1 ISA Security Compliance Institute



Similar documents
ISA Security Compliance Institute

ISA Security Compliance Institute

ISA Security Compliance Institute ISASecure IACS Certification Programs

CSSC-CL Announces ISASecure Certification of Hitachi and Yokogawa Industrial Control Devices. ~For More Globally Competitive Control System Devices ~

ISA Security. Compliance Institute. Role of Product Certification in an Overall Cyber Security Strategy

Does Aligning Cyber Security and Process Safety Reduce Risk?

SSA-312. ISA Security Compliance Institute System Security Assurance Security development artifacts for systems

ISA Security Compliance Institute. ISASecure Embedded Device Security Assurance Certification

Security Standards Overview

EDSA-300. ISA Security Compliance Institute Embedded Device Security Assurance ISASecure certification requirements

Applying ISA/IEC to Control Systems MESAKNOWS. Graham Speake. Principal Systems Architect Yokogawa. Do you know MESA? Additional partner logos

ISA-99 Industrial Automation & Control Systems Security

CSMS. Cyber Security Management System. Conformity Assessment Scheme

Frequently Asked Questions

Rethinking Cyber Security for Industrial Control Systems (ICS)

Industrial Control System Cyber Security

Cybersecurity in a Mobile IP World

EDSA-201. ISA Security Compliance Institute Embedded Device Security Assurance Recognition process for communication robustness testing tools

TECHNICAL SPECIFICATION

Industrial Control Systems Security Guide

Industrial Cyber Security 101. Mike Spear

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

Certification Report

This is a preview - click here to buy the full publication

Ernie Hayden CISSP CEH GICSP Executive Consultant

Security Certification A critical review

Industrial Security Solutions

Announcement of a new IAEA Co-ordinated Research Programme (CRP)

ISACA rudens konference

NIST Cybersecurity Framework Manufacturing Implementation

Cyber Security Health Test

PLC Security for Water / Wastewater Systems

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Using ISA/IEC Standards to Improve Control System Security

White Paper. 7 Steps to ICS and SCADA Security. Tofino Security exida Consulting LLC. Contents. Authors. Version 1.0 Published February 16, 2012

How To Evaluate Watchguard And Fireware V11.5.1

Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium , Miami Beach FL / USA

Certification Report

Introducing atsec information security. Helmut Kurth, Sal la Pietra and Staffan Persson

Revision History Revision Date Changes Initial version published to

C015 Certification Report

S a f e t y & s e c u r i t y a l i g n m e n t b e n e f i t s f o r h i g h e r o p e r a t i o n a l i n t e g r i t y R A H U L G U P TA

ISO/IEC Information & ICT Security and Governance Standards in practice. Charles Provencher, Nurun Inc; Chair CAC-SC27 & CAC-CGIT

IAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD

What Risk Managers need to know about ICS Cyber Security

Cybersecurity Training

Help for the Developers of Control System Cyber Security Standards

Document ID. Cyber security for substation automation products and systems

Innovative Defense Strategies for Securing SCADA & Control Systems

VULNERABILITY MANAGEMENT

C038 Certification Report

Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT

Advanced automation and real-time business intelligence Solutions for the Energy & Utilities markets M A N A G I N G T H E E S S E N T I A L S

C033 Certification Report

Certification Report

Is your current safety system compliant to today's safety standard?

TECHNICAL REPORT IEC TR Security for industrial automation and control systems Part 2-3: Patch management in the IACS environment

IEC 62443: INDUSTRIAL NETWORK AND SYSTEM SECURITY

Frequently Asked Questions

BUILD YOUR CYBERSECURITY SKILLS WITH NRB

ISA CERTIFIED AUTOMATION PROFESSIONAL (CAP ) CLASSIFICATION SYSTEM

Vision & Positioning Statement For Wurldtech Labs

Emerson s Smart Wireless and WIB Requirements

Cyber Security Controls Assessment : A Critical Discipline of Systems Engineering

PLCs and SCADA Systems

Data Security Concerns for the Electric Grid

Cyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Certification Report

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Securing the Cloud Infrastructure

Certification Report

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Certification Report

C013 Certification Report

Securing the Microsoft Cloud

Medical Device Software Standards for Safety and Regulatory Compliance

Certification Report

WORKSHOP Rethinking Cyber Security for Industrial Control Systems

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

Feature. SCADA Cybersecurity Framework

Normen & Standards Industrie 4.0 IEEE Standards

Information Security Management Systems

Cyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC)

P.M.C.Nair, Executive Director, Rashtriya chemicals & Fertilizers Ltd.

The Next Generation of Security Leaders

Certification Report

The rocky relationship between safety and security

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Small tech firms. Seizing the benefits of software and systems engineering standards

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

Transcription:

1 ISA Security Compliance Institute

Internationally Accredited Conformance Scheme ISASecure certification programs are accredited as an ISO/ IEC Guide 65 conformance scheme and ISO/IEC 17025 lab operations by ANSI/ACLASS. Provides global recognition for ISASecure certification Independent CB accreditation by ANSI/ACLASS and other global Accreditation Bodies such as JAB or UKAS ISASecure can scale on a global basis Ensures certification process is open, fair, credible, and robust. MOU s with AB s for ISASecure 2 2 ISA Security Compliance Institute

Global Acceptance of ISASecure One set of certification criteria One certification test/assessment One globally recognized mark Economically efficient for both suppliers and asset owners 3 ISA Security Compliance Institute

Global Adoption Expands to Japan Japan Information-technology Promotion Agency and Control System Security Center IPA Translated ISASecure specifications to Japanese CSSC set up a test lab in Sendai Japan - Control System Security Center Certification Laboratory (CSSC-CL) CSSC-CL was accredited by JAB (Japan Accreditation Board) to ISASecure in Q1 2014 CSSC and CSSC-CL are promoting ISASecure as part of the Japanese critical infrastructure security scheme. CSSC-CL certified their first EDSA device in Q2 2014 4 4 ISA Security Compliance Institute

ISASecure Three certifications currently available. 1. Embedded Device Security Assurance (EDSA) 2. System Security Assurance (SSA) 3. Security Development Lifecycle Assurance (SDLA) 5 ISA Security Compliance Institute

ISASecure Embedded Device Security Assurance (EDSA) 6 ISA Security Compliance Institute

EDSA Overview Certification that the supplier s product is robust against network attacks and is free from known security vulnerabilities Meets requirements of ISA/IEC-62443-4-2 for embedded devices (will be aligned with 4-2 when formally approved by IEC) Currently available 7 devices certified with more devices under assessment 7 ISA Security Compliance Institute

What is an Embedded Device? Special purpose device running embedded software designed to directly monitor, control or actuate an industrial process, examples: Programmable Logic Controller (PLC) Distributed Control System (DCS) controller Safety Logic Solver Programmable Automation Controller (PAC) Intelligent Electronic Device (IED) Digital Protective Relay Smart Motor Starter/Controller SCADA Controller Remote Terminal Unit (RTU) Turbine controller Vibration monitoring controller Compressor controller 8 ISA Security Compliance Institute

ISASecure EDSA Certification Program Embedded Device Security Assurance (EDSA) Software Development Security Assessment (SDSA) Functional Security Assessment (FSA) Detects and Avoids systematic design faults The vendor s software development and maintenance processes are audited Ensures the organization follows a robust, secure software development process Detects Implementation Errors / Omissions A component s security functionality is audited against its derived requirements for its target security level Ensures the product has properly implemented the security functional requirements Communications Robustness Testing (CRT) Identifies vulnerabilities in networks and devices A component s communication robustness is tested against communication robustness requirements Tests for vulnerabilities in the 4 lower layers of OSI Reference Model 9 ISA Security Compliance Institute

ISASecure System Security Assurance (SSA) 10 ISA Security Compliance Institute

SSA Overview Certification that the supplier s product is robust against network attacks and is free from known security vulnerabilities Meets requirements of ISA/IEC-62443-3-3 (SSA was aligned with 3-3 by ISCI in 2013 when it was approved by IEC) Available as of Q1 2014 11 ISA Security Compliance Institute

What is a System? Industrial Control System (ICS) or SCADA system Available from a single supplier Supported by a single supplier Components are integrated into a single system May consist of multiple Security Zones Can be identified by a product name and version Off the shelf; not site or project engineered yet 12 ISA Security Compliance Institute

ISASecure SSA Certification Program System Security Assessment (SSA) Security Development Lifecycle Assessment (SDLA) Functional Security Assessment (FSA) Ensures Security Was Designed-In The supplier s system development and maintenance processes are audited for security practices Ensures the system was designed following a robust, secure development process Ensures Fundamental Security Features are Provided A system s security functionality is audited against defined requirements for its target security level Ensures the system has properly implemented the security functional requirements System Robustness Testing (SRT) and Vulnerability Identification Testing (VIT) Identifies Vulnerabilities in Actual Implementation Structured penetration testing at all entry points Scan for known vulnerabilities (VIT) Combination of CRT and other techniques 13 ISA Security Compliance Institute

SSA System Robustness Test Asset Discovery Scan scan to discover the components on the network Communications Robustness Test verify that essential functions continue to operate under high network load and malformed packets Network Stress Test verify that essential functions continue to operate under high network load Vulnerability Identification Test scan all components for the presence of known vulnerabilities (using Nessus) based on National Vulnerability Database 14 ISA Security Compliance Institute

SSA System Robustness Test 15 ISA Security Compliance Institute

ISASecure Security Development Lifecycle Assurance (SDLA) 16 ISA Security Compliance Institute

SDLA Overview Certification that the supplier s product development work process includes security considerations throughout the lifecycle. (Organization process certification) Meets requirements of ISA/IEC-62443-4-1 (will be aligned with 4-1 when it is formally approved by IEC) Based on several industry-recognized security development lifecycle processes Launched on 30 May 2014 17 ISA Security Compliance Institute

SDLA Phases 1. Security Management Process 2. Security Requirements Specification 3. Security Architecture Design 4. Security Risk Assessment (Threat Model) 5. Detailed Software Design 6. Document Security Guidelines 7. Module Implementation & Verification 8. Security Integration Testing 9. Security Process Verification 10. Security Response Planning 11. Security Validation Testing 12. Security Response Execution 18 ISA Security Compliance Institute

Multiple Product Certification Security Development Lifecycle Assessment An organization s product development process is certified once per the SDLA requirements Security Development Lifecycle Assessment Functional Security Assessment Security Development Lifecycle Assessment Functional Security Assessment Individual products are certified which includes an assessment to verify the certified SDLA process was followed. Robustness Testing Robustness Testing Product #1 Product #n 19 ISA Security Compliance Institute

Security Levels Security Level 4 Security Level 2 Security Level 3 Secure Development Lifecycle Assessment Secure Development Lifecycle Assessment Security Level 1 Secure Development Lifecycle Assessment Secure Development Lifecycle Assessment Functional Security Assessment Functional Security Assessment Functional Security Assessment Functional Security Assessment Robustness Testing 20 ISA Security Compliance Institute

Test Tools Available for Use in ISASecure Communication Robustness Test tools 1. Codenomicon Defensics X 2. FFR Raven 3. Wurldtech Achilles Vulnerability Scanning Tools 1. Tenable - Nessus 21 ISA Security Compliance Institute

In Summary ISA/IEC-62443 standards set the requirements for Industrial Automation and Control Systems ISASecure certifies that suppliers and products meet the ISA/IEC-62443 standards Asset Owners have confidence that the IACS products they purchase are robust against network attacks and are free from known security vulnerabilities 22 ISA Security Compliance Institute

USA Government Executive Order ISA under Automation Federation facilitating NIST effort to develop a cybersecurity framework. Draft framework 1.0 completed in 2013. IEC 62443 standards are prominent in the document. Cybersecurity Framework 2.0. Plans are underway for a meeting this Fall in Illinois by the White House and NIST 23 ISA Security Compliance Institute

Who to contact for ISA99 committee Eric Cosman Co-Chairman ISA99 Committee eric.cosman@gmail.com Jim Gilsinn Co-Chairman ISA99 Committee jimgilsinn@gmail.com 24 ISA Security Compliance Institute

Who to Contact to Certify Products ISASecure EDSA Chartered Lab: Exida Mike Medoff Director of Security Services Phone: (215) 453-1720 Fax: (215) 257-1657 Email: mmedoff@exida.com Website: http://www.exida.com ISASecure EDSA Chartered Lab: CSSC - Japan Kenzo Yoshimatsu Phone: +81 (22) 353-6751 Email: kenzo.yoshimatsu@css-center.or.jp Website: http://www.css-center.or.jp 25 ISA Security Compliance Institute

Who to contact for ISCI Membership Andre Ristaino Managing Director, ASCI Phone: 919-990-9222 Fax: 919-549-8288 Email: aristaino@isa.org Website: http://www.isasecure.org 26 ISA Security Compliance Institute

Glossary Acronym Description ACLASS ANSI CSSC ISA IACS ICS IEC IPA ISCI JAB One of three brands of the ANSI-ASQ National Accreditation Board American National Standards Institute Control System Security Center, Japan-R&D and test lab in Sendai Japan International Society of Automation Industrial Automation and Control System Industrial Control System International Electrotechnical Commission Information-technology Promotion Agency, Japan ISA Security Compliance Institute Japan Accreditation Bureau-Japan based IEC accreditation body (AB) 27 ISA Security Compliance Institute

ISA 62443 Status (Oct, 2013) 28 ISA Security Compliance Institute