ISA Security Compliance Institute



Similar documents
ISA Security Compliance Institute

1 ISA Security Compliance Institute

ISA Security Compliance Institute ISASecure IACS Certification Programs

ISA Security. Compliance Institute. Role of Product Certification in an Overall Cyber Security Strategy

CSSC-CL Announces ISASecure Certification of Hitachi and Yokogawa Industrial Control Devices. ~For More Globally Competitive Control System Devices ~

SSA-312. ISA Security Compliance Institute System Security Assurance Security development artifacts for systems

ISA Security Compliance Institute. ISASecure Embedded Device Security Assurance Certification

EDSA-300. ISA Security Compliance Institute Embedded Device Security Assurance ISASecure certification requirements

Applying ISA/IEC to Control Systems MESAKNOWS. Graham Speake. Principal Systems Architect Yokogawa. Do you know MESA? Additional partner logos

Does Aligning Cyber Security and Process Safety Reduce Risk?

Industrial Control System Cyber Security

Security Standards Overview

Rethinking Cyber Security for Industrial Control Systems (ICS)

Revision History Revision Date Changes Initial version published to

CSMS. Cyber Security Management System. Conformity Assessment Scheme

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

Frequently Asked Questions

EDSA-201. ISA Security Compliance Institute Embedded Device Security Assurance Recognition process for communication robustness testing tools

Security Certification A critical review

Industrial Cyber Security 101. Mike Spear

Fire and Gas Solutions. Improving Safety and Business Performance

Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium , Miami Beach FL / USA

Cyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division

Is your current safety system compliant to today's safety standard?

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

PLCs and SCADA Systems

ISA CERTIFIED AUTOMATION PROFESSIONAL (CAP ) CLASSIFICATION SYSTEM

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Cybersecurity in a Mobile IP World

Turbine Controls Update

Innovative Defense Strategies for Securing SCADA & Control Systems

Document ID. Cyber security for substation automation products and systems

Certification Report

ISACA rudens konference

What Risk Managers need to know about ICS Cyber Security

Wireless Process Control Network Architecture Overview

Cyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC)

ARC VIEW. Services Oriented Drives Support Critical Energy Management and Asset Management Applications through IT/OT Convergence. Keywords.

Introducing atsec information security. Helmut Kurth, Sal la Pietra and Staffan Persson

Adobe Systems Incorporated

AUTOMATION AND PROCESS CONTROL

Session 14: Functional Security in a Process Environment

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Secure Networks for Process Control

Cyber Security Health Test

FSSC Q. Certification module for food quality in compliance with ISO 9001:2008. Quality module REQUIREMENTS

White Paper. 7 Steps to ICS and SCADA Security. Tofino Security exida Consulting LLC. Contents. Authors. Version 1.0 Published February 16, 2012

Security Testing in Critical Systems

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

Selecting Sensors for Safety Instrumented Systems per IEC (ISA )

Siemens Openlab Major Review. PLCs Security. October Author: Filippo Tilaro Supervised by: Brice Copy

Certification Report

Cybersecurity Guidance for Industrial Automation in Oil and Gas Applications

The Group CYTEK CYTEK PROJECTS CONSULTING

This is a preview - click here to buy the full publication

Ernie Hayden CISSP CEH GICSP Executive Consultant

Certification Report

Uniformance Asset Sentinel. Advanced Solutions. A real-time sentinel for continuous process performance monitoring and equipment health surveillance

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

Global Industrial Cyber Security Professional GICSP

Implementation of Operator Authentication Processes on an Enterprise Level. Mark Heard Eastman Chemical Company

WORKSHOP Rethinking Cyber Security for Industrial Control Systems

Certification Report

NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER

Role Based Access Control for Industrial Automation and Control Systems

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

The Information Assurance Process: Charting a Path Towards Compliance

Reducing Risk in Large-scale Process Automation Projects

Control System Integrity (CSI) Tools and Processes to Automate CIP Compliance for Control Systems

Certification Report

Process Automation - History and Future

Certification Report

Verve Security Center

The Convergence of IT Security and Compliance with a Software as a Service (SaaS) approach

How To Integrate Software And Systems

ISA-99 Industrial Automation & Control Systems Security

Cyber Security nei prodotti di automazione

DEVELOPING SECURE SOFTWARE

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

How To Evaluate Watchguard And Fireware V11.5.1

Steve Apps Senior Manager Accenture South Africa

Foreword Introduction - The Global Food Safety Initiative (GFSI) Scope Section Overview Normative References...

Advanced automation and real-time business intelligence Solutions for the Energy & Utilities markets M A N A G I N G T H E E S S E N T I A L S

IT Security and OT Security. Understanding the Challenges

Certification Report

Terminal Automation Solutions

Industrial Security Solutions

Historians and Production Management as Cloud Applications

Transcription:

ISA Security Compliance Institute Johan Nye Chairman ISCI Governing Board 1 ISA Security Compliance Institute

agenda topics About ISA Security Compliance Institute (ISCI) About ISA 99 Standards 2013 ISCI Certification Programs: Embedded Device Security Assurance (EDSA) System Security Assurance (SSA) Supplier Development Lifecycle Assurance (SDLA) 2 ISA Security Compliance Institute

About ISCI Organization Consortium of Asset Owners, Suppliers, and Industry Organizations formed in 2007 under the ISA Automation Standards Compliance Institute (ASCI): Mission Establish a set of well-engineered specifications and processes for the testing and certification of critical control systems products Decrease the time, cost, and risk of developing, acquiring, and deploying control systems by establishing a collaborative industry-based program among asset owners, suppliers, and other stakeholders 3 ISA Security Compliance Institute

Internationally Accredited Conformance Scheme ISASecure certification programs are accredited as an ISO/IEC Guide 65 conformance scheme by ANSI/ACLASS. This includes both ISO/IEC 17025 and ISO/IEC 17011. Provides global recognition for ISASecure certification Independent CB accreditation by ANSI/ACLASS ISASecure can scale on a global basis Ensures certification process is open, fair, credible, and robust. 4 4 ISA Security Compliance Institute

ISCI Member Companies ISCI membership is open to all organizations Strategic membership Technical membership Government membership Associate membership Informational membership Member organizations Chevron exida ExxonMobil Honeywell IT Promotion Agency, Japan (IPA) Invensys RTP Corp. Siemens Yokogawa ISA99 Committee Liaison 5 ISA Security Compliance Institute

About ISA99 Standards Systems Devices 6 ISA Security Compliance Institute

ISASecure Security Levels LEVEL 3 LEVEL 2 Secure Development Lifecycle Assessment LEVEL 1 Secure Development Lifecycle Assessment Functional Security Assessment Secure Development Lifecycle Assessment Functional Security Assessment Functional Security Assessment Robustness Testing 7 ISA Security Compliance Institute

ISASecure Secure Development Lifecycle Assessment (SDLA) 8 ISA Security Compliance Institute

SDLA Phases 1. Security Management Process 2. Security Requirements Specification 3. Security Architecture Design 4. Security Risk Assessment (Threat Model) 5. Detailed Software Design 6. Document Security Guidelines 7. Module Implementation & Verification 8. Security Integration Testing 9. Security Process Verification 10. Security Response Planning 11. Security Validation Testing 12. Security Response Execution 9 ISA Security Compliance Institute

Multiple Product Certification Supplier Secure Development Lifecycle Assessment An organization s product development process is certified once per the SDLA requirements Product Secure Development Lifecycle Assessment Functional Security Assessment Product Secure Development Lifecycle Assessment Functional Security Assessment Individual products are certified which includes an assessment to verify the certified SDLA process was followed. Robustness Testing Robustness Testing Product #1 Product #n 10 ISA Security Compliance Institute

ISASecure Embedded Device Security Assurance (EDSA) 11 ISA Security Compliance Institute

What is an Embedded Device? Special purpose device running embedded software designed to directly monitor, control or actuate an industrial process, examples: Programmable Logic Controller (PLC) Distributed Control System (DCS) controller Safety Logic Solver Programmable Automation Controller (PAC) Intelligent Electronic Device (IED) Digital Protective Relay Smart Motor Starter/Controller SCADA Controller Remote Terminal Unit (RTU) Turbine controller Vibration monitoring controller Compressor controller 12 ISA Security Compliance Institute

ISASecure EDSA Certification Program Embedded Device Security Assurance (EDSA) Software Development Security Assessment (SDSA) Functional Security Assessment (FSA) Detects and Avoids systematic design faults The vendor s software development and maintenance processes are audited Ensures the organization follows a robust, secure software development process Detects Implementation Errors / Omissions A component s security functionality is audited against its derived requirements for its target security level Ensures the product has properly implemented the security functional requirements Communications Robustness Testing (CRT) Identifies vulnerabilities in networks and devices A component s communication robustness is tested against communication robustness requirements Tests for vulnerabilities in the 4 layers of OSI Reference Model 13 ISA Security Compliance Institute

ISASecure EDSA Certified Devices Supplier Type Model Version ISASecure Level Honeywell Safety System Safety Manager R145 Level 1 RTP Corp. Safety System RTP 3000 A4.36 Level 2 Honeywell DCS Controller Experion C300 R400 Level 1 Honeywell Fieldbus Interface Experion FIM R400 Level 1 14 ISA Security Compliance Institute

ISASecure System Security Assurance (SSA) 15 ISA Security Compliance Institute

What is a System? An Industrial Control System (ICS) or SCADA system that is available from a single system supplier It may be comprised of hardware and software components from several manufacturers but must be integrated into a single system and supported, as a whole, by a single supplier 16 ISA Security Compliance Institute

ISASecure SSA Certification Program System Security Assessment (SSA) System Development Security Assessment (SDSA) Functional Security Assessment (FSA) Ensures Security Was Designed-In The supplier s system development and maintenance processes are audited for security practices Ensures the system was designed following a robust, secure development process Ensures Fundamental Security Features are Provided A system s security functionality is audited against defined requirements for its target security level Ensures the system has properly implemented the security functional requirements System Robustness Testing (SRT) Identifies Vulnerabilities in Actual Implementation Structured penetration testing at all entry points Scan for known vulnerabilities Combination of CRT and other techniques 17 ISA Security Compliance Institute

Typical changes driven by the certification process Review / update Secure Development Lifecycle Security training for development and test teams Security experts identified for each development location New security documentation created Increased risk analysis and expanded threat modeling Expanded abuse case, DoS, and fuzz testing Tracking security issues / security impact of product issues 18 ISA Security Compliance Institute

Who to Contact to Certify Products ISASecure EDSA Chartered Lab: exida John Cusimano Director of Security Services Phone: (215) 453-1720 Fax: (215) 257-1657 Email: jcusimano@exida.com Website: http://www.exida.com 19 ISA Security Compliance Institute

Who to contact for ISCI Membership Andre Ristaino Managing Director, ASCI Phone: 919-990-9222 Fax: 919-549-8288 Email: aristaino@isa.org Website: http://www.isasecure.org 20 ISA Security Compliance Institute