Iec 62443 3 3 2013
Iec 62443 3 3 2013
Iec 62443 3 3 2013
®
Edition 1.0 2013-08
INTERNATIONAL
STANDARD
colour
inside
iTeh Standards
Industrial communication networks – Network and system security –
Part 3-3: System security requirements and security levels
(https://standards.iteh.ai)
Document Preview
IEC 62443-3-3:2013
https://standards.iteh.ai/catalog/standards/iec/c32e05fe-78a2-467e-a24d-0fc422289f55/iec-62443-3-3-2013
IEC 62443-3-3:2013(E)
THIS PUBLICATION IS COPYRIGHT PROTECTED
Copyright © 2013 IEC, Geneva, Switzerland
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form
or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from
either IEC or IEC's member National Committee in the country of the requester.
If you have any questions about IEC copyright or have an enquiry about obtaining additional rights to this publication,
please contact the address below or your local IEC member National Committee for further information.
Useful links:
iTeh Standards
It also gives information on projects, replaced and
withdrawn publications.
additional languages. Also known as the International
Electrotechnical Vocabulary (IEV) on-line.
(https://standards.iteh.ai)
IEC Just Published - webstore.iec.ch/justpublished
Stay up to date on all new IEC publications. Just Published
details all new publications released. Available on-line and
Customer Service Centre - webstore.iec.ch/csc
If you wish to give us your feedback on this publication
or need further assistance, please contact the
also once a month by email.
Document Preview Customer Service Centre: [email protected].
IEC 62443-3-3:2013
https://standards.iteh.ai/catalog/standards/iec/c32e05fe-78a2-467e-a24d-0fc422289f55/iec-62443-3-3-2013
IEC 62443-3-3
®
Edition 1.0 2013-08
INTERNATIONAL
STANDARD
colour
inside
iTeh Standards
Industrial communication networks – Network and system security –
Part 3-3: System security requirements and security levels
(https://standards.iteh.ai)
Document Preview
IEC 62443-3-3:2013
https://standards.iteh.ai/catalog/standards/iec/c32e05fe-78a2-467e-a24d-0fc422289f55/iec-62443-3-3-2013
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION PRICE CODE
XC
ICS 25.040.40; 35.110 ISBN 978-2-8322-1036-9
Warning! Make sure that you obtained this publication from an authorized distributor.
CONTENTS
FOREWORD ........................................................................................................................... 9
0 Introduction .................................................................................................................... 11
0.1 Overview ............................................................................................................... 11
0.2 Purpose and intended audience ............................................................................ 12
0.3 Usage within other parts of the IEC 62443 series .................................................. 12
1 Scope ............................................................................................................................. 14
2 Normative references ..................................................................................................... 14
3 Terms, definitions, abbreviated terms, acronyms, and conventions ................................. 14
3.1 Terms and definitions ............................................................................................ 14
3.2 Abbreviated terms and acronyms .......................................................................... 20
3.3 Conventions .......................................................................................................... 22
4 Common control system security constraints .................................................................. 22
4.1 Overview ............................................................................................................... 22
4.2 Support of essential functions ............................................................................... 23
4.3 Compensating countermeasures ........................................................................... 23
4.4 Least privilege ....................................................................................................... 24
5 FR 1 – Identification and authentication control .............................................................. 24
5.1
5.2
iTeh Standards
Purpose and SL-C(IAC) descriptions ..................................................................... 24
Rationale ............................................................................................................... 24
5.3
(https://standards.iteh.ai)
SR 1.1 – Human user identification and authentication .......................................... 24
5.3.1 Requirement .............................................................................................. 24
Document Preview
5.3.2 Rationale and supplemental guidance ....................................................... 24
5.3.3 Requirement enhancements ...................................................................... 25
5.3.4 Security levels ........................................................................................... 25
IEC 62443-3-3:2013
5.4 SR 1.2 – Software process and device identification and authentication ................ 26
https://standards.iteh.ai/catalog/standards/iec/c32e05fe-78a2-467e-a24d-0fc422289f55/iec-62443-3-3-2013
5.4.1 Requirement .............................................................................................. 26
5.4.2 Rationale and supplemental guidance ....................................................... 26
5.4.3 Requirement enhancements ...................................................................... 26
5.4.4 Security levels ........................................................................................... 27
5.5 SR 1.3 – Account management ............................................................................. 27
5.5.1 Requirement .............................................................................................. 27
5.5.2 Rationale and supplemental guidance ....................................................... 27
5.5.3 Requirement enhancements ...................................................................... 27
5.5.4 Security levels ........................................................................................... 27
5.6 SR 1.4 – Identifier management ............................................................................ 28
5.6.1 Requirement .............................................................................................. 28
5.6.2 Rationale and supplemental guidance ....................................................... 28
5.6.3 Requirement enhancements ...................................................................... 28
5.6.4 Security levels ........................................................................................... 28
5.7 SR 1.5 – Authenticator management ..................................................................... 28
5.7.1 Requirement .............................................................................................. 28
5.7.2 Rationale and supplemental guidance ....................................................... 28
5.7.3 Requirement enhancements ...................................................................... 29
5.7.4 Security levels ........................................................................................... 29
5.8 SR 1.6 – Wireless access management ................................................................. 30
5.8.1 Requirement .............................................................................................. 30
62443-3-3 © IEC:2013(E) –3–
iTeh Standards
(https://standards.iteh.ai)
Document Preview
IEC 62443-3-3:2013
https://standards.iteh.ai/catalog/standards/iec/c32e05fe-78a2-467e-a24d-0fc422289f55/iec-62443-3-3-2013
62443-3-3 © IEC:2013(E) –9–
FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote
international co-operation on all questions concerning standardization in the electrical and electronic fields. To
this end and in addition to other activities, IEC publishes International Standards, Technical Specifications,
Technical Reports, Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC
Publication(s)”). Their preparation is entrusted to technical committees; any IEC National Committee interested
in the subject dealt with may participate in this preparatory work. International, governmental and non-
governmental organizations liaising with the IEC also participate in this preparation. IEC collaborates closely
with the International Organization for Standardization (ISO) in accordance with conditions determined by
agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
iTeh Standards
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
(https://standards.iteh.ai)
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence
Document Preview
between any IEC Publication and the corresponding national or regional publication shall be clearly indicated in
the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
IEC 62443-3-3:2013
services carried out by independent certification bodies.
https://standards.iteh.ai/catalog/standards/iec/c32e05fe-78a2-467e-a24d-0fc422289f55/iec-62443-3-3-2013
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of
patent rights. IEC shall not be held responsible for identifying any or all such patent rights.
International Standard IEC 62443-3-3 has been prepared by IEC technical committee 65:
Industrial-process measurement, control and automation.
Full information on the voting for the approval of this standard can be found in the report on
voting indicated in the above table.
This publication has been drafted in accordance with the ISO/IEC Directives, Part 2.
– 10 – 62443-3-3 © IEC:2013(E)
A list of all parts in the IEC 62443 series, published under the general title Industrial
communication networks – Network and system security, can be found on the IEC website.
The committee has decided that the contents of this publication will remain unchanged until
the stability date indicated on the IEC web site under "http://webstore.iec.ch" in the data
related to the specific publication. At this date, the publication will be
• reconfirmed,
• withdrawn,
• replaced by a revised edition, or
• amended.
The contents of the corrigendum of April 2014 have been included in this copy.
IMPORTANT – The 'colour inside' logo on the cover page of this publication indicates
that it contains colours which are considered to be useful for the correct
understanding of its contents. Users should therefore print this document using a
colour printer.
iTeh Standards
(https://standards.iteh.ai)
Document Preview
IEC 62443-3-3:2013
https://standards.iteh.ai/catalog/standards/iec/c32e05fe-78a2-467e-a24d-0fc422289f55/iec-62443-3-3-2013
62443-3-3 © IEC:2013(E) – 11 –
0 Introduction
0.1 Overview
NOTE 1 This standard is part of series of standards that addresses the issue of security for industrial automation
and control systems (IACS). It has been developed by working group 4, task group 2 of the IEC99 committee in
cooperation with IEC TC65/WG10. This document prescribes the security requirements for control systems related
to the seven foundational requirements defined in IEC 62443‑1‑1 and assigns system security levels (SLs) to the
system under consideration (SuC).
NOTE 2 The format of this standard follows the ISO/IEC requirements discussed in ISO/IEC Directives, Part 2
[11]. 1 These directives specify the format of the standard as well as the use of terms like “shall”, “should”, and
“may”. The requirements specified in normative clauses use the conventions discussed in Appendix H of the
ISO/IEC Directives.
Industrial automation and control system (IACS) organizations increasingly use commercial-
off-the-shelf (COTS) networked devices that are inexpensive, efficient and highly automated.
Control systems are also increasingly interconnected with non-IACS networks for valid
business reasons. These devices, open networking technologies and increased connectivity
provide an increased opportunity for cyber attack against control system hardware and
software. That weakness may lead to health, safety and environmental (HSE), financial and/or
reputational consequences in deployed control systems.
(https://standards.iteh.ai)
functional requirements and risk assessment, often including an awareness of operational
issues as well.
Document
IACS security measures should Preview
not have the potential to cause loss of essential services and
functions, including emergency procedures. (IT security measures, as often deployed, do
have this potential.) IACS security goals focus on control system availability, plant protection,
plant operations (even in a degraded IECmode)
62443-3-3:2013
and time-critical system response. IT security
goals often do not place the same emphasis on these factors; they may be more concerned
https://standards.iteh.ai/catalog/standards/iec/c32e05fe-78a2-467e-a24d-0fc422289f55/iec-62443-3-3-2013
with protecting information rather than physical assets. These different goals need to be
clearly stated as security objectives regardless of the degree of plant integration achieved. A
key step in risk assessment, as required by IEC 62443‑2‑1 2, should be the identification of
which services and functions are truly essential for operations. (For example, in some
facilities engineering support may be determined to be a non-essential service or function.) In
some cases, it may be acceptable for a security action to cause temporary loss of a non-
essential service or function, unlike an essential service or function that should not be
adversely affected.
This standard assumes that a security program has been established and is being operated in
accordance with IEC 62443‑2‑1. Furthermore, it is assumed that patch management is
implemented consistently with the recommendations detailed in IEC/TR 62443‑2‑3 [5]
utilizing the appropriate control system requirements and requirement enhancements as
described in this standard. In addition, IEC 62443‑3‑2 [8] describes how a project defines
risk-based security levels (SLs) which then are used to select products with the appropriate
technical security capabilities as detailed in this standard. Key input to this standard included
ISO/IEC 27002 [15] and NIST SP800-53, rev 3 [24] (see Clause 2 and the Bibliography for a
more complete listing of source material).
___________
1 Numbers in square brackets refer to the Bibliography.
2 Many documents in the IEC 62443 series are currently under review or in development.
– 12 – 62443-3-3 © IEC:2013(E)
The primary goal of the IEC 62443 series is to provide a flexible framework that facilitates
addressing current and future vulnerabilities in IACS and applying necessary mitigations in a
systematic, defensible manner. It is important to understand that the intention of the
IEC 62443 series is to build extensions to enterprise security that adapt the requirements for
business IT systems and combines them with the unique requirements for strong availability
needed by IACS.
The IACS community audience for this standard is intended to be asset owners, system
integrators, product suppliers, service providers and, where appropriate, compliance
authorities. Compliance authorities include government agencies and regulators with the legal
authority to perform audits to verify compliance with governing laws and regulations.
System integrators, product suppliers and service providers will use this standard to evaluate
whether their products and services can provide the functional security capability to meet the
asset owner’s target security level (SL-T) requirements. As with the assignment of SL-Ts, the
applicability of individual control system requirements (SRs) and requirement enhancements
(REs) needs to be based on an asset owner’s security policies, procedures and risk
assessment in the context of their specific site. Note that some SRs contain specific
conditions for permissible exceptions, such as where meeting the SR will violate fundamental
operational requirements of a control system (which may trigger the need for compensating
countermeasures).
iTeh Standards
When designing a control system to meet the set of SRs associated with specific SL-Ts, it is
not necessary that every component of the proposed control system support every system
(https://standards.iteh.ai)
requirement to the level mandated in this standard. Compensating countermeasures can be
employed to provide the needed functionality to other subsystems, such that the overall SL-T
requirements are met at the control system level. Inclusion of compensating countermeasures
Document Preview
during the design phase should be accompanied by comprehensive documentation so that the
resulting achieved control system SL, SL-A(control system), fully reflects the intended security
capabilities inherent in the design. Similarly, during certification testing and/or post-
installation audits, compensating countermeasures can be utilized and documented in order to
IEC 62443-3-3:2013
meet the overall control system SL.
https://standards.iteh.ai/catalog/standards/iec/c32e05fe-78a2-467e-a24d-0fc422289f55/iec-62443-3-3-2013
There is insufficient detail in this standard to design and build an integrated security
architecture. That requires additional system-level analysis and development of derived
requirements that are the subject of other standards in the IEC 62443 series (see 0). Note
that providing specifications detailed enough to build a security architecture are not the goal
of this standard. The goal is to define a common, minimum set of requirements to reach
progressively more stringent security levels. The actual design of an architecture that meets
these requirements is the job of system integrators and product suppliers. In this task, they
retain the freedom to make individual choices, thus supporting competition and innovation.
Thus this standard strictly adheres to specifying functional requirements, and does not
address how these functional requirements should be met.
Figure 1 shows a graphical depiction of the IEC 62443 series when this standard was written.
IEC 62443‑3‑2 uses the SRs and REs as a checklist. After the system under consideration
(SuC) has been described in terms of zones and conduits, and individual target SLs have
been assigned to these zones and conduits, the SRs and REs in this standard, as well as
their mapping to capability SLs (SL-Cs), are used to compile a list of requirements which the
control system design needs to meet. A given control system design can then be checked for
completeness, thereby providing the SL-As.