SlideShare a Scribd company logo
1 of 81
Download to read offline
Applying ISA/IEC 62443 to
Control Systems
Graham Speake
MESAKNOWS
Additional
l
Principal Systems Architect Yokogawa
SUSTAINABILITY & ECO‐EFFICIENCY ‐ LEAN ‐ METRICS & PERFORMANCE MANAGEMENT
INFORMATION INTEGRATION ‐ SAFETY ‐ ASSET PERFORMANCE MANAGEMENT ‐ B2MML
QUALITY & COMPLIANCE ‐ PRODUCT LIFECYCLE MANAGEMENT ‐ AUTOMATION
MESAKNOWS
partner logos
Do you know MESA?
Graham Speake
• BSc Electrical and Electronics Engineer
g
• 16 years experience in computer security
• 12 Years experience in automation security
p y
• Worked for Ford Motor Company, ICS, ATOS‐
Origin and BP
• Worked as an independent consultant on
financial security
b f 2
• Member of ISA, ISCI, ISC2
• Principal Systems Architect at Yokogawa
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
2
ACRONYMS
ACRONYMS
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
3
Acronyms
Acronyms
• SCADA DCS PCN industrial automation
SCADA, DCS, PCN, industrial automation
• PLC, embedded controller
l
• Process control
• HMI
• PI, Historian
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
4
Acronyms ‐2
Acronyms 2
• Whitelisting
Whitelisting
• IDS
S
• IPS
• phising
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Language difficulties
Language difficulties
I am not in the office at the moment. Send any
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
work to be translated
PROCESS CONTROL
PROCESS CONTROL
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
7
What do we mean by Process Control?
What do we mean by Process Control?
Is this process control?
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
8
What do we mean by Process Control?
What do we mean by Process Control?
How about these?
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
9
Process Control in this context is:
Process Control in this context is:
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
10
Level Control Example
Level Control Example
Variable flow into tank (rate not under our control)
As the level in the tank increases,
the level controller progressively
h l l i i
opens the outlet valve to maintain
the level in the tank.
As the level decreases, the
t ll l th l
Set
controller closes the valve
Point
Level
Controller
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Control up to 60’s
Control up to 60 s
Variable flow into tank (rate not under our
control)
Pneumatic signal
proportional to the
k l l
control)
tank level
Pneumatic signal from
controller to valve
Thumbwheel on
controller to
determine set
point
point
Level
Controller
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Control in the late 60’s & early 70’s
Control in the late 60 s & early 70 s
100
Electronic controller located remote
from plant in control room. Operator set
point entry is still via thumbwheel
0
Electrical signal
proportional to
the tank level
p y
Electrical signal from
controller to valve
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
The 1970’s The Distributed
C t l S t
Control System
An Operator Station, level indicated on a screen, operator changes
set point via keyboard for the first time!
Data Hiway
Basic Controller
Data Hiway
Electrical signals to/from controller ,
controller handles 8 loop at once
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
controller handles 8 loop at once
The 1970’s The Distributed
C t l S t
Control System
Multiple Operator Stations, one operator can control a refining unit
Data Hiway
Basic Controller Basic Controller Basic Controller
Basic Controller
#1
Basic Controller
#2
Basic Controller
#32
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
1980’s The DCS evolves
1980 s The DCS evolves
More powerful op
stns
Business systems
Local Control Network
Gateway
Gateway
Basic
Gateway
Basic
Gateway
Process
Basic
Controller
Basic
Controller
Basic
Controller
Basic
Controller
Process
Manager
Process
Manager
Basic
Controller
Basic
Controller
Process
Manager
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Data Hiway Data Hiway Universal Control Network
1990’s COTS arrive on the scene
1990 s COTS arrive on the scene
Business Network
G t t
Process Control Network
TCP/IP
Op Stn is a PC with a
Vendor PCI card
Gateway to
business
systems is a PC
Local Control Network
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
2000’s Everything connected!
Remote Users System
Server
Operator
Stations
Supervisory
Controller
Engineering
Station
www [to plant IT
network]
Remote
Server
Multi-loop
PCN
p
Controller
Direct I/O Module
Other Industrial Devices
2001, Security Arrives
2001, Security Arrives
Business network
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Cyber Security Overview
Cyber Security Overview
• Changing Compliance environment
NERC CIP ISO/IEC 17799 API 1164 NIST ISA
NERC CIP, ISO/IEC 17799, API 1164, NIST, ISA
• More aggressive organized Cyber threats
• “…a weapon of mass disruption..”
President Obama May 29, 2009
President Obama May 29, 2009
• Confluence of technologies There are few industry
experts
IT
Enterprise
Security Control
Security
Systems
Control system cyber
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
security
OVERVIEW OF ARCHITECTURE
OVERVIEW OF ARCHITECTURE
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Two‐Tiered Network Architecture
Two Tiered Network Architecture
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Three‐Tiered Network Architecture
Three Tiered Network Architecture
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
WHY SECURITY?
WHY SECURITY?
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Incident: Sewage Spill in Australia
Incident: Sewage Spill in Australia
• Between January 2000 and April
2000 th M h Shi
2000, the Maroochy Shire sewage
treatment plant in Queensland,
Australia experienced 47 unexplained
faults
faults.
• Millions of liters of raw sewage
spilled out into local parks, rivers and
even the grounds of a Hyatt Regency
even the grounds of a Hyatt Regency
hotel.
• Marine life died, the creek water
turned black and the stench was
turned black and the stench was
unbearable for residents, said Janelle
Bryant of the Australian
Environmental Protection Agency
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Environmental Protection Agency.
Incident: Sewage Spill in Australia
Incident: Sewage Spill in Australia
• On October 31, 2001, Vitek Boden was convicted of 26 counts of
illf ll i t i t d t t d d 1 t
willfully using a restricted computer to cause damage and 1 count
of causing serious environmental harm.
• Boden worked for the contractor involved in the installation of the
sewage treatment plant in the state of Queensland in Australia He
sewage treatment plant in the state of Queensland in Australia. He
left the contractor in December 1999 and approached the shire for
employment. He was refused.
• Boden made at least 46 attempts to take control of the sewage
system during March and April 2000. On April 23, the date of
Boden's last hacking attempt, police who pulled over his car found
radio and computer equipment.
• Later investigations found Boden's laptop had been used at the
• Later investigations found Boden s laptop had been used at the
time of the attacks and his hard drive contained software for
accessing and controlling the sewage management system.
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Incident: Virus Attacks Train Signaling
System
• In August 2003, a computer virus was
bl d f b i i d t i i li
blamed for bringing down train signaling
systems throughout the eastern U.S. The
signaling outage briefly affected the entire
CSX system, which covers 23 states east of
y ,
the Mississippi River.
• The virus infected the computer system at
CSX Corp's Jacksonville, Fla., headquarters,
shutting down signaling dispatching and
shutting down signaling, dispatching, and
other systems at about 1:15am EDT, CSX
spokesman Adam Hollingsworth said, The
cause was believed to be a worm virus
similar to those that have infected the
systems of major companies and agencies in
recent days.
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Incident: Gasoline Pipeline Rupture
Incident: Gasoline Pipeline Rupture
• In June 1999, a 16‐inch‐diameter steel pipeline owned by The
Olympic Pipe Line Company ruptured and released about 237 000
Olympic Pipe Line Company ruptured and released about 237,000
gallons of gasoline into a creek that flowed through Whatcom Falls
Park in Bellingham, Washington.
• About 1 1/2 hours after the rupture, the gasoline ignited and
burned about 1 1/2 miles along the creek Two 10 year old boys
burned about 1 1/2 miles along the creek. Two 10‐year‐old boys
and an 18‐year‐old young man died as a result of the accident.
Eight additional injuries were documented.
• A single‐family residence and the city of Bellingham's water
l l d d Ol i i d h
treatment plant were severely damaged. Olympic estimated that
total property damages were at least $45 million.
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Incident: Gasoline Pipeline Rupture
Incident: Gasoline Pipeline Rupture
• One of the causes of the accident was Olympic Pipe
Line Company's practice of performing database
development work on the SCADA system while the
system was being used to operate the pipeline.
y g p p p
• Shortly before the rupture, new records for pump
vibration data were entered into the SCADA historical
database. The records were created by a pipeline
database. The records were created by a pipeline
controller who had been temporarily assigned as a
computer system administrator.
• According to the accident report the database updates
• According to the accident report, the database updates
led to the system's becoming non‐responsive at a
critical time during pipeline operations.
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Incident: Sasser Worm Disrupts
d
Coastgaurd Computers in UK
• In May 2004, coastguard stations around the UK were severely disrupted
after a computer worm brought down IT systems. The Sasser worm hit all
19 coastguard stations and the service's main headquarters, leaving staff
reliant on paper maps and pens.
• The Maritime and Coastguard Agency said staff had reverted to manual
map reading as soon as its computerized mapping systems started to fail.
Coastguard staff were still able to use telephones and radios but fax and
l hi h d b f i
telex machines had been put out of action.
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Accidental Incidents
Accidental Incidents
• Accidental incidents remain a serious concern:
Accidental incidents remain a serious concern:
– PLCs crashed by IT security audit.
DCS data feed causes gateway failure
– DCS data feed causes gateway failure.
– Duplicate IP address prevents machine startup.
IP dd h h t d h i l l t
– IP address change shuts down chemical plant.
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Today’s threats?
Today s threats?
• Targeted attacks
Targeted attacks
• Spearphising
l
• Employees
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
OVERVIEW OF ISA/IEC STANDARDS
OVERVIEW OF ISA/IEC STANDARDS
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Overview
Overview
• The Situation
The Situation
• Chlorine Truck Loading Use Case
i & i k
• Design & Risk Management Process
• Systems vs. Zones & Conduits
• Design Considerations
• Security Level Vector Discussion
Security Level Vector Discussion
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
34
The Situation
The Situation
• The Problem
h d d h h d k h b ?
– With so many standards out there, how do you pick the best one?
– Once you’ve picked a set of standards, how do you apply them?
• Security Standards
– ISA/IEC 62443 (13)
ISA/IEC 62443 (13)
– ISO/IEC 2700x (10+)
– NIST FIPS and SP800 (7+)
– NERC CIP (8)
S G id (?)
IT Standards
– Smart Grid (?)
• And that’s just the security standards, then take into account the
functional standards
– Wireless = ISA 100.11a, WirelessHART, Zigbee, WiFi, Bluetooth…
Sector‐Specific Standards
, , g , ,
– Safety = ISA 84, IEC 61508/61511, DO‐254, OSHA…
– Management = ISO 9000, 14000, 31000, 50001, Six‐Sigma…
– And plenty of others…
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
35
ISA/IEC 62443 Series (Proposed)
ISA/IEC 62443 Series (Proposed)
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
36
Zones and Conduits
Zones and Conduits
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
37
Security Standards
Security Standards
• Security standards generally tell you what has to be done or specified, but
don’t tell you how to go about doing it
don’t tell you how to go about doing it
– Functional specifications
– Security controls/countermeasures
• Some standards show a generic process, but leave it up to the reader to
g p , p
apply it in their case
• A few use‐cases exist, but many times these are:
– Sector‐specific
O l l i t i
– Only apply in certain cases
– Limited in scope
• Very few end‐users discuss the details of their processes
– Restrict information from potential attackers
p
• Almost no vendors or system integrators discuss the details of their
processes
– Restrict information from potential competitors
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
38
Chlorine Truck Loading Use Case
Chlorine Truck Loading Use Case
• Setting the Stage
– ISA99 is trying to use a single use‐case throughout the entire
series to show how each part of the standard fits into the
process
Whil th hl i t k l di l i l t d t th
– While the chlorine truck loading example is related to the
chemical industry, the concepts presented could relate to any
industry
– The example allows for somewhat more realistic discussions of
The example allows for somewhat more realistic discussions of
risk than in an IT‐focused, DHS‐focused, or purely hypothetical
example
• Use case in early development and idea phase
y p p
– Will take quite a long time to complete entire use‐case
– Different parts of use‐case will probably emerge at different
times
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
39
Chlorine Truck Loading Use Case:
h
The Narrative
• Pharmaceutical Company XYZCorp
d d ( ll)
– Wants to start producing new product (FixItAll)
– No room for new production plant at existing facilities
– Chemical process requires relatively small amounts of chlorine
– Existing facility produces chlorine in large enough quantities
g y p g g q
• XYZCorp considers their options
– Conducts business assessment of building new facility
• Existing facilities all near space capacity
N f ili h d d
• New facility has good access to roads
• Land is suitable and available
• Existing chlorine production facility over 50 miles away
– Considers options for transporting chlorine
p p g
• Pipeline
• Rail
• Truck
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
40
Chlorine Truck Loading Use‐Case:
h l
The Plan
• Build truck loading/unloading facilities
– Loading @ existing facility, unloading @ new facility
– Unmanned except during loading/unloading operations
– Hazardous chemical requires special handling & safety
G ti f i t
• Generations of equipment
– Existing facility uses legacy equipment (brown‐field)
– New facility designed with current technology (green‐field)
• Facility monitoring & control
• Facility monitoring & control
– Unmanned – centralized monitoring @ control center
– Manned & operational – local control with both local & centralized
monitoring
monitoring
• Attached to business systems
– Billing & logistics
– Inventory tracking
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
y g
41
Chlorine Truck Loading Use Case:
d
Design Considerations
• Systems needed
Syste s eeded
– Safety Instrumented System (SIS)
– Basic Process Control System (BPCS)
– Control center
– Plant DMZ
– Enterprise systems
• Level of SIS integration with BPCS?
Ai d
– Air‐gapped
– Interfaced
– Integrated
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
– Integrated
42
Initial Design Process:
d f h l
Identify the Control Assets
• Process Equipment
– Pump Controller
– Transmitters
– Block and Control Valves
• BPCS & SIS
– Functional Safety‐PLC
– Control PLC
– Engineering Workstation(s)
– Instrument Asset Management System
– Human‐Machine Interface(s)
C t l C t
• Control Center
– Control Center Workstations
• Plant DMZ
– Data Historian
i
• Enterprise
– Enterprise Web Server
– Enterprise WLAN
– Business Logistics System
Billing S stem
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
– Billing System
43
NOW WHAT???
NOW WHAT???
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
44
Design Process
Design Process
• Now that the business case and some initial design
ideas have been put down, where do you go from
here?
A. Design the control system without worrying about the
g y y g
security?
B. Design everything so secure that it becomes unusable?
C Throw in firewalls everywhere?
C. Throw in firewalls everywhere?
D. Conduct a detailed risk assessment at the device level?
E. Conduct a multi‐stage risk assessment starting with the
top level and working down to the low level as the design
top level and working down to the low level as the design
progresses?
• Generally, the ISA99 approach begins with E
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
45
Modified ISO/IEC 27005 Risk
Management Process
• ISA99, Working Group 2
ki difi d
working on modified
ISO/IEC 27005 risk
management process
U b i h ll f 27005
– Uses basic shell from 27005
– Modifies it for multi‐stage
risk assessment process
Discusses “jump in” point
– Discusses “jump‐in” point
– Relates risk management
process to overall cyber
security management
security management
system design process
• Business planning
• Change management
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
46
• Decommissioning
Systems vs. Zones & Conduits
Systems vs. Zones & Conduits
• Systems ≠ Zones
– Conducting a system breakdown may give some indication of future
zones, but there is no direct one‐to‐one correlation between the two
– Systems = Collections of equipment/assets that logically function
together to perform at least one task
together to perform at least one task
– Zones = Collections of equipment/assets that logically have similar
security requirements
• System breakdown helps to identify different sets of equipment
d i h i k h
during the risk assessment phase
• Zones are created after the risk assessment phase based on the
particular security requirements for that set of equipment/assets
C d it i l ki d f t i i i ti
• Conduits are a special kind of zone containing a communication
channel
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
47
Design Considerations: SIS Air‐Gapped
vs Interfaced vs Integrated
vs. Interfaced vs. Integrated
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
48
Security Level Vector
i i
Discussion
• Industrial Security Isn’t
Always About Death &
y
Dismemberment
– Some security concepts don’t
fit into that model
h d l
• Use the Foundational
Requirements to Engineer
the System Security
Id tifi ti &
– Identification &
Authentication Control
– Use Control
– System Integrity
y g y
– Data Confidentiality
– Restricted Data Flow
– Timely Response to Events
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
– Resource Availability
49
Security Level Vector
i i
Discussion
• How will the switches affect
the security of the BPCS &
the security of the BPCS &
SIS?
– High availability is fairly
common
common
– Uncommon for switches to
have good access control
(natively)
– Confidentiality depends, is
SNMP enabled AND secured?
– If switch fails completely, what
h i i ?
happens to system integrity?
What about intermittent
failures, or bad ports? What
are the safety implications?
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
a e t e sa ety p cat o s
50
Security Level Vector
i i
Discussion
• Now, what about other
components?
components?
• How do each of the
component capabilities
component capabilities
roll into a system
capability?
/
– Mathematical/Additive?
– Qualitative assessment of
capabilities?
p
• How do capabilities
relate to achieved
i l l ?
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
security levels?
51
Security Lifecycles
Product
Development
Lifecycle
System
Integration
Lifecycle
System/Project
Lif l
Lifecycle
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
52
Security Lifecycle
Security Lifecycle
Business
Planning
Detail
Planning
Construction
Facility
Operations
Product
Facility
Planning
Implementation Startup &
Commissioning
Facility
Decommissioning
Supplier
Engineering
Entity
Asset
Owner
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
53
Owner
ISA SECURITY COMPLIANCE
ISA SECURITY COMPLIANCE
INSTITUTE (ISCI) ORGANIZATION
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
54
An ISA Owned Organization
An ISA Owned Organization
Automation
Standards
ISA
Standards
Compliance
Institute
ISA Security Compliance Institute
Interest Group
Industrial
Interoperability
Wireless
Other Interest
Groups
Governing Board
Technical Steering Working
g
Committee
g
Groups
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
55
ISA Security Compliance Institute (ISCI)
ISA Security Compliance Institute (ISCI)
Who We Are
Consortium of Asset Owners, Suppliers, and Industry Organizations formed in
2007 under the ISA Automation Standards Compliance Institute (ASCI):
i i
Mission
Establish a set of well‐engineered specifications and processes for the testing
and certification of critical control systems products
Decrease the time, cost, and risk of developing, acquiring, and deploying
control systems by establishing a collaborative industry‐based program
among asset owners suppliers and other stakeholders
among asset owners, suppliers, and other stakeholders
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
56
ISCI Member Companies
ISCI Member Companies
• ISCI membership is open to all organizations
b h l l
– Strategic membership level
– Technical membership level
– Informational membership level
• Current membership
– Chevron
– Egemin
– exida
– ExxonMobil
– Honeywell
– Invensys
Invensys
– Siemens
– Yokogawa
– IPA
ISA99/ISCI J i W ki G Li i
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
57 57
– ISA99/ISCI Joint Working Group Liaison
ISASecure Designation
ISASecure Designation
• Trademarked designation that provides instant
iti f d t it h t i ti d
recognition of product security characteristics and
capabilities.
• Independent Industry stamp of approval.
• Similar to ‘Safety Integrity Level’ Certification
(ISO/IEC 61508).
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
58
ANSI/ACLASS Accredited Conformance
h
Scheme
ISASecure Embedded Device Security Assurance (EDSA)
y ( )
certification accredited as an ISO/IEC Guide 65 conformance
scheme by ANSI/ACLASS. This includes both ISO/IEC 17025 and
ISO/IEC 17011
ISO/IEC 17011.
Go to www.ansi.org/isasecure for details.
1.Provides global recognition for ISASecure certification
2 Independent CB accreditation b ANSI/ACLASS
2.Independent CB accreditation by ANSI/ACLASS
3.ISASecure can scale on a global basis
4 Ensures certification process is open fair credible and
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
59
4.Ensures certification process is open, fair, credible, and
robust.
Why Do We Need Secure Devices
Why Do We Need Secure Devices
• Increased Industrial Control System exploits
Increased Industrial Control System exploits
and attacks
– Stuxnet
– Nearly 40 exploits released recently
• Hacker conferences starting to have control
g
system tracks
– Black Hat
– Hacker Halted
• Control systems using standard IT devices
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
y g
60
ISASecure Certification Specification
Process
• ISCI board defines scope and work process
p p
• Technical steering committee manages working groups
who draft specifications
• Specifications reviewed by external 3rd party if required
• Voted and approved by full ISCI voting membership
A d ifi ti d t d b ISCI G i
• Approved specifications adopted by ISCI Governing
Board and posted on website
• Specifications developed to‐date have been donated to
Specifications developed to date have been donated to
ISA for submission to the ISA99 Standards Committee
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
61
ISASecure Vendor Device Approval
Process
• Vendor submits device to ANSI ACLASS charted
lab
• Charted lab completes three part assessment
h ll l d f f l
– Physically evaluates device for functional security
(FSA)
– Conducts communication robustness test (CRT) using
( ) g
ISCI‐ appoved test tool
– Charted lab completes vendor audit (SDSA) on
software development practices
software development practices
• Charted lab issues final assessment report and
certification upon successful test and audit
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
62
ISA 62443/99 Work Products
ISA 62443/99 Work Products
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
63
ISCI Program Outreach
ISCI Program Outreach
• Website www.isasecure.org
• ISASecure EDSA Certification Specifications and
Program Definition Documents Approved and
Program Definition Documents Approved and
posted for public access at www.isasecure.org
d d d d h l
• ISCI Board donated EDSA FSA and SDSA technical
specification to ISA‐99 Committee via ISA99‐ISCI
Joint Working Group
• Webinar Series throughout 2011
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
64
ISASECURE EMBEDDED DEVICE
SECURITY ASSURANCE PROGRAM
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
65
Embedded Device
Embedded Device
• Special purpose device running embedded
software designed to directly monitor, control or
actuate an industrial process
• Examples:
– Programmable Logic Controller (PLC)
– Distributed Control System (DCS) controller
S f t L i S l
– Safety Logic Solver
– Programmable Automation Controller (PAC)
– Intelligent Electronic Device (IED)
– Digital Protective Relay
S S /C ll
– Smart Motor Starter/Controller
– SCADA Controller
– Remote Terminal Unit (RTU)
– Turbine controller
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
– Vibration monitoring controller
– Compressor controller
66
Embedded Device Security Assurance Certification
Detects and Avoids systematic design faults
• The vendor’s software development and maintenance
processes are audited
Integrated Threat Analysis
(ITA)
Detects Implementation Errors / Omissions
• A component’s security functionality is audited against its
• Ensures the organization follows a robust, secure software
development process
Software Development Security
Assurance (SDSA)
Identifies vulnerabilities in networks and devices
A component s security functionality is audited against its
derived requirements for its target security level
• Ensures the product has properly implemented the security
functional requirements
Functional Security Assessment
(FSA)
Identifies vulnerabilities in networks and devices
• A component’s communication robustness is tested against
communication robustness requirements
• Tests for vulnerabilities in the 4 layers of OSI Reference
Model
Communications Robustness
Testing (CRT)
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
ISASecure Levels
LEVEL 3
Requirements Necessary to Achieve Certification Levels
Level 1 Level 2 Level 3 Total Count in Specification
Software Development
Security Assessment
LEVEL 2
SDSA 130 149 170 170
FSA 20 49 82 82
CRT All All All
CRT Common Specification plus
all 6 Protocol CRT Specifications
Software Development
Software Development
Security Assessment
Functional Security
LEVEL 1
p
Security Assessment
Functional Security
Assessment
Functional Security
Assessment
Functional Security
Assessment
Communication Robustness Testing
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Communications Robustness Test (CRT)
• Measures the extent to which network protocol implementations on an embedded
device defends themselves and other device functions against unusual or
device defends themselves and other device functions against unusual or
intentionally malicious traffic received from the network.
• Inappropriate message response (s), or failure of the device to continue to
adequately maintain essential services, demonstrates potential security
adequately maintain essential services, demonstrates potential security
vulnerabilities within the device.
Communication Robustness Testing
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Functional Security Assessment (FSA)
Security Feature Tests
Purpose:
– Verification and validation that the device or system under test
incorporates a minimum set of security features needed to counteract
common security threats
Composition
– Set of requirements, derived from existing reference standards and
traceable to source standard
– One or more acceptable solutions (countermeasures) identified for
each requirement
– If applicable, procedures to verify the requirement has been satisfied
Functional Security Assessment
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Functional Security Assessment
Software Security Development Assessment
Secure Software Engineering
Purpose:
– Verification and validation that software for the device or system
under test was developed following appropriate engineering practices
p g pp p g g p
to minimize software errors that could lead to security vulnerabilities
Composition
– Set of requirements derived from existing reference standards and
Set of requirements, derived from existing reference standards and
traceable to source standard (IEC 61508, ISO/IEC 15408)
– One or more acceptable arguments identified for each requirement
Software Development Security Assessment
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
Security Development Lifecycle
Security Development Lifecycle
Security Management
Process
This phase specifies a process for planning and managing security development activities to ensure that security is designed
into a product. For example, this phase incorporates requirements that the development team have a security management
plan and that the developers assigned to the project are competent and have been provided basic training in good security
engineering practices and processes. Also includes requirements that the project team creates and follows a configuration
management plan.
Security Requirements
Specification
Most vulnerabilities and weaknesses in software intensive information systems can be traced to inadequate or incomplete
requirements. This phase requires that the project team document customer driven security requirements, security features
and the potential threats that drive the need for these features.
Software Architecture Design
Software architecture facilitates communication between stakeholders, documents early decisions about high‐level design,
and allows reuse of design components and patterns between projects This phase requires the project team develop a top‐
Software Architecture Design and allows reuse of design components and patterns between projects. This phase requires the project team develop a top‐
level software design and ensures that security is included in the design.
Security Risk Assessment and
Threat Modeling
This phase requires the project team determine which components can affect security and plan which components will require
security code reviews and security testing. Also requires that a threat model be created and documented for the product.
Detailed Software Design This phase requires the project team design the software down to the module level following security design best practices.
Document Security This phase requires the project team create guidelines that users of the product must follow to ensure security requirements
Document Security
Guidelines
This phase requires the project team create guidelines that users of the product must follow to ensure security requirements
are met.
Software Module
Implementation &
Verification
This phase requires the project team implement design by writing code following security coding guidelines. It ensures that
software modules are implemented correctly by conducting security code reviews, static analysis and module testing.
Security Integration Testing This phase requires that the project team perform security specific tests such as fuzz testing and penetration testing.
Security Process Verification This phase requires an independent assessment that all required software development processes have been followed
Security Response Planning
This phase requires the project team establish a process to be able to quickly respond to security issues found in the field if
and when they happen.
Security Validation Testing
This phase requires that the project team confirm that all security requirements have been met preferably by test or by
analysis.
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
72
Security Response Execution
This phase requires the project team respond to security problems in the field by taking action to both preventative and
corrective action.
EDSA Certification Process
Level 1 Level 2 Level 3
Typical Chartered Lab Level of Effort in Man Weeks
Level 1 Level 2 Level 3
1. CRT test all
accessible TCP/IP
interfaces
1 - 2 weeks 1 - 2 weeks 1 - 2 weeks
2. Perform FSA on
device and all
interfaces
< 1 week 1 week 1 – 2 weeks
3 A dit li ’ 1 k 1 2 k 1 2 k
3. Audit supplier’s
software
development
process
1 week 1 – 2 weeks 1 – 2 weeks
4. Perform ITA and
issue report
1 week 1 week 1 week
3 – 5 weeks 4 – 6 weeks 4 – 10 weeks
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
WHY ISASECURE?
WHY ISASECURE?
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
74
Benefits
Benefits
End‐user Supplier
End user
• Easy to specify
• Build security requirement
Supplier
• Evaluated once
• Recognition for effort
into RFP
• Reduced time in FAT/SAT
i l l f
• Build in security
• Product differentiator
• Know security level out of
the box
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
75
WHO TO CONTACT FOR MORE
WHO TO CONTACT FOR MORE
INFORMATION
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
76
Who to Contact to Certify Products
Who to Contact to Certify Products
ISASecure EDSA Chartered Lab
exida
John Cusimano
Director of Security Services
Phone: (215) 453‐1720
Fax: (215) 257‐1657
E il j i @ id
Email: jcusimano@exida.com
Website: http://www.exida.com
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
77
Who to contact for CRT Test Tool
Who to contact for CRT Test Tool
http://www wurldtech com
http://www.wurldtech.com
ld h S i h l i
Wurldtech Security Technologies, Inc.
Greg Maciel
A hill S l M
Achilles Sales Manager
Phone: (949) 300‐4040
Email: gmaciel@wurldtech com
Email: gmaciel@wurldtech.com
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
78
Who to contact for ISCI Membership
Who to contact for ISCI Membership
Andre Ristaino
Managing Director, ASCI
Direct Phone: 919‐990‐9222
Fax: 919‐549‐8288
Email aristaino@isa org
Email: aristaino@isa.org
Website: http://www.isasecure.org
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
79
Q&A
Q&A
Questions?
The power of knowing what MESA KNOWS
Copyright 2012, MESA International
80
The power of knowing what MESA KNOWS
Copyright 2012, MESA International

More Related Content

Similar to iec62443_compress.pdf

Affordably Refreshing Your Water District’s Process Control
Affordably Refreshing Your Water District’s Process ControlAffordably Refreshing Your Water District’s Process Control
Affordably Refreshing Your Water District’s Process ControlInductive Automation
 
GROUP 3 - Introduction to Electronics (1).pdf
GROUP 3 - Introduction to Electronics (1).pdfGROUP 3 - Introduction to Electronics (1).pdf
GROUP 3 - Introduction to Electronics (1).pdfMaffyAvellana
 
Trans Block Show
Trans Block ShowTrans Block Show
Trans Block Showmjsmith9
 
Cyber Security for SCADA
Cyber Security for SCADACyber Security for SCADA
Cyber Security for SCADARichard Umbrino
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Honeywell
 
Best Vaccuum circuit breaker manufacturers
 Best Vaccuum circuit breaker manufacturers Best Vaccuum circuit breaker manufacturers
Best Vaccuum circuit breaker manufacturersindiainternet17
 
IOT BASED AIR QUALITY INDEX MONITORING SYSTEM – MONITOR PM2.5, PM10, AND CO U...
IOT BASED AIR QUALITY INDEX MONITORING SYSTEM – MONITOR PM2.5, PM10, AND CO U...IOT BASED AIR QUALITY INDEX MONITORING SYSTEM – MONITOR PM2.5, PM10, AND CO U...
IOT BASED AIR QUALITY INDEX MONITORING SYSTEM – MONITOR PM2.5, PM10, AND CO U...DeepakK547422
 
Pc tech pitch deck
Pc tech pitch deckPc tech pitch deck
Pc tech pitch deckJune Barrett
 
PCTech Pitch Deck
PCTech Pitch DeckPCTech Pitch Deck
PCTech Pitch DeckDon Russell
 
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)Byres Security Inc.
 
Tutorials - History Evolution and Future of SCADA.pdf
Tutorials - History Evolution and Future of SCADA.pdfTutorials - History Evolution and Future of SCADA.pdf
Tutorials - History Evolution and Future of SCADA.pdfWesamAwad3
 
JOE DA COSTA -Linkedin
JOE DA COSTA -LinkedinJOE DA COSTA -Linkedin
JOE DA COSTA -LinkedinJoe Da Costa
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT SuccessElectric Imp
 
Emerson_Smart_Wireless_Solutions.pdf
Emerson_Smart_Wireless_Solutions.pdfEmerson_Smart_Wireless_Solutions.pdf
Emerson_Smart_Wireless_Solutions.pdfssuserd973fe
 
Deitz Resume LATEST REV
Deitz Resume LATEST REVDeitz Resume LATEST REV
Deitz Resume LATEST REVWayne Deitz
 

Similar to iec62443_compress.pdf (20)

Affordably Refreshing Your Water District’s Process Control
Affordably Refreshing Your Water District’s Process ControlAffordably Refreshing Your Water District’s Process Control
Affordably Refreshing Your Water District’s Process Control
 
GROUP 3 - Introduction to Electronics (1).pdf
GROUP 3 - Introduction to Electronics (1).pdfGROUP 3 - Introduction to Electronics (1).pdf
GROUP 3 - Introduction to Electronics (1).pdf
 
Trans Block Show
Trans Block ShowTrans Block Show
Trans Block Show
 
Cyber Security for SCADA
Cyber Security for SCADACyber Security for SCADA
Cyber Security for SCADA
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
 
Best Vaccuum circuit breaker manufacturers
 Best Vaccuum circuit breaker manufacturers Best Vaccuum circuit breaker manufacturers
Best Vaccuum circuit breaker manufacturers
 
IOT BASED AIR QUALITY INDEX MONITORING SYSTEM – MONITOR PM2.5, PM10, AND CO U...
IOT BASED AIR QUALITY INDEX MONITORING SYSTEM – MONITOR PM2.5, PM10, AND CO U...IOT BASED AIR QUALITY INDEX MONITORING SYSTEM – MONITOR PM2.5, PM10, AND CO U...
IOT BASED AIR QUALITY INDEX MONITORING SYSTEM – MONITOR PM2.5, PM10, AND CO U...
 
Pc tech pitch deck
Pc tech pitch deckPc tech pitch deck
Pc tech pitch deck
 
PCTech Pitch Deck
PCTech Pitch DeckPCTech Pitch Deck
PCTech Pitch Deck
 
Home automation
Home  automationHome  automation
Home automation
 
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
 
Tutorials - History Evolution and Future of SCADA.pdf
Tutorials - History Evolution and Future of SCADA.pdfTutorials - History Evolution and Future of SCADA.pdf
Tutorials - History Evolution and Future of SCADA.pdf
 
JOE DA COSTA -Linkedin
JOE DA COSTA -LinkedinJOE DA COSTA -Linkedin
JOE DA COSTA -Linkedin
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Electronics project database
Electronics project databaseElectronics project database
Electronics project database
 
No Safety Without Security
No Safety Without SecurityNo Safety Without Security
No Safety Without Security
 
Emerson_Smart_Wireless_Solutions.pdf
Emerson_Smart_Wireless_Solutions.pdfEmerson_Smart_Wireless_Solutions.pdf
Emerson_Smart_Wireless_Solutions.pdf
 
MS(CDR)
MS(CDR)MS(CDR)
MS(CDR)
 
Deitz Resume LATEST REV
Deitz Resume LATEST REVDeitz Resume LATEST REV
Deitz Resume LATEST REV
 
Cnt20111201
Cnt20111201Cnt20111201
Cnt20111201
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

iec62443_compress.pdf

  • 1. Applying ISA/IEC 62443 to Control Systems Graham Speake MESAKNOWS Additional l Principal Systems Architect Yokogawa SUSTAINABILITY & ECO‐EFFICIENCY ‐ LEAN ‐ METRICS & PERFORMANCE MANAGEMENT INFORMATION INTEGRATION ‐ SAFETY ‐ ASSET PERFORMANCE MANAGEMENT ‐ B2MML QUALITY & COMPLIANCE ‐ PRODUCT LIFECYCLE MANAGEMENT ‐ AUTOMATION MESAKNOWS partner logos Do you know MESA?
  • 2. Graham Speake • BSc Electrical and Electronics Engineer g • 16 years experience in computer security • 12 Years experience in automation security p y • Worked for Ford Motor Company, ICS, ATOS‐ Origin and BP • Worked as an independent consultant on financial security b f 2 • Member of ISA, ISCI, ISC2 • Principal Systems Architect at Yokogawa The power of knowing what MESA KNOWS Copyright 2012, MESA International 2
  • 3. ACRONYMS ACRONYMS The power of knowing what MESA KNOWS Copyright 2012, MESA International 3
  • 4. Acronyms Acronyms • SCADA DCS PCN industrial automation SCADA, DCS, PCN, industrial automation • PLC, embedded controller l • Process control • HMI • PI, Historian The power of knowing what MESA KNOWS Copyright 2012, MESA International 4
  • 5. Acronyms ‐2 Acronyms 2 • Whitelisting Whitelisting • IDS S • IPS • phising The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 6. Language difficulties Language difficulties I am not in the office at the moment. Send any The power of knowing what MESA KNOWS Copyright 2012, MESA International work to be translated
  • 7. PROCESS CONTROL PROCESS CONTROL The power of knowing what MESA KNOWS Copyright 2012, MESA International 7
  • 8. What do we mean by Process Control? What do we mean by Process Control? Is this process control? The power of knowing what MESA KNOWS Copyright 2012, MESA International 8
  • 9. What do we mean by Process Control? What do we mean by Process Control? How about these? The power of knowing what MESA KNOWS Copyright 2012, MESA International 9
  • 10. Process Control in this context is: Process Control in this context is: The power of knowing what MESA KNOWS Copyright 2012, MESA International 10
  • 11. Level Control Example Level Control Example Variable flow into tank (rate not under our control) As the level in the tank increases, the level controller progressively h l l i i opens the outlet valve to maintain the level in the tank. As the level decreases, the t ll l th l Set controller closes the valve Point Level Controller The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 12. Control up to 60’s Control up to 60 s Variable flow into tank (rate not under our control) Pneumatic signal proportional to the k l l control) tank level Pneumatic signal from controller to valve Thumbwheel on controller to determine set point point Level Controller The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 13. Control in the late 60’s & early 70’s Control in the late 60 s & early 70 s 100 Electronic controller located remote from plant in control room. Operator set point entry is still via thumbwheel 0 Electrical signal proportional to the tank level p y Electrical signal from controller to valve The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 14. The 1970’s The Distributed C t l S t Control System An Operator Station, level indicated on a screen, operator changes set point via keyboard for the first time! Data Hiway Basic Controller Data Hiway Electrical signals to/from controller , controller handles 8 loop at once The power of knowing what MESA KNOWS Copyright 2012, MESA International controller handles 8 loop at once
  • 15. The 1970’s The Distributed C t l S t Control System Multiple Operator Stations, one operator can control a refining unit Data Hiway Basic Controller Basic Controller Basic Controller Basic Controller #1 Basic Controller #2 Basic Controller #32 The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 16. 1980’s The DCS evolves 1980 s The DCS evolves More powerful op stns Business systems Local Control Network Gateway Gateway Basic Gateway Basic Gateway Process Basic Controller Basic Controller Basic Controller Basic Controller Process Manager Process Manager Basic Controller Basic Controller Process Manager The power of knowing what MESA KNOWS Copyright 2012, MESA International Data Hiway Data Hiway Universal Control Network
  • 17. 1990’s COTS arrive on the scene 1990 s COTS arrive on the scene Business Network G t t Process Control Network TCP/IP Op Stn is a PC with a Vendor PCI card Gateway to business systems is a PC Local Control Network The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 18. 2000’s Everything connected! Remote Users System Server Operator Stations Supervisory Controller Engineering Station www [to plant IT network] Remote Server Multi-loop PCN p Controller Direct I/O Module Other Industrial Devices
  • 19. 2001, Security Arrives 2001, Security Arrives Business network The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 20. Cyber Security Overview Cyber Security Overview • Changing Compliance environment NERC CIP ISO/IEC 17799 API 1164 NIST ISA NERC CIP, ISO/IEC 17799, API 1164, NIST, ISA • More aggressive organized Cyber threats • “…a weapon of mass disruption..” President Obama May 29, 2009 President Obama May 29, 2009 • Confluence of technologies There are few industry experts IT Enterprise Security Control Security Systems Control system cyber The power of knowing what MESA KNOWS Copyright 2012, MESA International security
  • 21. OVERVIEW OF ARCHITECTURE OVERVIEW OF ARCHITECTURE The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 22. Two‐Tiered Network Architecture Two Tiered Network Architecture The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 23. Three‐Tiered Network Architecture Three Tiered Network Architecture The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 24. WHY SECURITY? WHY SECURITY? The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 25. Incident: Sewage Spill in Australia Incident: Sewage Spill in Australia • Between January 2000 and April 2000 th M h Shi 2000, the Maroochy Shire sewage treatment plant in Queensland, Australia experienced 47 unexplained faults faults. • Millions of liters of raw sewage spilled out into local parks, rivers and even the grounds of a Hyatt Regency even the grounds of a Hyatt Regency hotel. • Marine life died, the creek water turned black and the stench was turned black and the stench was unbearable for residents, said Janelle Bryant of the Australian Environmental Protection Agency The power of knowing what MESA KNOWS Copyright 2012, MESA International Environmental Protection Agency.
  • 26. Incident: Sewage Spill in Australia Incident: Sewage Spill in Australia • On October 31, 2001, Vitek Boden was convicted of 26 counts of illf ll i t i t d t t d d 1 t willfully using a restricted computer to cause damage and 1 count of causing serious environmental harm. • Boden worked for the contractor involved in the installation of the sewage treatment plant in the state of Queensland in Australia He sewage treatment plant in the state of Queensland in Australia. He left the contractor in December 1999 and approached the shire for employment. He was refused. • Boden made at least 46 attempts to take control of the sewage system during March and April 2000. On April 23, the date of Boden's last hacking attempt, police who pulled over his car found radio and computer equipment. • Later investigations found Boden's laptop had been used at the • Later investigations found Boden s laptop had been used at the time of the attacks and his hard drive contained software for accessing and controlling the sewage management system. The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 27. Incident: Virus Attacks Train Signaling System • In August 2003, a computer virus was bl d f b i i d t i i li blamed for bringing down train signaling systems throughout the eastern U.S. The signaling outage briefly affected the entire CSX system, which covers 23 states east of y , the Mississippi River. • The virus infected the computer system at CSX Corp's Jacksonville, Fla., headquarters, shutting down signaling dispatching and shutting down signaling, dispatching, and other systems at about 1:15am EDT, CSX spokesman Adam Hollingsworth said, The cause was believed to be a worm virus similar to those that have infected the systems of major companies and agencies in recent days. The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 28. Incident: Gasoline Pipeline Rupture Incident: Gasoline Pipeline Rupture • In June 1999, a 16‐inch‐diameter steel pipeline owned by The Olympic Pipe Line Company ruptured and released about 237 000 Olympic Pipe Line Company ruptured and released about 237,000 gallons of gasoline into a creek that flowed through Whatcom Falls Park in Bellingham, Washington. • About 1 1/2 hours after the rupture, the gasoline ignited and burned about 1 1/2 miles along the creek Two 10 year old boys burned about 1 1/2 miles along the creek. Two 10‐year‐old boys and an 18‐year‐old young man died as a result of the accident. Eight additional injuries were documented. • A single‐family residence and the city of Bellingham's water l l d d Ol i i d h treatment plant were severely damaged. Olympic estimated that total property damages were at least $45 million. The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 29. Incident: Gasoline Pipeline Rupture Incident: Gasoline Pipeline Rupture • One of the causes of the accident was Olympic Pipe Line Company's practice of performing database development work on the SCADA system while the system was being used to operate the pipeline. y g p p p • Shortly before the rupture, new records for pump vibration data were entered into the SCADA historical database. The records were created by a pipeline database. The records were created by a pipeline controller who had been temporarily assigned as a computer system administrator. • According to the accident report the database updates • According to the accident report, the database updates led to the system's becoming non‐responsive at a critical time during pipeline operations. The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 30. Incident: Sasser Worm Disrupts d Coastgaurd Computers in UK • In May 2004, coastguard stations around the UK were severely disrupted after a computer worm brought down IT systems. The Sasser worm hit all 19 coastguard stations and the service's main headquarters, leaving staff reliant on paper maps and pens. • The Maritime and Coastguard Agency said staff had reverted to manual map reading as soon as its computerized mapping systems started to fail. Coastguard staff were still able to use telephones and radios but fax and l hi h d b f i telex machines had been put out of action. The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 31. Accidental Incidents Accidental Incidents • Accidental incidents remain a serious concern: Accidental incidents remain a serious concern: – PLCs crashed by IT security audit. DCS data feed causes gateway failure – DCS data feed causes gateway failure. – Duplicate IP address prevents machine startup. IP dd h h t d h i l l t – IP address change shuts down chemical plant. The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 32. Today’s threats? Today s threats? • Targeted attacks Targeted attacks • Spearphising l • Employees The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 33. OVERVIEW OF ISA/IEC STANDARDS OVERVIEW OF ISA/IEC STANDARDS The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 34. Overview Overview • The Situation The Situation • Chlorine Truck Loading Use Case i & i k • Design & Risk Management Process • Systems vs. Zones & Conduits • Design Considerations • Security Level Vector Discussion Security Level Vector Discussion The power of knowing what MESA KNOWS Copyright 2012, MESA International 34
  • 35. The Situation The Situation • The Problem h d d h h d k h b ? – With so many standards out there, how do you pick the best one? – Once you’ve picked a set of standards, how do you apply them? • Security Standards – ISA/IEC 62443 (13) ISA/IEC 62443 (13) – ISO/IEC 2700x (10+) – NIST FIPS and SP800 (7+) – NERC CIP (8) S G id (?) IT Standards – Smart Grid (?) • And that’s just the security standards, then take into account the functional standards – Wireless = ISA 100.11a, WirelessHART, Zigbee, WiFi, Bluetooth… Sector‐Specific Standards , , g , , – Safety = ISA 84, IEC 61508/61511, DO‐254, OSHA… – Management = ISO 9000, 14000, 31000, 50001, Six‐Sigma… – And plenty of others… The power of knowing what MESA KNOWS Copyright 2012, MESA International 35
  • 36. ISA/IEC 62443 Series (Proposed) ISA/IEC 62443 Series (Proposed) The power of knowing what MESA KNOWS Copyright 2012, MESA International 36
  • 37. Zones and Conduits Zones and Conduits The power of knowing what MESA KNOWS Copyright 2012, MESA International 37
  • 38. Security Standards Security Standards • Security standards generally tell you what has to be done or specified, but don’t tell you how to go about doing it don’t tell you how to go about doing it – Functional specifications – Security controls/countermeasures • Some standards show a generic process, but leave it up to the reader to g p , p apply it in their case • A few use‐cases exist, but many times these are: – Sector‐specific O l l i t i – Only apply in certain cases – Limited in scope • Very few end‐users discuss the details of their processes – Restrict information from potential attackers p • Almost no vendors or system integrators discuss the details of their processes – Restrict information from potential competitors The power of knowing what MESA KNOWS Copyright 2012, MESA International 38
  • 39. Chlorine Truck Loading Use Case Chlorine Truck Loading Use Case • Setting the Stage – ISA99 is trying to use a single use‐case throughout the entire series to show how each part of the standard fits into the process Whil th hl i t k l di l i l t d t th – While the chlorine truck loading example is related to the chemical industry, the concepts presented could relate to any industry – The example allows for somewhat more realistic discussions of The example allows for somewhat more realistic discussions of risk than in an IT‐focused, DHS‐focused, or purely hypothetical example • Use case in early development and idea phase y p p – Will take quite a long time to complete entire use‐case – Different parts of use‐case will probably emerge at different times The power of knowing what MESA KNOWS Copyright 2012, MESA International 39
  • 40. Chlorine Truck Loading Use Case: h The Narrative • Pharmaceutical Company XYZCorp d d ( ll) – Wants to start producing new product (FixItAll) – No room for new production plant at existing facilities – Chemical process requires relatively small amounts of chlorine – Existing facility produces chlorine in large enough quantities g y p g g q • XYZCorp considers their options – Conducts business assessment of building new facility • Existing facilities all near space capacity N f ili h d d • New facility has good access to roads • Land is suitable and available • Existing chlorine production facility over 50 miles away – Considers options for transporting chlorine p p g • Pipeline • Rail • Truck The power of knowing what MESA KNOWS Copyright 2012, MESA International 40
  • 41. Chlorine Truck Loading Use‐Case: h l The Plan • Build truck loading/unloading facilities – Loading @ existing facility, unloading @ new facility – Unmanned except during loading/unloading operations – Hazardous chemical requires special handling & safety G ti f i t • Generations of equipment – Existing facility uses legacy equipment (brown‐field) – New facility designed with current technology (green‐field) • Facility monitoring & control • Facility monitoring & control – Unmanned – centralized monitoring @ control center – Manned & operational – local control with both local & centralized monitoring monitoring • Attached to business systems – Billing & logistics – Inventory tracking The power of knowing what MESA KNOWS Copyright 2012, MESA International y g 41
  • 42. Chlorine Truck Loading Use Case: d Design Considerations • Systems needed Syste s eeded – Safety Instrumented System (SIS) – Basic Process Control System (BPCS) – Control center – Plant DMZ – Enterprise systems • Level of SIS integration with BPCS? Ai d – Air‐gapped – Interfaced – Integrated The power of knowing what MESA KNOWS Copyright 2012, MESA International – Integrated 42
  • 43. Initial Design Process: d f h l Identify the Control Assets • Process Equipment – Pump Controller – Transmitters – Block and Control Valves • BPCS & SIS – Functional Safety‐PLC – Control PLC – Engineering Workstation(s) – Instrument Asset Management System – Human‐Machine Interface(s) C t l C t • Control Center – Control Center Workstations • Plant DMZ – Data Historian i • Enterprise – Enterprise Web Server – Enterprise WLAN – Business Logistics System Billing S stem The power of knowing what MESA KNOWS Copyright 2012, MESA International – Billing System 43
  • 44. NOW WHAT??? NOW WHAT??? The power of knowing what MESA KNOWS Copyright 2012, MESA International 44
  • 45. Design Process Design Process • Now that the business case and some initial design ideas have been put down, where do you go from here? A. Design the control system without worrying about the g y y g security? B. Design everything so secure that it becomes unusable? C Throw in firewalls everywhere? C. Throw in firewalls everywhere? D. Conduct a detailed risk assessment at the device level? E. Conduct a multi‐stage risk assessment starting with the top level and working down to the low level as the design top level and working down to the low level as the design progresses? • Generally, the ISA99 approach begins with E The power of knowing what MESA KNOWS Copyright 2012, MESA International 45
  • 46. Modified ISO/IEC 27005 Risk Management Process • ISA99, Working Group 2 ki difi d working on modified ISO/IEC 27005 risk management process U b i h ll f 27005 – Uses basic shell from 27005 – Modifies it for multi‐stage risk assessment process Discusses “jump in” point – Discusses “jump‐in” point – Relates risk management process to overall cyber security management security management system design process • Business planning • Change management The power of knowing what MESA KNOWS Copyright 2012, MESA International 46 • Decommissioning
  • 47. Systems vs. Zones & Conduits Systems vs. Zones & Conduits • Systems ≠ Zones – Conducting a system breakdown may give some indication of future zones, but there is no direct one‐to‐one correlation between the two – Systems = Collections of equipment/assets that logically function together to perform at least one task together to perform at least one task – Zones = Collections of equipment/assets that logically have similar security requirements • System breakdown helps to identify different sets of equipment d i h i k h during the risk assessment phase • Zones are created after the risk assessment phase based on the particular security requirements for that set of equipment/assets C d it i l ki d f t i i i ti • Conduits are a special kind of zone containing a communication channel The power of knowing what MESA KNOWS Copyright 2012, MESA International 47
  • 48. Design Considerations: SIS Air‐Gapped vs Interfaced vs Integrated vs. Interfaced vs. Integrated The power of knowing what MESA KNOWS Copyright 2012, MESA International 48
  • 49. Security Level Vector i i Discussion • Industrial Security Isn’t Always About Death & y Dismemberment – Some security concepts don’t fit into that model h d l • Use the Foundational Requirements to Engineer the System Security Id tifi ti & – Identification & Authentication Control – Use Control – System Integrity y g y – Data Confidentiality – Restricted Data Flow – Timely Response to Events The power of knowing what MESA KNOWS Copyright 2012, MESA International – Resource Availability 49
  • 50. Security Level Vector i i Discussion • How will the switches affect the security of the BPCS & the security of the BPCS & SIS? – High availability is fairly common common – Uncommon for switches to have good access control (natively) – Confidentiality depends, is SNMP enabled AND secured? – If switch fails completely, what h i i ? happens to system integrity? What about intermittent failures, or bad ports? What are the safety implications? The power of knowing what MESA KNOWS Copyright 2012, MESA International a e t e sa ety p cat o s 50
  • 51. Security Level Vector i i Discussion • Now, what about other components? components? • How do each of the component capabilities component capabilities roll into a system capability? / – Mathematical/Additive? – Qualitative assessment of capabilities? p • How do capabilities relate to achieved i l l ? The power of knowing what MESA KNOWS Copyright 2012, MESA International security levels? 51
  • 53. Security Lifecycle Security Lifecycle Business Planning Detail Planning Construction Facility Operations Product Facility Planning Implementation Startup & Commissioning Facility Decommissioning Supplier Engineering Entity Asset Owner The power of knowing what MESA KNOWS Copyright 2012, MESA International 53 Owner
  • 54. ISA SECURITY COMPLIANCE ISA SECURITY COMPLIANCE INSTITUTE (ISCI) ORGANIZATION The power of knowing what MESA KNOWS Copyright 2012, MESA International 54
  • 55. An ISA Owned Organization An ISA Owned Organization Automation Standards ISA Standards Compliance Institute ISA Security Compliance Institute Interest Group Industrial Interoperability Wireless Other Interest Groups Governing Board Technical Steering Working g Committee g Groups The power of knowing what MESA KNOWS Copyright 2012, MESA International 55
  • 56. ISA Security Compliance Institute (ISCI) ISA Security Compliance Institute (ISCI) Who We Are Consortium of Asset Owners, Suppliers, and Industry Organizations formed in 2007 under the ISA Automation Standards Compliance Institute (ASCI): i i Mission Establish a set of well‐engineered specifications and processes for the testing and certification of critical control systems products Decrease the time, cost, and risk of developing, acquiring, and deploying control systems by establishing a collaborative industry‐based program among asset owners suppliers and other stakeholders among asset owners, suppliers, and other stakeholders The power of knowing what MESA KNOWS Copyright 2012, MESA International 56
  • 57. ISCI Member Companies ISCI Member Companies • ISCI membership is open to all organizations b h l l – Strategic membership level – Technical membership level – Informational membership level • Current membership – Chevron – Egemin – exida – ExxonMobil – Honeywell – Invensys Invensys – Siemens – Yokogawa – IPA ISA99/ISCI J i W ki G Li i The power of knowing what MESA KNOWS Copyright 2012, MESA International 57 57 – ISA99/ISCI Joint Working Group Liaison
  • 58. ISASecure Designation ISASecure Designation • Trademarked designation that provides instant iti f d t it h t i ti d recognition of product security characteristics and capabilities. • Independent Industry stamp of approval. • Similar to ‘Safety Integrity Level’ Certification (ISO/IEC 61508). The power of knowing what MESA KNOWS Copyright 2012, MESA International 58
  • 59. ANSI/ACLASS Accredited Conformance h Scheme ISASecure Embedded Device Security Assurance (EDSA) y ( ) certification accredited as an ISO/IEC Guide 65 conformance scheme by ANSI/ACLASS. This includes both ISO/IEC 17025 and ISO/IEC 17011 ISO/IEC 17011. Go to www.ansi.org/isasecure for details. 1.Provides global recognition for ISASecure certification 2 Independent CB accreditation b ANSI/ACLASS 2.Independent CB accreditation by ANSI/ACLASS 3.ISASecure can scale on a global basis 4 Ensures certification process is open fair credible and The power of knowing what MESA KNOWS Copyright 2012, MESA International 59 4.Ensures certification process is open, fair, credible, and robust.
  • 60. Why Do We Need Secure Devices Why Do We Need Secure Devices • Increased Industrial Control System exploits Increased Industrial Control System exploits and attacks – Stuxnet – Nearly 40 exploits released recently • Hacker conferences starting to have control g system tracks – Black Hat – Hacker Halted • Control systems using standard IT devices The power of knowing what MESA KNOWS Copyright 2012, MESA International y g 60
  • 61. ISASecure Certification Specification Process • ISCI board defines scope and work process p p • Technical steering committee manages working groups who draft specifications • Specifications reviewed by external 3rd party if required • Voted and approved by full ISCI voting membership A d ifi ti d t d b ISCI G i • Approved specifications adopted by ISCI Governing Board and posted on website • Specifications developed to‐date have been donated to Specifications developed to date have been donated to ISA for submission to the ISA99 Standards Committee The power of knowing what MESA KNOWS Copyright 2012, MESA International 61
  • 62. ISASecure Vendor Device Approval Process • Vendor submits device to ANSI ACLASS charted lab • Charted lab completes three part assessment h ll l d f f l – Physically evaluates device for functional security (FSA) – Conducts communication robustness test (CRT) using ( ) g ISCI‐ appoved test tool – Charted lab completes vendor audit (SDSA) on software development practices software development practices • Charted lab issues final assessment report and certification upon successful test and audit The power of knowing what MESA KNOWS Copyright 2012, MESA International 62
  • 63. ISA 62443/99 Work Products ISA 62443/99 Work Products The power of knowing what MESA KNOWS Copyright 2012, MESA International 63
  • 64. ISCI Program Outreach ISCI Program Outreach • Website www.isasecure.org • ISASecure EDSA Certification Specifications and Program Definition Documents Approved and Program Definition Documents Approved and posted for public access at www.isasecure.org d d d d h l • ISCI Board donated EDSA FSA and SDSA technical specification to ISA‐99 Committee via ISA99‐ISCI Joint Working Group • Webinar Series throughout 2011 The power of knowing what MESA KNOWS Copyright 2012, MESA International 64
  • 65. ISASECURE EMBEDDED DEVICE SECURITY ASSURANCE PROGRAM The power of knowing what MESA KNOWS Copyright 2012, MESA International 65
  • 66. Embedded Device Embedded Device • Special purpose device running embedded software designed to directly monitor, control or actuate an industrial process • Examples: – Programmable Logic Controller (PLC) – Distributed Control System (DCS) controller S f t L i S l – Safety Logic Solver – Programmable Automation Controller (PAC) – Intelligent Electronic Device (IED) – Digital Protective Relay S S /C ll – Smart Motor Starter/Controller – SCADA Controller – Remote Terminal Unit (RTU) – Turbine controller The power of knowing what MESA KNOWS Copyright 2012, MESA International – Vibration monitoring controller – Compressor controller 66
  • 67. Embedded Device Security Assurance Certification Detects and Avoids systematic design faults • The vendor’s software development and maintenance processes are audited Integrated Threat Analysis (ITA) Detects Implementation Errors / Omissions • A component’s security functionality is audited against its • Ensures the organization follows a robust, secure software development process Software Development Security Assurance (SDSA) Identifies vulnerabilities in networks and devices A component s security functionality is audited against its derived requirements for its target security level • Ensures the product has properly implemented the security functional requirements Functional Security Assessment (FSA) Identifies vulnerabilities in networks and devices • A component’s communication robustness is tested against communication robustness requirements • Tests for vulnerabilities in the 4 layers of OSI Reference Model Communications Robustness Testing (CRT) The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 68. ISASecure Levels LEVEL 3 Requirements Necessary to Achieve Certification Levels Level 1 Level 2 Level 3 Total Count in Specification Software Development Security Assessment LEVEL 2 SDSA 130 149 170 170 FSA 20 49 82 82 CRT All All All CRT Common Specification plus all 6 Protocol CRT Specifications Software Development Software Development Security Assessment Functional Security LEVEL 1 p Security Assessment Functional Security Assessment Functional Security Assessment Functional Security Assessment Communication Robustness Testing The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 69. Communications Robustness Test (CRT) • Measures the extent to which network protocol implementations on an embedded device defends themselves and other device functions against unusual or device defends themselves and other device functions against unusual or intentionally malicious traffic received from the network. • Inappropriate message response (s), or failure of the device to continue to adequately maintain essential services, demonstrates potential security adequately maintain essential services, demonstrates potential security vulnerabilities within the device. Communication Robustness Testing The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 70. Functional Security Assessment (FSA) Security Feature Tests Purpose: – Verification and validation that the device or system under test incorporates a minimum set of security features needed to counteract common security threats Composition – Set of requirements, derived from existing reference standards and traceable to source standard – One or more acceptable solutions (countermeasures) identified for each requirement – If applicable, procedures to verify the requirement has been satisfied Functional Security Assessment The power of knowing what MESA KNOWS Copyright 2012, MESA International Functional Security Assessment
  • 71. Software Security Development Assessment Secure Software Engineering Purpose: – Verification and validation that software for the device or system under test was developed following appropriate engineering practices p g pp p g g p to minimize software errors that could lead to security vulnerabilities Composition – Set of requirements derived from existing reference standards and Set of requirements, derived from existing reference standards and traceable to source standard (IEC 61508, ISO/IEC 15408) – One or more acceptable arguments identified for each requirement Software Development Security Assessment The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 72. Security Development Lifecycle Security Development Lifecycle Security Management Process This phase specifies a process for planning and managing security development activities to ensure that security is designed into a product. For example, this phase incorporates requirements that the development team have a security management plan and that the developers assigned to the project are competent and have been provided basic training in good security engineering practices and processes. Also includes requirements that the project team creates and follows a configuration management plan. Security Requirements Specification Most vulnerabilities and weaknesses in software intensive information systems can be traced to inadequate or incomplete requirements. This phase requires that the project team document customer driven security requirements, security features and the potential threats that drive the need for these features. Software Architecture Design Software architecture facilitates communication between stakeholders, documents early decisions about high‐level design, and allows reuse of design components and patterns between projects This phase requires the project team develop a top‐ Software Architecture Design and allows reuse of design components and patterns between projects. This phase requires the project team develop a top‐ level software design and ensures that security is included in the design. Security Risk Assessment and Threat Modeling This phase requires the project team determine which components can affect security and plan which components will require security code reviews and security testing. Also requires that a threat model be created and documented for the product. Detailed Software Design This phase requires the project team design the software down to the module level following security design best practices. Document Security This phase requires the project team create guidelines that users of the product must follow to ensure security requirements Document Security Guidelines This phase requires the project team create guidelines that users of the product must follow to ensure security requirements are met. Software Module Implementation & Verification This phase requires the project team implement design by writing code following security coding guidelines. It ensures that software modules are implemented correctly by conducting security code reviews, static analysis and module testing. Security Integration Testing This phase requires that the project team perform security specific tests such as fuzz testing and penetration testing. Security Process Verification This phase requires an independent assessment that all required software development processes have been followed Security Response Planning This phase requires the project team establish a process to be able to quickly respond to security issues found in the field if and when they happen. Security Validation Testing This phase requires that the project team confirm that all security requirements have been met preferably by test or by analysis. The power of knowing what MESA KNOWS Copyright 2012, MESA International 72 Security Response Execution This phase requires the project team respond to security problems in the field by taking action to both preventative and corrective action.
  • 73. EDSA Certification Process Level 1 Level 2 Level 3 Typical Chartered Lab Level of Effort in Man Weeks Level 1 Level 2 Level 3 1. CRT test all accessible TCP/IP interfaces 1 - 2 weeks 1 - 2 weeks 1 - 2 weeks 2. Perform FSA on device and all interfaces < 1 week 1 week 1 – 2 weeks 3 A dit li ’ 1 k 1 2 k 1 2 k 3. Audit supplier’s software development process 1 week 1 – 2 weeks 1 – 2 weeks 4. Perform ITA and issue report 1 week 1 week 1 week 3 – 5 weeks 4 – 6 weeks 4 – 10 weeks The power of knowing what MESA KNOWS Copyright 2012, MESA International
  • 74. WHY ISASECURE? WHY ISASECURE? The power of knowing what MESA KNOWS Copyright 2012, MESA International 74
  • 75. Benefits Benefits End‐user Supplier End user • Easy to specify • Build security requirement Supplier • Evaluated once • Recognition for effort into RFP • Reduced time in FAT/SAT i l l f • Build in security • Product differentiator • Know security level out of the box The power of knowing what MESA KNOWS Copyright 2012, MESA International 75
  • 76. WHO TO CONTACT FOR MORE WHO TO CONTACT FOR MORE INFORMATION The power of knowing what MESA KNOWS Copyright 2012, MESA International 76
  • 77. Who to Contact to Certify Products Who to Contact to Certify Products ISASecure EDSA Chartered Lab exida John Cusimano Director of Security Services Phone: (215) 453‐1720 Fax: (215) 257‐1657 E il j i @ id Email: jcusimano@exida.com Website: http://www.exida.com The power of knowing what MESA KNOWS Copyright 2012, MESA International 77
  • 78. Who to contact for CRT Test Tool Who to contact for CRT Test Tool http://www wurldtech com http://www.wurldtech.com ld h S i h l i Wurldtech Security Technologies, Inc. Greg Maciel A hill S l M Achilles Sales Manager Phone: (949) 300‐4040 Email: gmaciel@wurldtech com Email: gmaciel@wurldtech.com The power of knowing what MESA KNOWS Copyright 2012, MESA International 78
  • 79. Who to contact for ISCI Membership Who to contact for ISCI Membership Andre Ristaino Managing Director, ASCI Direct Phone: 919‐990‐9222 Fax: 919‐549‐8288 Email aristaino@isa org Email: aristaino@isa.org Website: http://www.isasecure.org The power of knowing what MESA KNOWS Copyright 2012, MESA International 79
  • 80. Q&A Q&A Questions? The power of knowing what MESA KNOWS Copyright 2012, MESA International 80
  • 81. The power of knowing what MESA KNOWS Copyright 2012, MESA International