Differentiation ISO 27001 IEC 62443 PDF
Differentiation ISO 27001 IEC 62443 PDF
Differentiation ISO 27001 IEC 62443 PDF
W HITEPA PER
Differentiation of the
IT security standard series
ISO 27000 and IEC 62443
A view of automation systems in the
manufacturing and process industries
Differentiation of the IT security standard series ISO 27000 and IEC 62443
NOTE: This is a courtesy translation only. In case of discrepancy between the German lan-
guage original text and the English language translation, the German version shall prevail.
This includes any extracts from standards as they have been taken from the German standard
versions, not from the official English equivalents.
This white paper was created in cooperation with ABB AG, Heidelberg, Germany.
Disclaimer: The information on which this document is based has been researched with the
greatest possible care. However, the document is made available without any guarantee. The
author expressly rejects any kind of contractual or legal liability for this document. Under no
circumstances shall the author be responsible for any damage that might result from errors
or missing information in this document. Logos and brand names have been used without
reference to any existing property rights.
Table of contents
1. Introduction........................................................................................................................................................ 1
2. Overview of IT security norms and standards ....................................................................................... 2
2.1. The ISO 27000 series of standards .................................................................................................. 2
2.1.1. Vocabulary and overview ........................................................................................................... 3
2.1.2. Requirements.................................................................................................................................. 4
2.1.3. General guidelines ........................................................................................................................ 4
2.1.4. Sector-specific guidelines .......................................................................................................... 6
2.1.5. Further literature on ISO 27000 ............................................................................................... 6
2.2. The IEC 62443 series of standards ................................................................................................... 7
2.2.1. General basics................................................................................................................................. 7
2.2.2. Operators and service providers ............................................................................................. 8
2.2.3. Requirements for automation systems ................................................................................. 9
2.2.4. Automation component requirements ............................................................................... 10
2.2.5. Assigning IEC 62443 standard parts to stakeholders in the security process ...... 12
2.2.6. Further literature on IEC 62443.............................................................................................. 13
3. Differentiation of the IT security standards .......................................................................................... 14
3.1. Differentiation of the OT and IT application domains ........................................................... 14
3.2. Differences and similarities between ISO 27000 and IEC 62443 ........................................ 16
3.3. Overlapping of the requirements of IEC 62443 and ISO 27000 ......................................... 18
4. Summary and recommendation ............................................................................................................... 19
5. Appendix: Application to a wastewater treatment plant................................................................. 20
5.1. Risk assessment for wastewater treatment plants ................................................................... 20
5.2. Critical infrastructure or not? ........................................................................................................... 21
5.3. Applicable norms and standards for water / wastewater technology ............................. 23
5.3.1. Applying the ISO 27000 series of standards to wastewater treatment plants..... 23
5.3.2. Applying the IEC 62443 series of standards to wastewater treatment plants ..... 23
5.3.3. Use of the industry-specific security standard for water/wastewater (B3S WA) . 24
6. References ......................................................................................................................................................... 26
6.1. List of figures.......................................................................................................................................... 26
6.2. List of tables ........................................................................................................................................... 26
6.3. Literature cited ...................................................................................................................................... 27
1. Introduction
Planners and operators of production facilities are faced with the question of which standards
are to be adhered to for the IT security concepts and, if necessary, also for auditing these fa-
cilities. Since the responsibility for IT security for operational technology (OT) often lies in dif-
ferent hands than for information technology (IT), there are occasionally divergent views as to
which standards are to be used as a basis.
People from the IT environment usually focus on the ISO 27001 series of standards, while
people from the OT environment tend to prefer the IEC 62443 series of standards. This article
describes the basics and focus of the two series of standards and makes suggestions as to
when it makes sense to adhere to one standard in particular, or to both standards jointly.
The document closes with a recommendation for a procedure with regard to production sys-
tems for the manufacturing and process industries (OT security). Finally, in the appendix, the
applicability of the standards is discussed using the example of a wastewater treatment plant.
Figure 1 gives an overview of norms and standards for IT security. In addition to general
standards (ISO 27000 series, IEC 15408, German Federal Office for Information Security (BSI)
IT baseline protection “Grundschutzkatalog”), standards are also listed that specifically ad-
dress the production area (IEC 62443, IEC 62351, VDI/VDE 2182). The list is supplemented by
a number of standards from manufacturer / user associations (PROFINET, EtherNet/IP, NA-
MUR) and authorities (BSI, Homeland Security).
The following sections mainly focus on the ISO 27000 and IEC 62443 series of standards. It
should be noted that both series of standards are still being developed. The standardization
roadmap IT security of the German Electrotechnical Commission [DKE2017] provides an over-
view of current and future work. A description of the other norms and standards mentioned
in Figure 1can be found in [NIE2017].
The ISO 27000 series of standards is a series of sixty sub-standards on the subject of infor-
mation security management systems, hereinafter referred to as ISMS. An introduction and
overview of the individual sub-standards including a short description can be found in
[DIN_EN_ISO_27000] or online at [ISE2020]. The following sections describe the essential
Figure 2: Extract from the structure of the ISO 27000 series of standards based on [KRO2017]
Figure 2 gives an overview of the essential parts of the ISO 27000 series of standards. The se-
ries of standards is divided into four main parts: Vocabulary and overview, requirements, gen-
eral guidelines, and sector-specific guidelines. The standard parts mentioned in Figure 2 con-
stitute an excerpt listing only the most important parts of the series of standards.
The [DIN_EN_ISO_27000] first explains the technical terms used and then gives an overview
of the other standards included in the series of standards. The series of standards deals with
the structure of an information security management system (ISMS). This is defined according
to [DIN_EN_ISO_27000] as follows:
The standard focuses on information security in order to ensure the confidentiality, availabil-
ity, and integrity of information. It takes a process-oriented approach in order to identify and
control the necessary processes in the company. The series of standards follows a risk-based
approach in which information security risks are described, assessed, and dealt with. The
maintenance and improvement of the ISMS are monitored, controlled, and continuously en-
hanced in a continuous improvement process.
2.1.2. Requirements
[DIN_EN_ISO_27001] defines requirements for ISMSs. It defines the requirements for the in-
troduction, implementation, operation, monitoring, review, maintenance, and improvement
of formalized information security management systems (ISMS) in connection with the over-
arching business risks of an organization. The content includes:
[ISO_27006] specifies requirements and offers instructions for bodies that carry out audits
and certifications of an information security management system (ISMS). It is primarily in-
tended to support the accreditation of certification bodies that offer ISMS certifications.
Expert knowledge about the requirements and reliability has to be proven by every entity of-
fering ISMS certification, and the guideline contained in this International Standard provides
an additional interpretation of these requirements for any entity offering ISMS certification.
This standard can be used as a catalog of criteria for audits.
The part of the general guidelines for the ISO 27000 series consists of several standards,
which are briefly described below.
The above list is not a complete excerpt from the standard, it is only intended to serve as an
exemplary list.
[ISO_27004] thus provides a framework that makes it possible to measure and evaluate the
effectiveness of ISMS in accordance with [DIN_EN_ISO_27001]. It furthermore includes a de-
scription of security indicators and how to obtain them.
The [ISO_27005] contains guidelines for the risk management of information security. It sup-
ports the general concepts specified in [DIN_EN_ISO_27001] and is intended to support the
implementation of information security on the basis of a risk management approach.
Knowledge of the concepts, models, processes, and terminology described in
[DIN_EN_ISO_27001] and [DIN_EN_ISO_IEC_27002] is important for a complete understand-
ing. This document is applicable to all types of organizations (e.g. business enterprises, gov-
ernment agencies, non-profit organizations) intending to manage risks that may endanger
the organization’s information security.
[ISO_27007] provides guidance for organizations which carry out internal or external audits
of an ISMS or which have to handle an ISMS audit program in accordance with the require-
ments specified in ISO/IEC 27001.
An information security management system (ISMS) audit can be performed using a number
of audit criteria, such as:
The standard provides guidance for all sizes and types of organizations and ISMS audits of
various sizes. The document focuses on internal ISMS audits (first party) and ISMS audits
which are carried out by organizations at their external service providers (second party).
The ISO-27000 series provides some sector-specific guidelines, e.g. for cloud computing or
telecommunications. In the context of automation technology, the sector-specific guideline
[ISO_27019] is of interest. It offers a guideline based on [DIN_EN_ISO_IEC_27002] and ap-
plied to process control systems used by the energy supply industry to control and monitor
the production or generation, transmission, storage and distribution of electrical energy, gas,
oil, and heat as well as to control the associated supporting processes are used. This includes
in particular the following:
[ISO_27019] does not apply to the process control domain of nuclear facilities. This domain is
covered by IEC 62645. [ISO_27019] also contains the requirement to adapt the processes for
risk assessment and treatment described in [DIN_EN_ISO_27001] to the sector of energy sup-
ply companies.
It is recommended that newcomers to the ISO 27000 series of standards first familiarize
themselves via a textbook and not directly via the standards. For example, [BRE2020],
[KER2020] can be used for this purpose. Readers who have a background in risk management
are additionally recommended to read [KLI2015]. An online overview of the standards with
brief descriptions of the individual standards can be found under [ISE2020].
The IEC 62443 series of standards is developed by the International Electrotechnical Commis-
sion (IEC) and the International Society of Automation (ISA). The first work on the standard
was started in the ISA SP99 working group and is currently being continued in a cooperation
between IEC and ISA. Therefore, many documents still contain references to ISA working
groups and documents.
Based on the models and requirements of the ISO 27000 series of standards, the IEC 62443
series of standards takes into account the special requirements of IT security in the produc-
tion area. Figure 3 shows the structure of the series of standards.
The IEC 62443 series of standards consists of four main areas, which are presented in the fol-
lowing chapters, including the associated standards.
Figure 4 shows the IEC 62443 standards of the part "General principles. The parts highlighted
in gray are currently still being processed and not published.
• Risk assessment
• Security program maturity
• Policies
• Zones and conduits
• Models
• Reference architecture
Part [IEC_62443-1-2] defines all terms that are used in the standards. Part [IEC_62443-1-3] de-
fines metrics for evaluating IT security, part [IEC_62443-1-4] describes the security lifecycle
and use cases. All three parts have not yet been published and are only available as draft to
members of the working group.
Figure 5 shows the "Operators and service providers" part of the IEC 62443 series of stand-
ards.
Figure 5: IEC 62443 - Part 2 Operators and service providers based on [DKE2020]
This part describes the IT Security Management System and thus defines the organization of
IT security, followed by implementation aids.
Part [IEC_62443-2-1] describes requirements for an IT Security Management System, e.g. the
Part [ISA_62443-2-2] provides information on how and in which areas these procedures are
to be implemented. It specifies a framework for evaluating an IACS’s degree of protection. It
contains a procedure for combining the evaluation of both organizational and technical secu-
rity measures in numerical values, the so-called "Protection Level". The framework forms the
structure for the evaluation of the Defense-in-Depth-strategy of the IACS in operation, on the
basis of the technical and organizational requirements which are specified in other docu-
ments of the IEC 62443 series of standards. [DKE2020]. This part is currently only available in
draft form.
Part [DIN_EN_IEC_62443-2-4] deals with the use of service providers for commissioning and
service from the point of view of IT security. “It defines requirements for IT security guide-
lines, procedures and practices that are applicable to suppliers of industrial automation sys-
tems during the life cycle of their products, as well as to maintenance service providers. In
particular, it addresses integrators who combine technical solutions to form an overall sys-
tem.“ [DKE2020] This standard is available in English and German.
The [IEC_62443-2-5] is planned and should contain implementation instructions for opera-
tors. The author has not yet received any drafts for this standard part.
Figure 6 shows the parts of the standard which describe the requirements for automation
systems.
Figure 6: IEC 62443 - Part 3 Requirements for automation systems based on [DKE2020]
Part [IEC_62443_3_1] first describes the underlying technologies such as authentication, en-
cryption, filtering and logging. Part [IEC_62443_3_2] describes the entire security analysis pro-
cess and, based on this, the partitioning of a system into zones (isolated areas) and conduits
(secure connections between areas). The target is to divide an automation system into sub-
areas, which in turn are isolated from one another. Part [IEC_62443-3-3] describes specific re-
quirements for automation systems in the form of basic requirements (Foundational Require-
ments). These Foundational Requirements (FR) define the IT security cornerstones of the sys-
tem.
This part of the standard provides specific information for planners and operators of automa-
tion systems with regard to specific technical measures.
SL Description
1 Preventing the unauthorized disclosure of information through eavesdropping or accidental
exposure.
2 Preventing the unauthorized disclosure of information to a unit which actively searches for it
using simple means and little effort, general skills and little motivation.
3 Preventing the unauthorized disclosure of information to a unit which actively searches for it
using sophisticated means and moderate effort, IACS-specific skills and moderate motiva-
tion.
4 Preventing the unauthorized disclosure of information to a unit which actively searches for it
using sophisticated means and considerable effort, lACS-specific skills and high motivation.
The standard specifies the levels SL1 (low requirements) to SL4 high requirements. Depend-
ing on the necessary degree of protection for the system, the requirements can be selected
according to the desired security level.
Figure 7 shows the standard parts that define the requirements for the development process
and the components of the automation system. These parts are intended for manufacturers
of automation systems.
Figure 7: IEC 62443 - Part 4 Requirements for components of automation systems based on
[DKE2020]
Part [DIN_EN_IEC_62443-4-1] defines the development process that must be observed when
developing components for automation technology.
Figure 8 shows the secure development life cycle described in the standard. It can be seen
that this extends over all phases of the development process. Manufacturers of automation
components can use the implementation of this standard to build the product development
life cycle in accordance with the security-by-design approach and thus lay the basis for the
certification of components. The abbreviations in the gray boxes correspond to the require-
ment classes from the respective parts of the standard. For an organization structured in this
way, maturity levels from 1 to 4 are assigned.
• Software applications,
• Host devices,
• Embedded devices and
• Network components.
The majority of CRs and REs apply to all four component types and are grouped into a single
Component Requirement (CR). Some CRs and REs only apply to a certain type of component.
With [ZVE2017], the ZVEI gives manufacturers of automation components an introduction to
the subject.
Figure 9 provides an overview of the stakeholders in the IT security process and the assign-
ment of the IEC 62443 standard parts to them.
Figure 9: Assignment of the ICE 62443 standard parts to stakeholders in the security process
(based on [ISA_62443-2-2])
The role of operator/service provider is responsible for the operation and maintenance of a
production facility. For these stakeholders, the guidelines for operation and maintenance are
most relevant, especially those standard parts regulating the establishment and operation of
the ISMS [IEC_62443-2-1] and the integration of service providers [IEC_62443-2-4]. Part
[IEC_62443-2-3], which regulates the updating of the control system software (patch man-
agement), is also relevant for operators.
The role of system integrator designs and installs the automation system. Here, the standard
part [DlN_IEC_62443-3-3] is relevant, which makes specifications with regard to the structure
and partitioning of the system. Part [DIN_EN_62443-3-2] can also be consulted for security
risk assessment and system design. If the planning process is carried out by a service pro-
vider, the part [IEC_62443-2-4], which describes requirements for service providers, must also
be observed. If the facility operator himself carries out the planning work, the standards men-
tioned in this section also apply accordingly to the operator in his role as production facility
planner.
The third role is that of product suppliers. For these suppliers, first and foremost
[DIN_EN_IEC_62443-4-1] applies, which specifies the requirements for a secure development
process (security by design). The requirements for products developed by the product sup-
plier are described in part [DIN_EN_IEC_62443-4-2]. Since the requirements in this standard
are derived from system requirements, the product supplier should also know and observe
these system requirements [DlN_IEC_62443-3-3].
The standards of the IEC 62443 series have so far only been partially published. The majority
of the series of standards is at least available in draft form. The current status of the work and
the release status of the standard parts can be viewed under [ISA2020]. The status of the Ger-
man translations can be found in [DKE2020].
[KOB2021] gives an overview of the IEC 62443 series of standards and explains the relation-
ships between the parts of the standard. This book provides a compact and quick introduc-
tion to the standard. In their book, [GUN2018] give detailed information on the introduction
of IEC 62443.
The industry associations ZVEI [ZVE2017] and VDMA [VDM2016] provide guidelines for the
implementation of IEC 62443. The ZVEI from the manufacturer's point of view, the VDMA
from the operator's point of view.
Now that the two series of standards IEC 62443 and ISO 27000 have been described in detail
in the previous chapters, a differentiation should be made between the two standards with
regard to their applicability in the production area. It should be noted that IT security is a
company-wide issue and that the production area therefore cannot be viewed separately.
Nevertheless, IT security requirements in the production area are different from the ones in
the office area. Therefore, the following chapter first describes these requirements and then
distinguished the areas IT (Information Technology) and OT (Operational Technology) from
one another.
In the following, the IT and OT application domains are initially delimitated against one an-
other in order to derive specific requirements for IT security management in the further
course of the chapter. Table 2 defines the terms IT and OT and shows application examples.
Having defined the two application domains, the requirements with regard to IT security will
now be considered. First of all, it must be considered that different terms are used within the
two domains. Figure 10 shows a differentiation of the terms.
It can be seen that the terms "information security" or “IT security” are used when talking
about the protection of IT in the office area. The term “information security” can refer to the
protection of information in general. This includes, for example, intellectual property.
[ISO_27000] uses the term “information security” and defines it as ensuring the confidential-
ity, integrity and availability of information. The term “IT security” is a partial aspect of infor-
mation security. This concerns the protection of technical systems. The terms "cyber security"
or "ICS security" [BSI_2014] are often used when talking about production facilities. This fo-
cuses on the security of operational facilities (OT). The term “data protection” shall only be
mentioned for the sake of completeness but is of no relevance here. As there are different ar-
eas of application of IT and OT, different requirements with regard to IT and OT security are
derived from this. These are shown in Table 3.
IT OT
Security properties
Prioritization of security re- Confidentiality, integrity, availa- Availability, integrity, non-repu-
quirements bility, non-repudiation diation, confidentiality
Availability Important, but not critical Critical
Integrity Important Important
Confidentiality Critical Not critical
Technology
Real-time behavior Desired but not critical (Quality Critical for the function of the
of Service) production facility
Technology used Homogeneous Very heterogeneous, different
protocols, embedded systems.
Operation
Useful life 3… 5 years Sometimes more than 20 years
Software update Automatically Critical: In some cases only dur-
ing system downtime, prelimi-
nary test of the updates re-
quired, approval of the updates
by control system manufacturer
required
Outsourcing Common Common for planning, estab-
lishment and maintenance, not
for operation.
Security management
Risk analysis Global, company-wide Facility-related
User authentication and ac- Personalized, centrally man- Often role-based, shift access
cess rights aged for user groups
Security awareness High Poorly developed
Use of anti-virus software Common Problematic, often out of date
The information in Table 3 shows that there are different requirements in terms of IT security
for the IT and OT areas. As a result, in addition to the ISO 2700 series, the IEC 62443 series of
standards has been developed for the IT security of production facilities, which addresses
these special requirements.
3.2. Differences and similarities between ISO 27000 and IEC 62443
Having described the different requirements of IT and OT in the previous chapter, the differ-
ences and similarities shall now be considered and mapped to the two series of standards
ISO 27000 and IEC 62443.
The ISO 27000 series describes the establishment and operation of an IT security manage-
ment system (ISMS). The series of standards addresses information security in general and
does not differentiate between data in IT systems or intellectual property. The standard
[DIN_EN_ISO_27001] should be regarded as a basic standard which defines the essential re-
quirements for the organization of IT security, such as planning, responsibilities, risk assess-
ment, communication, resources, internal audit. It can therefore be said that it focuses on the
organization and process-related aspects of IT security. [DIN_EN_ISO_IEC_27002] defines spe-
cific requirements for IT security, such as access control, network security, separation of net-
works, etc. One focus of the series of standards is the monitoring and evaluation of the ISMS
[ISO_27004] and its certification [ISO_27007]. The standard is generic and can be used for IT
applications as well as for OT. However, the standard does not make any specific reference to
the requirements of OT, as described, for example, in Table 3. Part [DIN_IEC_27019], however,
is an exception as it focuses specifically on energy supply systems.
The IEC 62443 series focuses on the protection of industrial automation systems and there-
fore belongs to the area of Operational Technology (OT). Special features of OT are consid-
ered. Requirements relating to service providers [DIN_EN_IEC_62443-2-4], for instance, are
taken into account, as well as patch management in production facilities in part [IEC_62443-
2-3]. The aspect of establishing and operating an ISMS is also included in the series of stand-
ards [IEC_62443-2-1], but the focus is on specific technical requirements for automation sys-
tems [IEC_62443-3-3] and the components of automation systems [DIN_EN_IEC_62443-4-2],
the latter being aimed at manufacturers of automation components.
Both series of standards have similarities. It can be seen that the basic concepts and technol-
ogies can be found in both series of standards. It should be noted, however, that the IEC
62443 series of standards has a clear focus on automation technology, whereas the ISO
27000 series is more process-oriented and generic. See also [KOH2018].
Figure 11 shows the various aspects of IT security in production facilities. It can be seen that
the focus here is on organizational aspects on the one hand and on technical aspects on the
other. For tasks with a focus on technology, it makes sense to use the IEC 62443 series of
standards because there is a clear focus on the requirements of automation technology. For
tasks in the production area with a focus on organization, either the [IEC_62443-2-1] or the
ISO 27000 series of standards can be used. If an ISMS according to ISO 27000 is already in
place for IT, it makes sense to also treat the organizational aspects in OT accordingly. The ex-
periences from such a combined use of both parts of the standard at a power distribution
network operator are described in [MON2019].
A comparable approach is described in [FRI2019]. This document also describes the joint use
of both series of standards in the field of power distribution.
Further information on the organization of IT security can also be found in [NIE2018]. When
considering these standards, the question of certification of an ISMS or products is often
raised. The certification, e.g. of automation components according to [DIN_EN_IEC_62443-4-
2] is a basis for ensuring the IT security of a production facility according to [DlN_IEC_62443-
3-3].
The previous chapters have shown that the two series of standards under consideration, IEC
62443 and ISO 27000, overlap. An illustration of the requirements of both series of standards
(mapping) is available from different sources. For more information, see
• [ÖST2020] Mapping Table of ICT Security Standards and Cyber Security Best Practices
• [BSI2013] ICS Security Compendium
• [ENI2017] ENISA Mapping of OES Security Requirements to Specific Sectors.
1.) If the company already has an ISMS according to ISO 27000, the organizational pro-
cesses in the production area should follow these concepts in order to achieve a uni-
form process landscape.
2.) If no ISMS is in place and only the production area is to be considered, the ISMS can
be implemented according to [IEC_62443-2-1].
3.) Small and medium-sized companies, for which an ISMS according to ISO 27000 may
be too complex, should consider the use of a simplified ISMS, e.g. according to BSI
Baseline Protection [BSI_200-1] or [VDS_10000] and [VDS_10020].
4.) The specific technical aspects of IT security in the production area should preferably
be developed according to [DlN_IEC_62443-3-3].
5.) For the operational aspects of IT security in the production area, [IEC_62443-2-3] and
[DIN_EN_IEC_62443-2-4] can also be used.
6.) Systems belonging to critical infrastructure as stated in the IT Security Act
[ITSichG2015] must be considered separately, as recurring certification is necessary
here, which usually requires an ISMS in accordance with ISO 27000.
This appendix shows by way of example the concrete application of the previous considera-
tions to a wastewater treatment plant. First of all, it is defined whether a system belongs to a
critical infrastructure or not. The document then describes the industry standards applicable
in Germany for the water and wastewater sector. The chapter closes with a proposal for an
assessment procedure for wastewater treatment plants.
With regard to the threat to the IT security of wastewater treatment plants, there are already
publications describing known incidents:
In summary, it can be said that wastewater systems and the associated control centers are ex-
posed to a risk with regard to IT security. This applies in particular when remote access is
used for external access.
The attacks on wastewater treatment plants are based on two main attack vectors:
• External attacks:
o Targeted attacks from outside, e.g. with the aim of disrupting data communi-
cation or intruding into the network.
o Random external attacks, e.g. by scanning address ranges to find specific com-
ponents.
o Attack on remote control systems.
o Attack via systems for remote maintenance or remote control of the plant.
o Breaking into the facility.
• Internal attacks:
o Opening compromised email attachments, spread of malware to the automa-
tion network.
o Inattention or lack of know-how by staff, e.g. when installing software updates.
o Connection of laptops / USB sticks from external staff with components of the
system.
o Insiders who intentionally want to compromise the facility.
“Critical services are important, sometimes vital, goods and services for the population. If these
critical services were impaired, there would be considerable supply bottlenecks, disruptions to
public safety or comparable dramatic consequences.“ [BSI2021a].
These critical services are provided through certain facilities, such as power plants, water-
works, port facilities or airports. These facilities are commonly referred to as critical infrastruc-
ture. The BSI defines critical infrastructures as follows:
“Critical infrastructures are organizations and facilities with great importance for the state com-
munity, whose failure or impairment would result in lasting supply bottlenecks, significant dis-
ruptions to public safety or other dramatic consequences. In Germany, the following sectors
(and industries) are classified as Critical Infrastructures:
• Transport and traffic (aviation, maritime shipping, inland shipping, rail traffic, road traf-
fic, logistics)
• Energy (electricity, mineral oil, gas)
• Information technology and telecommunications (telecommunications, information
technology)
• Finance and insurance (banking, insurance companies, financial service providers, stock
exchanges)
• State and administration (government and administration, parliament, judicial institu-
tions, emergency and rescue services including disaster control)
• Nutrition (food industry, food trade)
• Water (public water supply, public wastewater disposal)
• Health (medical care, drugs and vaccines, laboratories)
• Media and culture (broadcasting (television and radio), printed and electronic press, cul-
tural assets, symbolic buildings)” [BSI2021a]
The BSI KRITIS regulation [BSI-KritisV_2016] defines the size from which a public wastewater
treatment plant is considered part of the critical infrastructure. The following figures are as-
sumed:
This results in
This means that all wastewater treatment plants with a throughput of 22 million m³/year or
more are classified as critical infrastructure. Further details on the calculation and evaluation
of connected plants can be found in [BSI-KritisV_2016]. This regulation was updated in 2017
[BSI-KritisV_2017]. However, the update has had no effect on the above thresholds. With the
passing of the IT Security Act 2.0 [IT-SIG_2.0] and with an update of the KRITIS regulation, a
reduction in the thresholds is to be expected.
The Federal Statistical Office records wastewater treatment plants according to size in
[STA2016]. However, only up to an annual wastewater volume of 6 million m³/year. Of the
9,105 wastewater treatment plants in Germany, 276 have an annual wastewater volume of 6
million m³/year or more. This corresponds to approximately 3% of the facilities. It can be de-
duced from this that the number of wastewater treatment plants that belong to the critical
infrastructure will be even lower, since the threshold for this is 22 million m³/year. This as-
sessment is consistent with figures from the water supply sector. There, only 0.82% of the fa-
cilities are considered critical infrastructure [NEU2020].
• The KRITIS operator must set up a contact point via which it can be contacted at any
time by the BSI.
• Significant IT security incidents that could lead or have led to a failure or impairment
of the disposal of the wastewater must be reported to the BSI. The BSI maintains a re-
porting office for this purpose.
• The KRITIS operator must have secured its IT according to the state of the art.
• The KRITIS operator must prove to the BSI that the IT security level has been met
through security audits, inspections or certifications at least every two years.
Further information with questions and answers for operators of critical infrastructures can be
found in [VKU2016] and in [BSI2017].
In this chapter, the applicability of the ISO 27000 and IEC 62443 series of standards to
wastewater management systems shall be examined. In addition, an industry-specific stand-
ard for water/wastewater management is also considered.
The ISO 27000 series of standards can be used for the protection of wastewater systems. In
particular, the establishment of an information security management system according to
[DIN_EN_ISO_27001] must be observed. The technical requirements for IT security can be im-
plemented according to [DIN_EN_ISO_IEC_27002]. It should be noted, however, that these are
generic requirements that are not aimed specifically at automation systems. The only stand-
ard with a reference to automation systems is [ISO_27019]. This standard is aimed at power
generation and distribution facilities but can also be used analogously for wastewater facili-
ties.
Operators of critical infrastructures must document via regular audits that the state of the art
in terms of IT security is applied. The ISO 27000 series of standards or the industry-specific
security standard described in Chapter 5.3.3 is generally used here.
For operators of small wastewater treatment plants that are not part of the critical infrastruc-
ture, the application of the ISO 27000 series of standards is challenging, as it is a very com-
prehensive set of standards.
The IEC 62443 series of standards focuses on automation systems. Part [IEC_62443-2-1] de-
scribes the requirements for an IT Security Management System. Part [IEC_62443-2-3] deals
with patch management, part [DIN_EN_IEC_62443-2-4] with the use of service providers for
commissioning and service from the point of view of IT security. It can be seen that this series
of standards focuses more strongly on the conditions in a production environment, such as
continuous operation.
Part [IEC_62443-3-3] describes specific requirements for automation systems in the form of
basic requirements (Foundational Requirements). These Foundational Requirements (FR) de-
fine the IT security cornerstones of the system. Parts [DIN_EN_IEC_62443-4-1] and
[DIN_EN_IEC_62443-4-2] define requirements for the suppliers of automation components.
In summary, it can be stated that the IEC 62443 series of standards provides all the necessary
components (ISMS, risk assessment, technical requirements for systems and components).
Operators who mainly focus on the automation system can proceed in a targeted manner
without having to deal with the complexity of the ISO 27000 series. Experience reports on the
protection of wastewater treatment plants in connection with IEC 62443 can be found, for ex-
ample, in [CHR2019] and [TEB2020]. It should be noted, however, that an ISMS must be
planned in any case.
“Operators of critical infrastructures and their industry associations can propose industry-spe-
cific security standards to guarantee the requirements referred to in paragraph 1. Upon request,
the Federal Office will determine whether these are suitable for ensuring the requirement re-
ferred to in paragraph 1.”
The industry-specific security standard for water/wastewater (B3S WA) was created on the
basis of this definition. It consists of the following parts:
Information sheet [DWA-M_1060] initially defines the area of application and the essential
terms. This is followed by the definition of the desired protection goals of availability, integ-
rity, authenticity and confidentiality. According to the information sheet, this means in detail:
In a next step, the information sheet describes the requirements for an Information Security
Management System (ISMS) and the requirements for business continuity management. This
is followed by the description of the risk assessment with the individual steps: Risk identifica-
tion, risk analysis, risk assessment and responsibilities of the operator. The following part of
the information sheet then describes the measures to minimize risk.
The IT security guidelines supplementing the information sheet describe based on use cases
both the threats to IT security and the corresponding measures to be taken for all types of
facilities in accordance with [BSI-KritisV_2016] in the water sector. The use cases describe the
possible IT systems/IT configurations and other conditions regarding the IT equipment of fa-
cilities. [DWA-M_1060]. The basis for these cases is the BSI basic protection compendium
[BSI2021b].
The industry-specific standard can be applied both to wastewater facilities belonging to criti-
cal infrastructure and to conventional wastewater facilities. Experience reports on the applica-
tion of the standard can be found in [FIE2020] and [TEN2018].
The BSI has published guidelines for the application of the standard [BSI2018]. This document
deals in particular with the parallel use of ISO 27001 and the industry standard. At the end of
the document, the BSI provides a detailed reference table for comparing the alternatives.
6. References
6.1. List of figures
Figure 2: Extract from the structure of the ISO 27000 series of standards based on [KRO2017]
......................................................................................................................................................................................... 3
Figure 5: IEC 62443 - Part 2 Operators and service providers based on [DKE2020] ....................... 8
Figure 6: IEC 62443 - Part 3 Requirements for automation systems based on [DKE2020] .......... 9
Figure 7: IEC 62443 - Part 4 Requirements for components of automation systems based on
[DKE2020] .................................................................................................................................................................. 10
Figure 9: Assignment of the ICE 62443 standard parts to actors in the security process (based
on [ISA_62443-2-2]) ............................................................................................................................................... 12
[GUN2018] Gunter, David G.; Medoff, Michael D.; O‘Brien, Patrick C. Implementing IEC
62443. A pragmatic approach to cybersecurity. Exida, Sellersville, PA, 2018.
[IEC_62443-1-1] IEC- International Electrotechnical Commission, IEC TS 62443-1-1:2009
Industrial communication networks - Network and system security - Part 1-1:
Terminology, concepts and models.
[IEC_62443-1-2] IEC- International Electrotechnical Commission, ISA-TR62443-1-2 Secu-
rity for industrial automation and control systems - Master Glossary.
[IEC_62443-1-3] IEC- International Electrotechnical Commission, IEC/TS 62443-1-3 Se-
curity for industrial process measurement and control – Network and system
security – Part 1-3: System security compliance metrics, 2014.
[IEC_62443-1-4] IEC- International Electrotechnical Commission, ISA-62443-1-4 Security
for industrial automation and control systems Life Cycle and Use Cases, 2013.
[IEC_62443-2-1] IEC- International Electrotechnical Commission, IEC 62443-2-1-2010
Industrial communication networks - Network and system security - Part 2-1:
Establishing an industrial automation and control system security program,
2010.
[IEC_62443-2-3] IEC- International Electrotechnical Commission, IEC TR 62443-2-3:2015
Security for industrial automation and control systems - Part 2-3: Patch man-
agement in the IACS environment, 2015.
[IEC_62443-2-4] IEC- International Electrotechnical Commission, IEC 62443-2-4 Security
for industrial automation and control systems – Network and system security –
Part 2-4: Requirements for IACS solution suppliers., 2014.
[IEC_62443-2-5] IEC- International Electrotechnical Commission, IEC 62443-2-5 Imple-
mentation guidance for IACS asset owners, not released.
[ISA_62443-2-2] ISA - The International Society of Automation, ISA‑62443‑2‑2 Security
for industrial automation and control systems - Part 2-2: IACS security pro-
gram rating, 2020.
[ISA2020] ISA - The International Society of Automation ISA99, Industrial Automation
and Control Systems Security. https://www.isa.org/standards-and-publica-
tions/isa-standards/isa-standards-committees/isa99.
[ISE2020] IsecT Ltd Overview on ISO 27000 standard series. https://www.iso27001secu-
rity.com/html/iso27000.html.
[ISO_27000] ISO - International Standardization Organization, ISO/IEC 27000:2018(E) Infor-
mation technology — Security techniques — Information security manage-
ment systems — Overview and vocabulary, 2018.
[ISO_27003] ISO - International Standardization Organization, ISO/IEC 27003:2017 Infor-
mation technology — Security techniques — Information security manage-
ment systems — Guidance, 2017.
[ISO_27004] ISO - International Standardization Organization, ISO/IEC 27004:2016 Infor-
mation technology — Security techniques — Information security manage-
ment — Monitoring, measurement, analysis, and evaluation, 2016.
__ __
ABB AG We reserve the right to make technical We reserve all rights in this document and in
Eppelheimer Straße 82 changes or modify the contents of this docu- the subject matter and illustrations contained
69123 Heidelberg, Germany ment without prior notice. With regard to therein. Any reproduction, disclosure to third
Phone: +49 62 21 701 1444 Fax : purchase orders, the agreed particulars shall parties or utilization of its contents – in whole
+49 62 21 701 1382 prevail. ABB AG does not accept any respon- or in parts – is forbidden without prior written
Mail: [email protected] sibility whatsoever for potential errors or consent of ABB AG.
www.abb.com/plc possible lack of information in this docu- Copyright© 2021 ABB. All rights reserved
ment.