment For Components (v2 - 4)
CSA-311 Functional Security Assessment For Components (v2 - 4)
Version 2.3
December 2022
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved
CSA-311 Terms of Use
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
A. DISCLAIMER
ASCI and all related entities, including the International Society of Automation (collectively, “ASCI”) provide all materials, work products and,
information (‘SPECIFICATION’) AS IS, WITHOUT WARRANTY AND WITH ALL FAULTS, and hereby disclaim all warranties and conditions, whether
express, implied or statutory, including, but not limited to, any (if any) implied warranties, duties or conditions of merchantability, of fitness for a
particular purpose, of reliability or availability, of accuracy or completeness of responses, of results, of workmanlike effort, of lack of viruses, and of lack
of negligence, all with regard to the SPECIFICATION, and the provision of or failure to provide support or other services, information, software, and
related content through the SPECIFICATION or otherwise arising out of the use of the SPECIFICATION. Also, there is no warranty or condition of title,
quiet enjoyment, quiet possession, correspondence to description, or non-infringement with regard to the SPECIFICATION.
Without limiting the foregoing, ASCI disclaims all liability for harm to persons or property, and users of this SPECIFICATION assume all risks of such
harm.
In issuing and making the SPECIFICATION available, ASCI is not undertaking to render professional or other services for or on behalf of any person or
entity, nor is ASCI undertaking to perform any duty owed by any person or entity to someone else. Anyone using this SPECIFICATION should rely on
his or her own independent judgment or, as appropriate, seek the advice of a competent professional in determining the exercise of reasonable care in
any given circumstances.
To the maximum extent permitted by applicable law, in no event shall ASCI or its suppliers be liable for any special, incidental, punitive, indirect, or
consequential damages whatsoever (including, but not limited to, damages for loss of profits or confidential or other information, for business
interruption, for personal injury, for loss of privacy, for failure to meet any duty including of good faith or of reasonable care, for negligence, and for any
other pecuniary or other loss whatsoever) arising out of or in any way related to the use of or inability to use the SPECIFICATION, the provision of or
failure to provide support or other services, information, software, and related content through the SPECIFICATION or otherwise arising out of the use
of the SPECIFICATION, or otherwise under or in connection with any provision of this SPECIFICATION, even in the event of the fault, tort (including
negligence), misrepresentation, strict liability, breach of contract of ASCI or any supplier, and even if ASCI or any supplier has been advised of the
possibility of such damages.
Except as expressly authorized by prior written consent from the Automation Standards Compliance Institute, no material from this document owned,
licensed, or controlled by the Automation Standards Compliance Institute may be copied, reproduced, republished, uploaded, posted, transmitted, or
distributed in any way, except for non-commercial use only, provided that you keep intact all copyright and other proprietary notices. Modification of the
materials or use of the materials for any other purpose, such as creating derivative works for commercial use, is a violation of the Automation
Standards Compliance Institute’s copyright and other proprietary rights.
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 2 of 53
CSA-311 Revision history - CSA
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 3 of 53
CSA-311 Overview - CSA
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Summary of Worksheets:
Overview Overview - this worksheet providing summary information about each worksheet
Tree Tree Structure - hierarchical summary of all requirements organized by the 7 Foundational Requirements
CCSC Common component security constraints - detailed requirements for common component security constraints
FR 1 Identification & authentication control - detailed requirements for 1st Foundational Requirement
FR 2 Use control - detailed requirements for 2nd Foundational Requirement
FR 3 System integrity - detailed requirements for 3rd Foundational Requirement
FR 4 Data confidentiality - detailed requirements for 4th Foundational Requirement
FR 5 Restricted data flow - detailed requirements for 5th Foundational Requirement
FR 6 Timely response to events - detailed requirements for 6th Foundational Requirement
FR 7 Resource availability - detailed requirements for 7th Foundational Requirement
Embedded Device
Network Device
Host Device
Validation by
Validation Source of Capability Security
Requirement ID Reference Name Requirement Description Independent Test Rationale and Supplemental Guidance
Activity Requirement Level
Required (Yes/No)
Normative references - The following pairs of references provide the same technical standard, as published by the organizations ANSI/ISA and IEC.
ANSI/ISA-62443-4-2-2018 Security for industrial automation and control systems Part 4-2: Technical security requirements for IACS components
IEC 62443-4-2:2019 Security for industrial automation and control systems Part 4-2: Technical security requirements for IACS components
ANSI/ISA-62443-4-1-2018 Security for industrial automation and control systems Part 4-1: Secure product development lifecycle requirements
IEC 62443-4-1:2018 Security for industrial automation and control systems Part 4-1: Secure product development lifecycle requirements
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 4 of 53
CSA-311 Tree - CSA
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device
Capability
Section Requirement ID and Reference Name
Security Level
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 5 of 53
CSA-311 Tree - CSA
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device
Capability
Section Requirement ID and Reference Name
Security Level
x x x x FSA-CR 1.9E Strength of public key-based authentication - map authenticated identity to a user 2, 3, 4
x x x x FSA-CR 1.9F Strength of public key-based authentication - use of cryptography 2, 3, 4
x x x x FSA-CR 1.9 RE(1) Hardware security for public key-based authentication 3, 4
x x x x FSA-CR 1.10 Authenticator feedback 1, 2, 3, 4
x x x x FSA-CR 1.11A Unsuccessful login attempts - limit number 1, 2, 3, 4
x x x x FSA-CR 1.11B Unsuccessful login attempts - response 1, 2, 3, 4
x x x x FSA-CR 1.12 System use notification 1, 2, 3, 4
x FSA-NDR 1.13 Access via untrusted networks 1, 2, 3, 4
x FSA-NDR 1.13 RE(1) Explicit access request approval 3, 4
x x x x FSA-CR 1.14A Strength of symmetric key-based authentication - establish trust 2, 3, 4
x x x x FSA-CR 1.14B Strength of symmetric key-based authentication - secure storage for shared secret 2, 3, 4
x x x x FSA-CR 1.14C Strength of symmetric key-based authentication - restrict access to shared secret 2, 3, 4
x x x x FSA-CR 1.14D Strength of symmetric key-based authentication - use of cryptography 2, 3, 4
x x x x FSA-CR 1.14 RE(1) Hardware security for symmetric key-based authentication 3, 4
FR 2 - Use Control
x x x x FSA-CR 2.1 Authorization enforcement 1, 2, 3, 4
x x x x FSA-CR 2.1 RE(1) Authorization enforcement for all users (humans, software processes and devices) 2, 3, 4
x x x x FSA-CR 2.1 RE(2) Permission mapping to roles 2, 3, 4
x x x x FSA-CR 2.1 RE(3) Supervisor override 3, 4
x x x x FSA-CR 2.1 RE(4) Dual approval 4
x x x x FSA-CR 2.2 Wireless use control 1, 2, 3, 4
FSA-CR 2.3 Use control for portable and mobile devices NA
x FSA-SAR 2.4A Mobile code - control execution 1, 2, 3, 4
x FSA-SAR 2.4B Mobile code - control transfer by user 1, 2, 3, 4
x FSA-SAR 2.4C Mobile code - integrity check 1, 2, 3, 4
x FSA-SAR 2.4 RE(1) Mobile code authenticity check 2, 3, 4
x FSA-EDR 2.4A Mobile code - control execution 1, 2, 3, 4
x FSA-EDR 2.4B Mobile code - control upload by user 1, 2, 3, 4
x FSA-EDR 2.4C Mobile code - integrity check 1, 2, 3, 4
x FSA-EDR 2.4 RE(1) Mobile code authenticity check 2, 3, 4
x FSA-HDR 2.4A Mobile code - control execution 1, 2, 3, 4
x FSA-HDR 2.4B Mobile code - control upload by user 1, 2, 3, 4
x FSA-HDR 2.4C Mobile code - integrity check 1, 2, 3, 4
x FSA-HDR 2.4 RE(1) Mobile code authenticity check 2, 3, 4
x FSA-NDR 2.4A Mobile code - control execution 1, 2, 3, 4
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 6 of 53
CSA-311 Tree - CSA
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device
Capability
Section Requirement ID and Reference Name
Security Level
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 7 of 53
CSA-311 Tree - CSA
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device
Capability
Section Requirement ID and Reference Name
Security Level
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 8 of 53
CSA-311 Tree - CSA
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device
Capability
Section Requirement ID and Reference Name
Security Level
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 9 of 53
CSA-311 CCSC
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Embedded Device
Software Application
Network Device
Host Device Validation by
Rationale and
Independent Source of Capability
Requirement ID Reference Name Requirement Description Validation Activity Supplemental
Test Required Requirement Security Level
Guidance
(Yes/No)
Verify that the supplier has performed and documented analysis and testing
Access Controls (IAC and UC) shall not prevent the operation of to confirm that verifying and recording operator actions to enforce non-
essential functions, specifically: repudiation does not add significant delay to system response time (see
IEC 62443-4-2:
x x x x FSA-CCSC 1B Support of essential functions - non-repudiation - Verifying and recording operator actions to enforce non-repudiation FSA-CR 2.12 – Non-repudiation). Record one of: No 1, 2, 3, 4
CCSC 1
shall not add significant delay to system response time (see 6.14, SR a. Met
2.12 – Non-repudiation). b. Not met
c. Not relevant - no essential functions
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 10 of 53
CSA-311 CCSC
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Embedded Device
Software Application
Network Device
Host Device Validation by
Rationale and
Independent Source of Capability
Requirement ID Reference Name Requirement Description Validation Activity Supplemental
Test Required Requirement Security Level
Guidance
(Yes/No)
Essential functions of an IACS shall be maintained if zone boundary There is no component level requirement associated with this requirement
IEC 62443-4-2:
FSA-CCSC 1G Support of essential functions - zone isolation protection goes into fail-close and/or island mode (see 9.4, SR 5.2 – in IEC 62443-3-3, therefore there is no validation activity. 1, 2, 3, 4
CCSC 1
Zone boundary protection).
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 11 of 53
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 12 of 53
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 13 of 53
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
In addition to an identifier (see 5.6) an authenticator is required to prove identity. Control system authenticators include, but are not limited
to, tokens, symmetric keys, private keys (part of a public/private key pair), biometrics, passwords, physical keys and key cards. There
should be security policies in place instructing that human users must take reasonable measures to safeguard authenticators, including
maintaining possession of their individual authenticators, not loaning or sharing authenticators with others and reporting lost or
compromised authenticators immediately.
Authenticators have a lifecycle. When an account is created automatically a new authenticator needs to be created, in order for the
account owner to be able to authenticate. For example, in a password-based system, the account has a password associated with it.
Definition of the initial authenticator content could be interpreted as the administrator defining the initial password that the account
If component provides the capability to management system sets for all new accounts. Being able to configure these initial values makes it harder for an attacker to guess the
identify and authenticate users of any type password between account creation and first account use (which should involve the setting of a new password by the account owner).
(humans, software processes or devices), Some control systems are installed with unattended installers that create all necessary accounts with default passwords and some
either directly or by integration into a embedded devices are shipped with default passwords. Over time, these passwords often become general knowledge and are
system, verify user documents indicate documented on the Internet. Being able to change the default passwords protects the system against unauthorized users using default
ability to define initial authenticator content. passwords to gain access. Passwords can be obtained from storage or from transmission when used in network authentication. The
Components shall provide the capability
Authenticator management - Record one of: IEC 62443-4-2: complexity of this can be increased by cryptographic protections such as encryption or hashing or by handshake protocols that do not
x x x x FSA-CR 1.5A to support the use of initial authenticator No 1, 2, 3, 4
initialize authenticator content a. Met CR 1.5(a) require transmission of the password at all. Still, passwords might be subject to attacks, for example, brute force guessing or breaking the
content.
b. Not met cryptographic protection of passwords in transit or storage. The window of opportunity can be reduced by changing/refreshing the
If component does not provide the passwords periodically. Similar considerations apply to authentication systems based on cryptographic keys. Enhanced protection can be
capability to identify and authenticate users achieved by using hardware mechanisms such as hardware security modules like trusted platform modules (TPMs).
of any type as described above, record: The management of authenticators should be specified in applicable security policies and procedures, for example, constraints to change
c. Not relevant default authenticators, refresh periods, specification of the protection of authenticators or firewall procedures.
Besides the capabilities for authenticator management specified in this requirement, the strength of the authentication mechanism
depends on the strength of the chosen authenticator (for example, password complexity or key length in public key authentication) and the
policies for validating the authenticator in the authentication process (for example, how long a password is valid or which checks are
performed in public key certificate validation). For the most common authentication mechanisms, password-based and public key
authentication, 5.9, 5.10 and 5.11 provide further requirements.
Use of components for some operations may be restricted, requiring additional authentication (such as, tokens, keys and certificates) in
order to perform some functions.
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 14 of 53
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 15 of 53
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 16 of 53
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Review user documentation and determine To meet the requirements in 5.11.1 does not necessarily require a real time connection to a certificate authority. Alternative out-of-band
if public key authentication is used. methods may be used to meet the requirements in 5.11.1. For example, a disconnected system could install and update certifications
using manual out-of-band processes.
If public key authentication is used, verify in Public/private key cryptography strongly depends on the secrecy of a given subject’s private key and proper handling of the trust
user documentation that signature validity relationships. When verifying a trust between two entities based on public key authentication, it is essential to trace the public key
can be determined, either directly or by certificate to a trusted entity. A common implementation error in certificate validation is to only check the validity of a certificate’s signature,
integration into a system, without but not checking the trust in the signer. In a PKI setting, a signer is trusted if they are a trusted CA or have a certificate issued by a trusted
communicating outside the same IACS CA, thus all verifiers need to trace certificates presented to them back to a trusted CA. If such a chain of trusted CAs cannot be
environment, such as out to the Internet or established, the presented certificate should not be trusted.
For components that utilize public-key- to a less secure IACS zone. If self-signed certificates are used instead of a PKI, the certificate subject itself signed its certificate, thus there never is a trusted third-
based authentication, those party or CA. This should be compensated by deploying the self-signed public key certificates to all peers that need to validate them via an
components shall provide directly or If the component directly supports the otherwise secured mechanism (for example, configuration of all peers in a trusted environment). Trusted certificates need to be distributed
Strength of public key-based
integrate into a system that provides the capability, also verify with the following test IEC 62443-4-2: to peers through secure channels. During the validation process, a self-signed certificate should only be trusted if it is already present in
x x x x FSA-CR 1.9A authentication - check validity of 2, 3, 4
capability within the same IACS in an environment without an Internet Yes CR 1.9(a) the list of trusted certificates of the validating peer. The set of trusted certificates should be configured to the minimum necessary set.
signature of a given certificate
environment to validate certificates by connection. Provide a certificate with an In both cases, validation needs to also consider the possibility that a certificate is revoked. In a PKI setting this is typically done by
checking the validity of the signature of invalid signature to the component. Verify maintaining certificate revocation lists (CRLs) or running an online certificate status protocol (OCSP) server. When revocation checking is
a given certificate. that this problem is detected and reported not available due to control system constraints, mechanisms such as a short certificate lifetime can compensate for the lack of timely
to the user. Record one of: revocation information. Note that short lifetime certificates can sometimes create significant operational issues in a control system
a. Met by component environment.
b. Met by integration in system It is expected that most components will integrate into an IACS and leverage the key authentication mechanisms provided by the
c. Not met underlying IACS. When implementing public key authentication at the component-level of an IACS, protection of the key becomes a
primary concern and objective of key storage on that component. Care should be taken in the implementation to assure that any private
If public key authentication is not used, keys stored within the component cannot be retrieved or tampered with (See 5.7, CR 1.5 – Authenticator management).
record: NOTE Tamper resistant design methodologies and technologies are available to assist with designing a secure private key protection
d. Not relevant mechanism.
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 17 of 53
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 18 of 53
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 19 of 53
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 20 of 53
CSA-311 FR 1
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Means should be defined for installing the keys into the component. This may include installing and managing the component key using
Review user documentation and determine out-of-band methods. This is necessary since a compromise of any symmetric keys that are stored within the component could lead to a
if symmetric key authentication is used. full compromise of the system using those keys.
In practice, there are two basic ways to perform the secure authentication of a device to another: either using asymmetric cryptography
If symmetric key authentication is used, (see 5.11) or by using symmetric cryptography. The choice between asymmetric and symmetric is dictated by several criteria, like key
For components that utilize symmetric verify user documents indicate ability for the management, trust provisioning, legacy support and efficiency. Examples of symmetric key authentication schemes are Needham-
keys, the component shall provide the component to establish mutual trust using Schröder or Kerberos. When symmetric key authentication is used, the party uses a secret key they have learned in the past (for
Strength of symmetric key-based IEC 62443-4-2:
x x x x FSA-CR 1.14A capability to establish the mutual trust the symmetric key. Record one of: No 2, 3, 4 example, through trust provisioning). The party proves their claimed identity by proving knowledge of the secret key (for example, by
authentication - establish trust CR 1.14(a)
using the symmetric key. a. Met answering a challenge submitted by the other party, the examiner). The examiner has the knowledge of the same secret (also learned in
b. Not met the past through trust provisioning) and is able to compute the answer to the challenge performing the same cryptographic operations as
the prover. The examiner can then compare the answer of the prover with its own computation. If they match, the examiner is convinced
If symmetric key authentication is not used, that the prover is the one they claim to be and the process can be conducted the other way around, switching roles, to achieve mutual-
record: authentication. This mechanism is secure only if the shared secret is only known by the prover and the examiner and if the secret is
c. Not relevant diversified per prover. One instance of such a mechanism is the proper use of cipher-based message authentication code (CMAC)
computations or alternatively the Galois counter mode (GCM)/Galois message authentication code (GMAC) operation modes.
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 21 of 53
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 22 of 53
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 23 of 53
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
If the component supports usage through wireless Wireless use control may be implemented in different devices that make up the
interfaces, verify with user documentation that the system. Network devices may be one of the devices that assist with use control
component can integrate into a system to authorize through controls such as network admission control. For devices and
usage, monitor, and enforce usage restrictions for applications that utilize wireless networks those devices should be able to
If a component supports usage through wireless
wireless connectivity to the component per commonly properly utilize wireless network protection such as network admission control.
interfaces it shall provide the capability to
accepted security practices. Record one of: Components may also implement different limitations on access based on
integrate into the system that supports usage IEC 62443-4-2:
x x x x FSA-CR 2.2 Wireless use control a. Met No 1, 2, 3, 4 whether the access is from wireless devices or wired devices. This does place a
authorization, monitoring and restrictions CR 2.2
b. Not met need that the component be able to distinguish whether the interface is through
according to commonly accepted industry
wireless or not. Some network devices provide the capability to scan for
practices.
If the component does not support usage through wireless unauthorized wireless network activity in the wireless spectrum. In order to
interfaces, record: prevent a negative impact on the performance of the control system
c. Not relevant functionality, it is a good practice to deploy dedicated devices to perform checks
for unauthorized network activity.
Use control for portable and mobile There is no component level requirement IEC 62443-4-2:
FSA-CR 2.3 No validation activity
devices associated with IEC 62443‑3‑3 SR 2.3. CR 2.3
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 24 of 53
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
In the event that an embedded device utilizes If the embedded device uses mobile code technologies,
mobile code technologies, the embedded device review component documentation and verify that there is
shall provide the capability to enforce a security a mechanism to control, for each mobile code technology,
policy for the usage of mobile code technologies. which users (human, software process, or device) are
IEC 62443-4-2:
x FSA-EDR 2.4B Mobile code - control upload by user The security policy shall allow, at a minimum, for allowed to upload mobile code to the device. Record one No 1, 2, 3, 4 See FSA-EDR 2.4A
EDR 2.4(b)
each mobile code technology used on the of:
embedded device, action to control which users a. Met
(human, software process, or device) are b. Not met
allowed to upload mobile code to the device.
If the embedded device does not use mobile code
technologies, record:
c. Not relevant
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 25 of 53
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
In the event that a host device utilizes mobile If the host device uses mobile code technologies, review
code technologies, the host device shall provide component documentation and verify that there is a
the capability to enforce a security policy for the mechanism to control, for each mobile code technology,
usage of mobile code technologies. The security which users (human, software process, or device) are
IEC 62443-4-2:
x FSA-HDR 2.4B Mobile code - control upload by user policy shall allow, at a minimum, for each mobile allowed to upload mobile code to the host device. Record No 1, 2, 3, 4 See FSA-HDR 2.4A
HDR 2.4(b)
code technology used on the host device, action one of:
to control which users (human, software process, a. Met
or device) are allowed to upload mobile code to b. Not met
the host device.
If the host device does not use mobile code technologies,
record:
c. Not relevant
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 26 of 53
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 27 of 53
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 28 of 53
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 29 of 53
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Audit generation typically occurs at the source of the event. Audit processing
involves transmission, possible augmentation (such as, the addition of a
Verify via design documentation that software or hardware
timestamp) and persistent storage of the audit records. Audit processing failures
errors related to audit processing, or failures in the audit
include, for example, software or hardware errors, failures in the audit capturing
capturing mechanisms, do not cause loss of essential
Components shall provide the capability to mechanisms and audit storage capacity being reached or exceeded. Guidelines
functions of the component. Record:
Response to audit processing protect against the loss of essential services and IEC 62443-4-2: to be considered when designing appropriate response actions may include the
x x x x FSA-CR 2.10A a. Met No 1, 2, 3, 4
failures - maintain essential functions functions in the event of an audit processing CR 2.10(a) NIST SP 800-92, Guide to Computer Security Log Management [26]. It should
b. Not met
failure. be noted that either overwriting the oldest audit records or halting audit log
c. Not relevant - no essential functions
generation are possible responses to audit storage capacity being exceeded but
Note that validation for FSA-CR 2.9B separately validates
imply the loss of potentially essential forensic information. Also alerting
another aspect this requirement.
personnel could be an appropriate supporting action in response to an audit
processing failure.
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 30 of 53
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 31 of 53
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 32 of 53
CSA-311 FR 2
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 33 of 53
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Many common network attacks are based on the manipulation of data in transmission, for example manipulation of
network packets. Switched or routed networks provide a greater opportunity for attackers to manipulate packets as
undetected access to these networks is generally easier and the switching and routing mechanisms themselves can also
be manipulated in order to get more access to transmitted information. Manipulation in the context of a control system
could include the change of measurement values communicated from a sensor to a receiver or the alteration of
command parameters sent from a control application to an actuator.
Depending on the context (for example transmission within a local network segment versus transmission via untrusted
networks) and the network type used in the transmission (for example transmission control protocol (TCP) / internet
protocol (IP) versus local serial links), feasible and appropriate mechanisms will vary. On a small network with direct
Examine design and user documents and
links (point-to-point), physical access protection to all nodes may be sufficient on lower SLs if the endpoints’ integrity is
determine if the component provides the
protected as well (see 7.6, CR 3.4 – Software and information integrity), while on a network distributed in areas with
capability to protect the data it transmits against
regular physical presence of staff or on a wide area network physical access is likely not enforceable. If a commercial
changes to message content. Protection
service is used to provide communication services as a commodity item rather than a fully dedicated service (for
provided shall be beyond that provided by the
Components shall provide the example a leased line versus a T1 link), it may be more difficult to obtain the necessary assurances regarding the
transport layer. An example is the use of IEC 62443-4-2:
x x x x FSA-CR 3.1 Communication integrity capability to protect integrity of No 1, 2, 3, 4 implementation of needed security controls for communication integrity (for example because of legal restrictions). When
cryptographic hashes. Record one of: CR 3.1
transmitted information. it is infeasible or impractical to meet the necessary security requirements it may be appropriate to implement either
a. Met
appropriate compensating countermeasures or explicitly accept the additional risk.
b. Not met
Industrial equipment is often subject to environmental conditions that can lead to integrity issues and/or false positive
incidents. Many times the environment contains particulates, liquids, vibration, gases, radiation, and electromagnetic
interference (EMI) that can cause conditions that affect the integrity of the communication wiring and signals. The
network infrastructure should be designed to minimize these physical/environmental effects on communication integrity.
For example, when particulate, liquids, and/or gases are an issue, it may be necessary to use a sealed registered jack 45
(RJ-45) or M12 connector instead of a commercial-grade RJ-45 connector on the wire. The cable itself may need to use
a different jacket instead to handle the particulate, liquid, and/or gas as well. In cases where vibration is an issue, M12
connectors may be necessary to prevent the spring pins on an RJ-45 connector from disconnecting during use. In cases
where radiation and/or EMI are an issue, it may be necessary to use shielded twisted pair or fiber cables to prevent any
effect on the communication signals. It may also be necessary to perform a wireless spectrum analysis in these areas if
wireless networking is planned to verify that it is a viable solution.
Many common network attacks are based on the manipulation of data in transmission, for example manipulation of
network packets. Switched or routed networks provide a greater opportunity for attackers to manipulate packets as
undetected access to these networks is generally easier and the switching and routing mechanisms themselves can also
be manipulated in order to get more access to transmitted information. Manipulation in the context of a control system
could include the change of measurement values communicated from a sensor to a receiver or the alteration of
command parameters sent from a control application to an actuator.
Depending on the context (for example transmission within a local network segment versus transmission via untrusted
networks) and the network type used in the transmission (for example transmission control protocol (TCP) / internet
protocol (IP) versus local serial links), feasible and appropriate mechanisms will vary. On a small network with direct
Examine design and user documents and
links (point-to-point), physical access protection to all nodes may be sufficient on lower SLs if the endpoints’ integrity is
determine if the component provides the
protected as well (see 7.6, CR 3.4 – Software and information integrity), while on a network distributed in areas with
capability to protect the data it transmits against
regular physical presence of staff or on a wide area network physical access is likely not enforceable. If a commercial
changes to message content. Protection
service is used to provide communication services as a commodity item rather than a fully dedicated service (for
provided shall be beyond that provided by the
Components shall provide the example a leased line versus a T1 link), it may be more difficult to obtain the necessary assurances regarding the
transport layer. An example is the use of IEC 62443-4-2:
x x x x FSA-CR 3.1 (ADV) Communication integrity capability to protect integrity of No 1, 2, 3, 4 implementation of needed security controls for communication integrity (for example because of legal restrictions). When
cryptographic hashes. Record one of: CR 3.1
transmitted information. it is infeasible or impractical to meet the necessary security requirements it may be appropriate to implement either
a. Met
appropriate compensating countermeasures or explicitly accept the additional risk.
b. Not met
Industrial equipment is often subject to environmental conditions that can lead to integrity issues and/or false positive
incidents. Many times the environment contains particulates, liquids, vibration, gases, radiation, and electromagnetic
interference (EMI) that can cause conditions that affect the integrity of the communication wiring and signals. The
network infrastructure should be designed to minimize these physical/environmental effects on communication integrity.
For example, when particulate, liquids, and/or gases are an issue, it may be necessary to use a sealed registered jack 45
(RJ-45) or M12 connector instead of a commercial-grade RJ-45 connector on the wire. The cable itself may need to use
a different jacket instead to handle the particulate, liquid, and/or gas as well. In cases where vibration is an issue, M12
connectors may be necessary to prevent the spring pins on an RJ-45 connector from disconnecting during use. In cases
where radiation and/or EMI are an issue, it may be necessary to use shielded twisted pair or fiber cables to prevent any
effect on the communication signals. It may also be necessary to perform a wireless spectrum analysis in these areas if
wireless networking is planned to verify that it is a viable solution.
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 34 of 53
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Unauthorized software may contain malicious code and thus be harmful to the component. If an embedded device is
able to utilize a compensating control, it need not directly support protection from malicious code. It is assumed that the
Verify that design or user documents contain IACS will be responsible for providing the required safeguards. However, for scenarios such as having a local universal
The embedded device shall evidence that the embedded device supports serial bus (USB) host access, the need for protection from malicious code should be determined by a risk assessment.
Protection from malicious provide the capability to protect protections from installation and execution of IEC 62443-4-2: Detection mechanisms should be able to detect integrity violations of application binaries and data files. Techniques may
x FSA-EDR 3.2 No 1, 2, 3, 4
code from installation and execution unauthorized software. Record one of: EDR 3.2 include, but are not limited to, binary integrity and attributes monitoring, hashing and signature techniques.
of unauthorized software. a. Met Prevention techniques may include, but are not limited to, removable media control, sandbox techniques and specific
b. Not met computing platforms mechanisms such as restricted firmware update capabilities, No Execute (NX) bit, data execution
prevention (DEP), address space layout randomization (ASLR), stack corruption detection and mandatory access
controls. See 10.4 for an associated requirement involving control system monitoring tools and techniques.
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 35 of 53
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
The product supplier and/or system integrator should provide guidance on how to test the designed security controls.
Asset owners need to be aware of the possible ramifications of running these verification tests during normal operations.
Details of the execution of these verifications need to be specified with careful consideration of the requirements for
Verify component provides methods to test continuous operations (for example, scheduling or prior notification).
security functions during FAT, SAT and Examples of security verification functions include:
Components shall provide the scheduled maintenance. These security • Verification of antivirus countermeasures by European Institute for Computer Antivirus Research (EICAR) testing of the
capability to support verification functions shall include all those necessary to control system file system. Antivirus software should detect the EICAR test samples and appropriate incident handling
Security functionality IEC 62443-4-2:
x x x x FSA-CR 3.3 of the intended operation of support the security requirements specified in No 1, 2, 3, 4 procedures should be triggered.
verification CR 3.3
security functions according to the IEC 62443-4-2 standard. • Verification of the identification, authentication and use control countermeasures by attempting access with an
IEC 62443‑3‑3 [11] SR3.3. Record one of: unauthorized account (for some functionality this could be automated).
a. Met • Verification of intrusion detection systems (IDSs) as a security control by including a rule in the IDS that triggers on
b. Not met irregular, but known non-malicious traffic. The test could then be performed by introducing traffic that triggers this rule
and the appropriate IDS monitoring and incident handling procedures.
• Confirmation that audit logging is occurring as required by security policies and procedures and has not been disabled
by an internal or external entity.
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 36 of 53
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Rules for checking the valid syntax of input data such as set points should be in place to verify that this information has
No validation activity for the FSA element of
Components shall validate the not been tampered with and is compliant with the specification. Inputs passed to interpreters should be pre-screened to
certification.
syntax, length and content of prevent the content from being unintentionally interpreted as commands. Note that this is a security CR, thus it does not
any input data that is used as an address human error, for example supplying a legitimate integer number which is outside the expected range.
This requirement is covered in the SDA element IEC 62443-4-2:
x x x x FSA-CR 3.5 Input validation industrial process control input No 1, 2, 3, 4 Generally accepted industry practices for input data validation include out-of-range values for a defined field type, invalid
of certification, by the validations for IEC 62443- CR 3.5
or input via external interfaces characters in data fields, missing or incomplete data and buffer overflow. Additional examples where invalid inputs lead
4-1 requirements SVV-1 and SI-2, defined in the
that directly impacts the action to system security issues include SQL injection attacks, cross-site scripting or malformed packets (as commonly
ISASecure document SDLA-312 as
of the component. generated by protocol fuzzers). Guidelines to be considered should include well-known guidelines such as the Open
requirements SDLA-SVV-1C and SDLA-SI-2E.
Web Application Security Project (OWASP) Code Review Guide [28].
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 37 of 53
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 38 of 53
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 39 of 53
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
The purpose of tamper resistance mechanisms is to prevent an attempt by an attacker to execute an unauthorized
Examine the threat model for the component to
physical action against an IACS device. Secondary to prevention, detection and response are essential should a
verify that it enumerates possible integrity and
tampering event occur.
The embedded device shall confidentiality threats to the component due to
Tamper resistance mechanisms are most effectively used in combinations to prevent access to any critical components.
provide tamper resistance and physical access. Verify for each of these
Physical tamper resistance IEC 62443-4-2: Tamper resistance consists of using specialized materials to make tampering of a device or module difficult. This can
x FSA-EDR 3.11 detection mechanisms to threats, that they are deterred by physical No 2, 3, 4
and detection EDR 3.11 include such features as hardened enclosures, locks, encapsulation, or security screws. Putting in place tight airflow
protect against unauthorized mechanisms and that carrying out the threat
paths will increase the difficulty of probing the product internals.
physical access into the device. creates tamper evidence. Record one of:
The purpose of tamper evidence is to ensure that visible or electronic evidence remains when a tampering event occurs.
a. Met
Many simple evidence techniques are comprised of seals and tapes to make it obvious that there has been physical
b. Not met
tampering. More sophisticated techniques include switches.
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 40 of 53
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
The purpose of tamper resistance mechanisms is to prevent an attempt by an attacker to execute an unauthorized
Examine the threat model for the component to
physical action against an IACS device. Secondary to prevention, detection and response are essential should a
verify that it enumerates possible integrity and
tampering event occur.
Network devices shall provide confidentiality threats to the component due to
Tamper resistance mechanisms are most effectively used in combinations to prevent access to any critical components.
tamper resistance and detection physical access. Verify for each of these
Physical tamper resistance IEC 62443-4-2: Tamper resistance consists of using specialized materials to make tampering of a device or module difficult. This can
x FSA-NDR 3.11 mechanisms to protect against threats, that they are deterred by physical No 2, 3, 4
and detection NDR 3.11 include such features as hardened enclosures, locks, encapsulation, or security screws. Putting in place tight airflow
unauthorized physical access mechanisms, and that carrying out the threat
paths will increase the difficulty of probing the product internals.
into the device. creates tamper evidence. Record one of:
The purpose of tamper evidence is to ensure that visible or electronic evidence remains when a tampering event occurs.
a. Met
Many simple evidence techniques are comprised of seals and tapes to make it obvious that there has been physical
b. Not met
tampering. More sophisticated techniques include switches.
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 41 of 53
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Product suppliers have established mechanisms to ensure that the software and firmware on their components is
Examine user documentation to verify that after authentic, and the integrity of that software and firmware has not been compromised. This allows the product supplier to
an asset owner has assumed responsibility for a provide the asset owner with a “known good” state from which to operate. However, many product suppliers also
device, a process exists for the asset owner to provide mechanisms for asset owners to extend the functionality of their devices through the use of mobile code, user
create and use roots of trust for the device. programs, or other such means. In order to protect the security of the component, it is important that these extensions to
Verify in design documentation that the asset the component’s functionality also be validated to ensure that they are authorized, and that the asset owner has
owner keys and data to be used as roots of approved of their origins.
Embedded devices shall provide trust, are handled within the device such that In order to perform these validations the component must contain data that provides a way to differentiate between valid
the capability to provision and they cannot be accessed in any manner other and invalid origins. The list of valid and invalid origins will differ from asset owner to asset owner, and it is unlikely that a
Provisioning asset owner protect the confidentiality, than by the functions in the device that require IEC 62443-4-2: product supplier will have a complete list of every possible valid origin at time of manufacture. Therefore it is important
x FSA-EDR 3.13A No 2, 3, 4
roots of trust - protection integrity, and authenticity of the usage of this information. Verify that the EDR 3.13(a) that the product supplier provide a way for the asset owner to securely provision their own “roots of trust” which provide
asset owner keys and data to be threat model analyzes threats to the the ability to distinguish between origins allowed by the asset owner’s security policy, and those that are not. The
used as “roots of trust”. confidentiality, integrity, and authenticity of the authenticity and integrity of these “roots of trust” must be protected so that malicious actors cannot add additional roots
asset owner roots of trust and that these threats of trust that grant them the ability to operate on the component.
have been mitigated. Use of a trusted store or a A root of trust can also be used as a basis communications security, such as communications integrity required by CR
trusted zone are examples of methods to meet 3.1 – Communication integrity or communications confidentiality required by CR 4.1 – Information confidentiality.
this requirement. Record one of: Requirements such as EDR 2.4 – Mobile code require the component to complete authenticity checks on mobile code
a. Met prior to the execution of mobile code. The roots of trust provided by this requirement provide the data necessary to
b. Not met validate the origin and integrity of mobile code, allowing the component to independently determine if the code is
allowed to execute.
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 42 of 53
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Product suppliers have established mechanisms to ensure that the software and firmware on their components is
authentic, and the integrity of that software and firmware has not been compromised. This allows the product supplier to
Examine user documentation to verify that after
provide the asset owner with a “known good” state from which to operate. However, many product suppliers also
an asset owner has assumed responsibility for a
provide mechanisms for asset owners to extend the functionality of their devices through the use of mobile code, user
device, a process exists for the asset owner to
programs, or other such means. In order to protect the security of the component, it is important that these extensions to
create and use roots of trust for the device.
the component’s functionality also be validated to ensure that they are authorized, and that the asset owner has
Verify in design documentation that the asset
approved of their origins.
owner keys and data to be used as roots of
Host devices shall provide the In order to perform these validations the component must contain data that provides a way to differentiate between valid
trust, are handled within the device such that
capability to provision and and invalid origins. The list of valid and invalid origins will differ from asset owner to asset owner, and it is unlikely that a
they cannot be accessed in any manner other
Provisioning asset owner protect the confidentiality, IEC 62443-4-2: product supplier will have a complete list of every possible valid origin at time of manufacture. Therefore it is important
x FSA-HDR 3.13A than by the functions in the device that require No 2, 3, 4
roots of trust - protection integrity, and authenticity of HDR 3.13(a) that the product supplier provide a way for the asset owner to securely provision their own “roots of trust” which provide
the usage of this information. Verify that the
asset owner keys and data to be the ability to distinguish between origins allowed by the asset owner’s security policy, and those that are not. The
threat model analyzes threats to the
used as “roots of trust”. authenticity and integrity of these “roots of trust” must be protected so that malicious actors cannot add additional roots
confidentiality, integrity, and authenticity of the
of trust that grant them the ability to operate on the component.
asset owner roots of trust and that these threats
Requirements such as HDR 2.4 – Mobile code require the component to complete authenticity checks on mobile code
have been mitigated. Use of a trusted store or a
prior to the execution of mobile code. The roots of trust provided by this requirement provide the data necessary to
trusted zone are examples of methods to meet
validate the origin and integrity of mobile code, allowing the component to independently determine if the code is
this requirement. Record one of:
allowed to execute.
a. Met
A root of trust can also be used as a basis communications security, such as communications integrity required by CR
b. Not met
3.1 – Communication integrity or communications confidentiality required by CR 4.1 – Information confidentiality.
Product suppliers have established mechanisms to ensure that the software and firmware on their components is
authentic, and the integrity of that software and firmware has not been compromised. This allows the product supplier to
Examine user documentation to verify that after
provide the asset owner with a “known good” state from which to operate. However, many product suppliers also
an asset owner has assumed responsibility for a
provide mechanisms for asset owners to extend the functionality of their devices through the use of mobile code, user
device, a process exists for the asset owner to
programs, or other such means. In order to protect the security of the component, it is important that these extensions to
create and use roots of trust for the device.
the component’s functionality also be validated to ensure that they are authorized, and that the asset owner has
Verify in design documentation that the asset
approved of their origins.
owner keys and data to be used as roots of
Network devices shall provide In order to perform these validations the component must contain data that provides a way to differentiate between valid
trust, are handled within the device such that
the capability to provision and and invalid origins. The list of valid and invalid origins will differ from asset owner to asset owner, and it is unlikely that a
they cannot be accessed in any manner other
Provisioning asset owner protect the confidentiality, IEC 62443-4-2: product supplier will have a complete list of every possible valid origin at time of manufacture. Therefore it is important
x FSA-NDR 3.13A than by the functions in the device that require No 2, 3, 4
roots of trust - protection integrity, and authenticity of NDR 3.13(a) that the product supplier provide a way for the asset owner to securely provision their own “roots of trust” which provide
the usage of this information. Verify that the
asset owner keys and data to be the ability to distinguish between origins allowed by the asset owner’s security policy, and those that are not. The
threat model analyzes threats to the
used as “roots of trust”. authenticity and integrity of these “roots of trust” must be protected so that malicious actors cannot add additional roots
confidentiality, integrity, and authenticity of the
of trust that grant them the ability to operate on the component.
asset owner roots of trust and that these threats
Requirements such as NDR 2.4 – Mobile code require the component to complete authenticity checks on mobile code
have been mitigated. Use of a trusted store or a
prior to the execution of mobile code. The roots of trust provided by this requirement provide the data necessary to
trusted zone are examples of methods to meet
validate the origin and integrity of mobile code, allowing the component to independently determine if the code is
this requirement. Record one of:
allowed to execute.
a. Met
A root of trust is used to provide communications security, such as communications integrity required by CR 3.1 –
b. Not met
Communication integrity or communications confidentiality required by CR 4.1 – Information confidentiality.
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 43 of 53
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 44 of 53
CSA-311 FR 3
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 45 of 53
CSA-311 FR 4
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Test Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 46 of 53
CSA-311 FR 4
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Test Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 47 of 53
CSA-311 FR 5
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Test Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Required Requirement
Level
(Yes/No)
The network component shall provide the Verify that user documents indicate the capability to deny all
capability to deny network traffic by network traffic through the network device by default and
IEC 62443-4-2:
x FSA-NDR 5.2 RE(1) Deny all, permit by exception default and allow network traffic by allow network traffic by exception. Record one of: No 2, 3, 4
NDR 5.2 RE(1)
exception (also termed deny all, permit by a. Met
exception). b. Not met
The network component shall provide the Verify in user documentation and by testing that the network
capability to protect against any device has the capability to be placed in a mode to block all NOTE Examples of when this capability may be used include where a security violation
IEC 62443-4-2:
x FSA-NDR 5.2 RE(2) Island mode communication through the control traffic passing through the device. Record one of: Yes 3, 4 and/or breach has been detected within the control system, or an attack is occurring at
NDR 5.2 RE(2)
system boundary (also termed island a. Met the enterprise level.
mode). b. Not met
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 48 of 53
CSA-311 FR 5
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Test Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Required Requirement
Level
(Yes/No)
General purpose, person-to-person communications systems include but are not limited
to: email systems, forms of social media (Twitter, Facebook, picture galleries, etc.) or
any message systems that permit the transmission of any type of executable file. These
systems are usually utilized for private purposes that are not related to control system
A network device at a zone boundary Verify in user documentation that the network device has the operations, and therefore the risks imposed by these systems normally outweigh any
shall provide the capability to protect capability to block all types of general purpose, person-to- perceived benefit.
General purpose, person-to- against general purpose, person-to- person messages. Record one of: IEC 62443-4-2: These types of general purpose communications systems are commonly used as attack
x FSA-NDR 5.3 No 1, 2, 3, 4
person communication restrictions person messages from being received a. Met NDR 5.3 vectors to introduce malware to the control system, pass information for which read
from users or systems external to the b. Not met authorization exists to locations external to the control system and introduce excessive
control system. network loading that can be used to create security problems or launch attacks on the
control system.
Network devices could realize such restrictions, for example, by blocking specific
communications based on port numbers and source and/or target address as well as
more in depth checks by application layer firewalls.
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 49 of 53
CSA-311 FR 6
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
The applications and devices may generate audit records about events
occurring in that application or device (see 6.10). Access to these audit
logs is necessary to support filtering audit logs, identifying and removing
information that is redundant, reviewing and reporting activity during after-
Verify that the component provides a means for the-fact investigations of security incidents. In general, audit reduction
Components shall provide the
authorized humans and/or authorized external tools to and report generation should be performed on a separate information
capability for authorized humans IEC 62443-4-2:
x x x x FSA-CR 6.1 Audit log accessibility access audit logs on a read-only basis. Record one of: No 1, 2, 3, 4 system. Manual access to the audit records (such as, screen views or
and/or tools to access audit logs on a CR 6.1
a. Met printouts) is sufficient for meeting the base requirement, but is
read-only basis.
b. Not met insufficient for higher SLs. Programmatic access is commonly used to
provide the audit log information to analysis mechanisms such as
security information and event management (SIEM). See relevant SRs in
Clauses 5, 6 and 9 regarding the creation of, protection of and access to
audit logs.
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 50 of 53
CSA-311 FR 7
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 51 of 53
CSA-311 FR 7
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 52 of 53
CSA-311 FR 7
ISA Security Compliance Institute
CSA-311 Component Security Assurance - Functional security assessment for components, Version 2.3
Software Application
Embedded Device
Network Device
Host Device Validation by
Capability
Independent Source of
Requirement ID Reference Name Requirement Description Validation Activity Security Rationale and Supplemental Guidance
Test Required Requirement
Level
(Yes/No)
Copyright © 2018-2022 ASCI - Automation Standards Compliance Institute, All rights reserved. Page 53 of 53