SlideShare a Scribd company logo
Camilo Gomez
Global Cybersecurity Strategist
Yokogawa USTC
November 10, 2020
Contributing to the
Development and Application
of Cybersecurity Standards
Agenda
1. Overview of ICS Cybersecurity
Standards Development Activities
2. Using the Standards
3. Applying and Adopting the
Standards to the New and
Emerging
Development Activities
Overview
ISA/IEC 62443 Series Roadmap
Certification Development
SeriesConsistency
ISA/IEC 62443 Use Grouping
Dependent of IACS Environment
Independent of IACS Environment
Asset Owner
Service
Provider
Integration
Service
Provider
Maintenance
Product
Supplier
Industrial Automation and Control Systems (IACS)
Operational Policies and Procedures
Automation Solution
Essential Functions
Safety
Functions
Control
Functions
Complementary
Functions
Products
Components
Embedded
Device
Host
Device
Network
Device
Software
Application
System
Existing New
62443-1-1
62443-2-1
62443-3-2
62443-2-3
62443-2-4
62443-3-1
62443-3-3
62443-3-3
62443-4-1
62443-4-2
62443-1-3
62443-1-4
62443-2-2
62443-2-5
62443-1-3
62443-2-2
Focus
Securing the
IACS
How to
Guidance
and Visibility
Components
Embedded
Device
Host Device
Network
Device
Software
Application
Components
Embedded
Device
Host Device
Network
Device
Software
Application
Accountable
Operates
Designs and
Deploys
Maintains
Develops and
Supports
ISA/IEC 62443 Available Certifications
Dependent of IACS Environment
Independent of IACS Environment
Asset Owner
Service
Provider
Integration
Service
Provider
Maintenance
Product
Supplier
Industrial Automation and Control Systems (IACS)
Operational Policies and Procedures
Automation Solution
Essential Functions
Safety
Functions
Control
Functions
Complementary
Functions
Products
Components
Embedded
Device
Host
Device
Network
Device
Software
Application
System
Existing New
62443-1-1
62443-2-1
62443-3-2
62443-2-3
62443-2-4
62443-3-1
62443-3-3
62443-3-3
62443-4-1
62443-4-2
62443-1-3
62443-1-4
62443-2-2
62443-2-5
62443-1-3
62443-2-2
Focus
Securing the
Supply Chain
Components
Embedded
Device
Host Device
Network
Device
Software
Application
Components
Embedded
Device
Host Device
Network
Device
Software
Application
Accountable
Operates
Designs and
Deploys
Maintains
Develops and
Supports
Using the
Standards—Securing the
Organization
■ Methodology for developing quantitative metrics
and KPIs from requirements in the standards
■ Understanding the objective and context
of requirements
■ Deriving performance metrics from process
and technical requirements
■ Differentiating Performance metrics
from Conformance metrics
■ Building Key Performance Indicators
WG12: 62443-1-3 Performance Metrics
How to measure performance and effectiveness
of security controls in operation?
■ Methodology for combining the evaluation of
organizational and technical security measures
■ Results expressed in numerical values (SPRs)
■ SPR values are derived from rating the security level
provided by capabilities of security measures used
and the maturity levels of the organization operating
the IACS
■ Based on maturity levels defined in 62443-2-1,
62443-2-4 and 62443-4-1 and security levels
defined in 62433-3-3
WG3TG3: 62443-2-2 Security Program Ratings
Evaluating the actual level of protection of an
IACS cybersecurity program in operation
Applying the Standards
to the New and Emerging
■ Examine whether the standards are appropriate and sufficient
for IIoT in the context of “secure-by-design” objects as a prelude
to possible certification
■ Focus on data classification, edge data collection and processing,
and data transmission to the cloud via gateways
■ Relevance of zone and conduits concept
Applying ISA/IEC 62443 to Industrial IoT
ISA99 WG9-TR
■ Project towards an IIoT certification in progress
■ Applicability of CSA Certification
■ Differentiating IIoT device vs IIoT solution
■ Study of potential gaps in certification requirements
and 62443
ISASecure roadmap
■ Responding to market need for intrinsically secure
automation components and systems
■ Adopted 62443 as the guiding standard for
secure-by-design of O-PAS™ products
■ Both software applications and physical platform
■ Mapped for the first-time other OT and IT functional
standards such as OPC UA and Redfish to 62443
■ Established collaborative agreement with ISASecure
for security testing of O-PAS™ products based on
ISA/IEC 62443 and relevant O-PAS™ specifications
Adopting ISA/IEC 62443—OPAF Example
O-PAS™ a standards based, open, secure, and
interoperable process control architecture
O-PAS™ Standard is a registered trademark of The Open Group.
Using the standards -
Securing the Supply Chain
Standards based secure development lifecycle
and support of products and services – secure by
design
■ Policy
◆ Group Quality Management Policy
■ Knowhow
◆ Engineering standards
◆ Guidelines & tools
■ Assurance Framework
■ Training
■ Product Certification
Yokogawa’s case
Adopting Standards Servicing our Customers
Standards based lifecycle management services
for plant cybersecurity
The names of corporations, organizations, products and logos herein are either registered trademarks or
trademarks of Yokogawa Electric Corporation and their respective holders.
Thank You!
There is more than just
having standards when
they are set to work.

More Related Content

What's hot

IEC and cyber security (June 2018)
IEC and cyber security (June 2018)IEC and cyber security (June 2018)
IEC and cyber security (June 2018)
International Electrotechnical Commission (IEC)
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
Chris Sistrunk
 
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Jim Gilsinn
 
Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and Production
Jim Gilsinn
 
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
Byres Security Inc.
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Jiunn-Jer Sun
 
The Future of ICS Security Products
The Future of ICS Security ProductsThe Future of ICS Security Products
The Future of ICS Security Products
Digital Bond
 
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin WheelerNTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
North Texas Chapter of the ISSA
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
Open Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and EducationOpen Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and Education
EnergySec
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
EnergySec
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
MarcoAfzali
 
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82majolic
 
Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overview
pgmaynard
 
SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016
Derek Harp
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
Priyanka Aash
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
Creekside Marketing Group, LLC
 
Securing Industrial Control Systems
Securing Industrial Control SystemsSecuring Industrial Control Systems
Securing Industrial Control Systems
Eric Andresen
 

What's hot (20)

IEC and cyber security (June 2018)
IEC and cyber security (June 2018)IEC and cyber security (June 2018)
IEC and cyber security (June 2018)
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
 
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
 
Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and Production
 
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
 
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
 
The Future of ICS Security Products
The Future of ICS Security ProductsThe Future of ICS Security Products
The Future of ICS Security Products
 
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin WheelerNTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Open Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and EducationOpen Platform for ICS Cybersecurity Research and Education
Open Platform for ICS Cybersecurity Research and Education
 
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...What to Do When You Don’t Know What to Do: Control System Patching Problems a...
What to Do When You Don’t Know What to Do: Control System Patching Problems a...
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
 
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82
 
Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overview
 
SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
 
CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
Securing Industrial Control Systems
Securing Industrial Control SystemsSecuring Industrial Control Systems
Securing Industrial Control Systems
 

Similar to Contributing to the Development and Application of Cybersecurity Standards

Aerohive and Barracuda Whitepaper
Aerohive and Barracuda WhitepaperAerohive and Barracuda Whitepaper
Aerohive and Barracuda Whitepaper
Kappa Data
 
Barracuda integration with aerohive
Barracuda integration with aerohiveBarracuda integration with aerohive
Barracuda integration with aerohive
Kappa Data
 
Cross standard and scheme composition - A needed cornerstone for the European...
Cross standard and scheme composition - A needed cornerstone for the European...Cross standard and scheme composition - A needed cornerstone for the European...
Cross standard and scheme composition - A needed cornerstone for the European...
Javier Tallón
 
Biznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital ForensicsBiznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital Forensics
Yusuf Hadiwinata Sutandar
 
SCADA Security Training
SCADA Security TrainingSCADA Security Training
SCADA Security Training
Bryan Len
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
John Kingsley
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
 
Piacere general presentation
Piacere general presentationPiacere general presentation
Piacere general presentation
PIACERE
 
SecureCloud Project
SecureCloud ProjectSecureCloud Project
SecureCloud Project
EUBrasilCloudFORUM .
 
Information Assurance, A DISA CCRI Conceptual Framework
Information Assurance, A DISA CCRI Conceptual FrameworkInformation Assurance, A DISA CCRI Conceptual Framework
Information Assurance, A DISA CCRI Conceptual Framework
James W. De Rienzo
 
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
TI Safe
 
ISA Toronto Chapter Presentation-March 2017
ISA Toronto  Chapter Presentation-March 2017ISA Toronto  Chapter Presentation-March 2017
ISA Toronto Chapter Presentation-March 2017
Sustainable Resources Management
 
operational-telecom-network-connected-pipeline-design-guide.pdf
operational-telecom-network-connected-pipeline-design-guide.pdfoperational-telecom-network-connected-pipeline-design-guide.pdf
operational-telecom-network-connected-pipeline-design-guide.pdf
VishalKashyap15069
 
Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case StudyIndustrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Polestar IIoT
 
Google GCP-PCSE Certificate Is Your Best Choice
Google GCP-PCSE Certificate Is Your Best ChoiceGoogle GCP-PCSE Certificate Is Your Best Choice
Google GCP-PCSE Certificate Is Your Best Choice
Amaaira Johns
 
Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart Manufacturing
CSA Group
 
Chapter 5
Chapter 5 Chapter 5
Chapter 5 ali raza
 
Module 1- Introduction-CCA.pptx
Module 1- Introduction-CCA.pptxModule 1- Introduction-CCA.pptx
Module 1- Introduction-CCA.pptx
SabaFatima350242
 
Creating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management SystemCreating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management System
Schneider Electric
 
SAFIRE Security Concept at EFFRA Event
SAFIRE Security Concept at EFFRA EventSAFIRE Security Concept at EFFRA Event
SAFIRE Security Concept at EFFRA Event
Sebastian Scholze
 

Similar to Contributing to the Development and Application of Cybersecurity Standards (20)

Aerohive and Barracuda Whitepaper
Aerohive and Barracuda WhitepaperAerohive and Barracuda Whitepaper
Aerohive and Barracuda Whitepaper
 
Barracuda integration with aerohive
Barracuda integration with aerohiveBarracuda integration with aerohive
Barracuda integration with aerohive
 
Cross standard and scheme composition - A needed cornerstone for the European...
Cross standard and scheme composition - A needed cornerstone for the European...Cross standard and scheme composition - A needed cornerstone for the European...
Cross standard and scheme composition - A needed cornerstone for the European...
 
Biznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital ForensicsBiznet GIO National Seminar on Digital Forensics
Biznet GIO National Seminar on Digital Forensics
 
SCADA Security Training
SCADA Security TrainingSCADA Security Training
SCADA Security Training
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
 
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
Piacere general presentation
Piacere general presentationPiacere general presentation
Piacere general presentation
 
SecureCloud Project
SecureCloud ProjectSecureCloud Project
SecureCloud Project
 
Information Assurance, A DISA CCRI Conceptual Framework
Information Assurance, A DISA CCRI Conceptual FrameworkInformation Assurance, A DISA CCRI Conceptual Framework
Information Assurance, A DISA CCRI Conceptual Framework
 
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
 
ISA Toronto Chapter Presentation-March 2017
ISA Toronto  Chapter Presentation-March 2017ISA Toronto  Chapter Presentation-March 2017
ISA Toronto Chapter Presentation-March 2017
 
operational-telecom-network-connected-pipeline-design-guide.pdf
operational-telecom-network-connected-pipeline-design-guide.pdfoperational-telecom-network-connected-pipeline-design-guide.pdf
operational-telecom-network-connected-pipeline-design-guide.pdf
 
Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case StudyIndustrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
 
Google GCP-PCSE Certificate Is Your Best Choice
Google GCP-PCSE Certificate Is Your Best ChoiceGoogle GCP-PCSE Certificate Is Your Best Choice
Google GCP-PCSE Certificate Is Your Best Choice
 
Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart Manufacturing
 
Chapter 5
Chapter 5 Chapter 5
Chapter 5
 
Module 1- Introduction-CCA.pptx
Module 1- Introduction-CCA.pptxModule 1- Introduction-CCA.pptx
Module 1- Introduction-CCA.pptx
 
Creating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management SystemCreating a Reliable and Secure Advanced Distribution Management System
Creating a Reliable and Secure Advanced Distribution Management System
 
SAFIRE Security Concept at EFFRA Event
SAFIRE Security Concept at EFFRA EventSAFIRE Security Concept at EFFRA Event
SAFIRE Security Concept at EFFRA Event
 

More from Yokogawa1

Data, Data, Everywhere...GA10 Brings It All Together
Data, Data, Everywhere...GA10 Brings It All TogetherData, Data, Everywhere...GA10 Brings It All Together
Data, Data, Everywhere...GA10 Brings It All Together
Yokogawa1
 
202102 attaining proficiency in industrial pressure measurement r7
202102 attaining proficiency in industrial pressure measurement r7202102 attaining proficiency in industrial pressure measurement r7
202102 attaining proficiency in industrial pressure measurement r7
Yokogawa1
 
Chromatography Basics 2021
Chromatography Basics 2021Chromatography Basics 2021
Chromatography Basics 2021
Yokogawa1
 
An Economic X-ray of Digital Transformation
An Economic X-ray of Digital TransformationAn Economic X-ray of Digital Transformation
An Economic X-ray of Digital Transformation
Yokogawa1
 
Using A Unique, Next Generation APC Solution To Address Common Problems In Th...
Using A Unique, Next Generation APC Solution To Address Common Problems In Th...Using A Unique, Next Generation APC Solution To Address Common Problems In Th...
Using A Unique, Next Generation APC Solution To Address Common Problems In Th...
Yokogawa1
 
Open Process Automation: Status of the O-PAS™ Standard, Conformance Certifica...
Open Process Automation: Status of the O-PAS™ Standard, Conformance Certifica...Open Process Automation: Status of the O-PAS™ Standard, Conformance Certifica...
Open Process Automation: Status of the O-PAS™ Standard, Conformance Certifica...
Yokogawa1
 
The Value-driven Approach to Digitalizing Assets and their Supply Chains
The Value-driven Approach to Digitalizing Assets and their Supply ChainsThe Value-driven Approach to Digitalizing Assets and their Supply Chains
The Value-driven Approach to Digitalizing Assets and their Supply Chains
Yokogawa1
 
The Role And Evolution Of Advanced Analytics In The Process Industries
The Role And Evolution Of Advanced Analytics In The Process IndustriesThe Role And Evolution Of Advanced Analytics In The Process Industries
The Role And Evolution Of Advanced Analytics In The Process Industries
Yokogawa1
 
The Digital Twin For Production Optimization
The Digital Twin For Production OptimizationThe Digital Twin For Production Optimization
The Digital Twin For Production Optimization
Yokogawa1
 
Multi-Site Optimization To Drive Value Creation In Chevron
Multi-Site Optimization To Drive Value Creation In ChevronMulti-Site Optimization To Drive Value Creation In Chevron
Multi-Site Optimization To Drive Value Creation In Chevron
Yokogawa1
 
Keeping PACE with Advanced Process Control
Keeping PACE with Advanced Process ControlKeeping PACE with Advanced Process Control
Keeping PACE with Advanced Process Control
Yokogawa1
 
Yokogawa’s DX and Smart Manufacturing Vision for Building our Future
Yokogawa’s DX and Smart Manufacturing Vision for Building our FutureYokogawa’s DX and Smart Manufacturing Vision for Building our Future
Yokogawa’s DX and Smart Manufacturing Vision for Building our Future
Yokogawa1
 
Business Model Disruption - The Step-wise Transition to Remote Operations
Business Model Disruption - The Step-wise Transition to Remote OperationsBusiness Model Disruption - The Step-wise Transition to Remote Operations
Business Model Disruption - The Step-wise Transition to Remote Operations
Yokogawa1
 
A New Digital Maintenance Platform in a Large Petrochemical Facility to Ident...
A New Digital Maintenance Platform in a Large Petrochemical Facility to Ident...A New Digital Maintenance Platform in a Large Petrochemical Facility to Ident...
A New Digital Maintenance Platform in a Large Petrochemical Facility to Ident...
Yokogawa1
 
Shift team effectiveness: Don't bother if you can't change "shop floor" shift...
Shift team effectiveness: Don't bother if you can't change "shop floor" shift...Shift team effectiveness: Don't bother if you can't change "shop floor" shift...
Shift team effectiveness: Don't bother if you can't change "shop floor" shift...
Yokogawa1
 
Adversity Drives Innovation and Enterprise Resilience to Best Leverage a Hist...
Adversity Drives Innovation and Enterprise Resilience to Best Leverage a Hist...Adversity Drives Innovation and Enterprise Resilience to Best Leverage a Hist...
Adversity Drives Innovation and Enterprise Resilience to Best Leverage a Hist...
Yokogawa1
 
Improved Upstream Production Efficiency with Remote Optimization Centers, Fie...
Improved Upstream Production Efficiency with Remote Optimization Centers, Fie...Improved Upstream Production Efficiency with Remote Optimization Centers, Fie...
Improved Upstream Production Efficiency with Remote Optimization Centers, Fie...
Yokogawa1
 
Transforming Decision Making in Scheduling of Terminal Operations
Transforming Decision Making in Scheduling of Terminal OperationsTransforming Decision Making in Scheduling of Terminal Operations
Transforming Decision Making in Scheduling of Terminal Operations
Yokogawa1
 
Asia NOC Bridges Business-wide Performance Objectives and KPIs through an Adv...
Asia NOC Bridges Business-wide Performance Objectives and KPIs through an Adv...Asia NOC Bridges Business-wide Performance Objectives and KPIs through an Adv...
Asia NOC Bridges Business-wide Performance Objectives and KPIs through an Adv...
Yokogawa1
 
Achieving the Autonomous Terminal
Achieving the Autonomous TerminalAchieving the Autonomous Terminal
Achieving the Autonomous Terminal
Yokogawa1
 

More from Yokogawa1 (20)

Data, Data, Everywhere...GA10 Brings It All Together
Data, Data, Everywhere...GA10 Brings It All TogetherData, Data, Everywhere...GA10 Brings It All Together
Data, Data, Everywhere...GA10 Brings It All Together
 
202102 attaining proficiency in industrial pressure measurement r7
202102 attaining proficiency in industrial pressure measurement r7202102 attaining proficiency in industrial pressure measurement r7
202102 attaining proficiency in industrial pressure measurement r7
 
Chromatography Basics 2021
Chromatography Basics 2021Chromatography Basics 2021
Chromatography Basics 2021
 
An Economic X-ray of Digital Transformation
An Economic X-ray of Digital TransformationAn Economic X-ray of Digital Transformation
An Economic X-ray of Digital Transformation
 
Using A Unique, Next Generation APC Solution To Address Common Problems In Th...
Using A Unique, Next Generation APC Solution To Address Common Problems In Th...Using A Unique, Next Generation APC Solution To Address Common Problems In Th...
Using A Unique, Next Generation APC Solution To Address Common Problems In Th...
 
Open Process Automation: Status of the O-PAS™ Standard, Conformance Certifica...
Open Process Automation: Status of the O-PAS™ Standard, Conformance Certifica...Open Process Automation: Status of the O-PAS™ Standard, Conformance Certifica...
Open Process Automation: Status of the O-PAS™ Standard, Conformance Certifica...
 
The Value-driven Approach to Digitalizing Assets and their Supply Chains
The Value-driven Approach to Digitalizing Assets and their Supply ChainsThe Value-driven Approach to Digitalizing Assets and their Supply Chains
The Value-driven Approach to Digitalizing Assets and their Supply Chains
 
The Role And Evolution Of Advanced Analytics In The Process Industries
The Role And Evolution Of Advanced Analytics In The Process IndustriesThe Role And Evolution Of Advanced Analytics In The Process Industries
The Role And Evolution Of Advanced Analytics In The Process Industries
 
The Digital Twin For Production Optimization
The Digital Twin For Production OptimizationThe Digital Twin For Production Optimization
The Digital Twin For Production Optimization
 
Multi-Site Optimization To Drive Value Creation In Chevron
Multi-Site Optimization To Drive Value Creation In ChevronMulti-Site Optimization To Drive Value Creation In Chevron
Multi-Site Optimization To Drive Value Creation In Chevron
 
Keeping PACE with Advanced Process Control
Keeping PACE with Advanced Process ControlKeeping PACE with Advanced Process Control
Keeping PACE with Advanced Process Control
 
Yokogawa’s DX and Smart Manufacturing Vision for Building our Future
Yokogawa’s DX and Smart Manufacturing Vision for Building our FutureYokogawa’s DX and Smart Manufacturing Vision for Building our Future
Yokogawa’s DX and Smart Manufacturing Vision for Building our Future
 
Business Model Disruption - The Step-wise Transition to Remote Operations
Business Model Disruption - The Step-wise Transition to Remote OperationsBusiness Model Disruption - The Step-wise Transition to Remote Operations
Business Model Disruption - The Step-wise Transition to Remote Operations
 
A New Digital Maintenance Platform in a Large Petrochemical Facility to Ident...
A New Digital Maintenance Platform in a Large Petrochemical Facility to Ident...A New Digital Maintenance Platform in a Large Petrochemical Facility to Ident...
A New Digital Maintenance Platform in a Large Petrochemical Facility to Ident...
 
Shift team effectiveness: Don't bother if you can't change "shop floor" shift...
Shift team effectiveness: Don't bother if you can't change "shop floor" shift...Shift team effectiveness: Don't bother if you can't change "shop floor" shift...
Shift team effectiveness: Don't bother if you can't change "shop floor" shift...
 
Adversity Drives Innovation and Enterprise Resilience to Best Leverage a Hist...
Adversity Drives Innovation and Enterprise Resilience to Best Leverage a Hist...Adversity Drives Innovation and Enterprise Resilience to Best Leverage a Hist...
Adversity Drives Innovation and Enterprise Resilience to Best Leverage a Hist...
 
Improved Upstream Production Efficiency with Remote Optimization Centers, Fie...
Improved Upstream Production Efficiency with Remote Optimization Centers, Fie...Improved Upstream Production Efficiency with Remote Optimization Centers, Fie...
Improved Upstream Production Efficiency with Remote Optimization Centers, Fie...
 
Transforming Decision Making in Scheduling of Terminal Operations
Transforming Decision Making in Scheduling of Terminal OperationsTransforming Decision Making in Scheduling of Terminal Operations
Transforming Decision Making in Scheduling of Terminal Operations
 
Asia NOC Bridges Business-wide Performance Objectives and KPIs through an Adv...
Asia NOC Bridges Business-wide Performance Objectives and KPIs through an Adv...Asia NOC Bridges Business-wide Performance Objectives and KPIs through an Adv...
Asia NOC Bridges Business-wide Performance Objectives and KPIs through an Adv...
 
Achieving the Autonomous Terminal
Achieving the Autonomous TerminalAchieving the Autonomous Terminal
Achieving the Autonomous Terminal
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Contributing to the Development and Application of Cybersecurity Standards

  • 1. Camilo Gomez Global Cybersecurity Strategist Yokogawa USTC November 10, 2020 Contributing to the Development and Application of Cybersecurity Standards
  • 2. Agenda 1. Overview of ICS Cybersecurity Standards Development Activities 2. Using the Standards 3. Applying and Adopting the Standards to the New and Emerging
  • 4. ISA/IEC 62443 Series Roadmap Certification Development SeriesConsistency
  • 5. ISA/IEC 62443 Use Grouping Dependent of IACS Environment Independent of IACS Environment Asset Owner Service Provider Integration Service Provider Maintenance Product Supplier Industrial Automation and Control Systems (IACS) Operational Policies and Procedures Automation Solution Essential Functions Safety Functions Control Functions Complementary Functions Products Components Embedded Device Host Device Network Device Software Application System Existing New 62443-1-1 62443-2-1 62443-3-2 62443-2-3 62443-2-4 62443-3-1 62443-3-3 62443-3-3 62443-4-1 62443-4-2 62443-1-3 62443-1-4 62443-2-2 62443-2-5 62443-1-3 62443-2-2 Focus Securing the IACS How to Guidance and Visibility Components Embedded Device Host Device Network Device Software Application Components Embedded Device Host Device Network Device Software Application Accountable Operates Designs and Deploys Maintains Develops and Supports
  • 6. ISA/IEC 62443 Available Certifications Dependent of IACS Environment Independent of IACS Environment Asset Owner Service Provider Integration Service Provider Maintenance Product Supplier Industrial Automation and Control Systems (IACS) Operational Policies and Procedures Automation Solution Essential Functions Safety Functions Control Functions Complementary Functions Products Components Embedded Device Host Device Network Device Software Application System Existing New 62443-1-1 62443-2-1 62443-3-2 62443-2-3 62443-2-4 62443-3-1 62443-3-3 62443-3-3 62443-4-1 62443-4-2 62443-1-3 62443-1-4 62443-2-2 62443-2-5 62443-1-3 62443-2-2 Focus Securing the Supply Chain Components Embedded Device Host Device Network Device Software Application Components Embedded Device Host Device Network Device Software Application Accountable Operates Designs and Deploys Maintains Develops and Supports
  • 8. ■ Methodology for developing quantitative metrics and KPIs from requirements in the standards ■ Understanding the objective and context of requirements ■ Deriving performance metrics from process and technical requirements ■ Differentiating Performance metrics from Conformance metrics ■ Building Key Performance Indicators WG12: 62443-1-3 Performance Metrics How to measure performance and effectiveness of security controls in operation?
  • 9. ■ Methodology for combining the evaluation of organizational and technical security measures ■ Results expressed in numerical values (SPRs) ■ SPR values are derived from rating the security level provided by capabilities of security measures used and the maturity levels of the organization operating the IACS ■ Based on maturity levels defined in 62443-2-1, 62443-2-4 and 62443-4-1 and security levels defined in 62433-3-3 WG3TG3: 62443-2-2 Security Program Ratings Evaluating the actual level of protection of an IACS cybersecurity program in operation
  • 10. Applying the Standards to the New and Emerging
  • 11. ■ Examine whether the standards are appropriate and sufficient for IIoT in the context of “secure-by-design” objects as a prelude to possible certification ■ Focus on data classification, edge data collection and processing, and data transmission to the cloud via gateways ■ Relevance of zone and conduits concept Applying ISA/IEC 62443 to Industrial IoT ISA99 WG9-TR ■ Project towards an IIoT certification in progress ■ Applicability of CSA Certification ■ Differentiating IIoT device vs IIoT solution ■ Study of potential gaps in certification requirements and 62443 ISASecure roadmap
  • 12. ■ Responding to market need for intrinsically secure automation components and systems ■ Adopted 62443 as the guiding standard for secure-by-design of O-PAS™ products ■ Both software applications and physical platform ■ Mapped for the first-time other OT and IT functional standards such as OPC UA and Redfish to 62443 ■ Established collaborative agreement with ISASecure for security testing of O-PAS™ products based on ISA/IEC 62443 and relevant O-PAS™ specifications Adopting ISA/IEC 62443—OPAF Example O-PAS™ a standards based, open, secure, and interoperable process control architecture O-PAS™ Standard is a registered trademark of The Open Group.
  • 13. Using the standards - Securing the Supply Chain
  • 14. Standards based secure development lifecycle and support of products and services – secure by design ■ Policy ◆ Group Quality Management Policy ■ Knowhow ◆ Engineering standards ◆ Guidelines & tools ■ Assurance Framework ■ Training ■ Product Certification Yokogawa’s case Adopting Standards Servicing our Customers Standards based lifecycle management services for plant cybersecurity
  • 15. The names of corporations, organizations, products and logos herein are either registered trademarks or trademarks of Yokogawa Electric Corporation and their respective holders. Thank You! There is more than just having standards when they are set to work.