TR84.00.09-2017 Red
TR84.00.09-2017 Red
Certification
Education & Training
Publishing
TECHNICAL REPORT
ISA-TR84.00.09-2017
NOTICE OF COPYRIGHT
This Is a copy•ight docuMent a.,d mav •ol be copied ot
<Mtt buted In anv fotm oi manner -.. thou: the permission of
ISA. -h.1 co';r(ol me dc>cume111 was made for !he sole u.se or
tN! person 10 .. hom tSA prov1ded It 3M! JS SJbject to t'1e
1es~tions stated ""151\'s ce<1se to tha: DerSOn.
It m.tv no: be p1ov <led to an·, other oe<>0n In Oflnt,
electronic, or a'ly o:~er 'orm. V10l1:.ons ol ISA' s copyr-ght
w1 be prosMtt:ed !O !he fullest n:ent o• t'1e law a"" may
1esult 11 substantla I clv1 and cr"l'llna oena ttles.
I SA·TR84.00.09-2017, Cybersecurity Re lated to the Functional Safety Lifecycle
Copyright © 2017 by ISA. All rights reserved . Not for resale. Printed in the United States of
America.
ISA
67 Alexander Drive
P. 0 . Box 12277
Research Triangle Park, NC 27709 USA
-3- ISA-TR84.00.09-2017
PRE FACE
This preface, as well as all footnotes and annexes, is included for information purposes and is not
part of ISA-TR84 .00 .09-2017 .
T his document has been prepared as part of the service of ISA, the International Soc iety of
Automation , toward a goal of un iformity in the field of instrumentation . To be of real value , this
document should not be static but should be subject to periodic review. Toward this end , the
Society welcomes all comments and criticisms and asks that they be addressed to the Secretary,
Standards and Practices Board; ISA; 67 Alexander Drive; P. 0 . Box 12277; Research Triangle
Park, NC 27709; Telephone (919 ) 549-84 11; Fax (919) 549-8288; E-mail: standards@isa .org .
It is the policy of ISA to encourage and welcome the participation of all concerned individuals and
interests in the development of ISA standards, recommended practices and technical reports .
Participation in the ISA standards-making process by an individual in no way constitutes
endorsement by the employer of that individual , of ISA or of any of the standards, recommended
practices and technical reports that ISA develops.
CAUTION - ISA DOES NOT TAKE ANY POSITION WITH RESPECT TO THE EXISTENCE OR
VALIDITY OF ANY PATENT RIGHTS ASSERTED IN CONNECTION WITH THIS DOCUMENT,
AND ISA DISCLAIMS LIABILITY FOR THE INFRINGEMENT OF ANY PATENT RESULTING
FROM THE USE OF THIS DOCUMENT. USERS ARE ADVISED THAT DETERMINATION OF THE
VALIDITY OF ANY PATENT RIGHTS, AND THE RISK OF INFRINGEMENT OF SUCH RIGHTS,
IS ENTIRELY THEIR OWN RESPONSIBILITY.
OTHER PATENTS OR PATENT CLAI MS MAY EXIST FOR WHICH A DISCLOSURE OR LETTER
OF ASSURANCE HAS NOT BEEN RECEIVED. ISA IS NOT RESPONSIBLE FOR IDENTIFYING
PATENTS OR PATENT APPLICATIONS FOR WHICH A LICENSE MAY BE REQUIRED, FOR
CONDUCTING INQUIRIES INTO THE LEGAL VALIDITY OR SCOPE OF PATENTS , OR
DETERMINING WHETHER ANY LICENSING TERMS OR CONDITIONS PROVIDED IN
CONNECTION WITH SUBMISSION OF A LETTER OF ASSURANCE, IF ANY, OR IN ANY
LICENSING AGREEMENTS ARE REASONABLE OR NON- DISCRIMI NATORY.
ISA REQUESTS THAT ANYONE REVIEWING THIS DOCUMENT WHO IS AWARE OF ANY
PATENTS THAT MAY IMPACT IMPLEMENTATION OF THE DOCUMENT NOTIFY THE ISA
STANDARDS AND PRACTICES DEPARTMENT OF THE PATENT AND ITS OWNER.
ISA (www.isa.org) is a nonprofit professional association that sets the standard for those who apply
engineering and technology to improve the management, safety, and cybersecurity of modern
ISA-T R84 .00.09-2017 -4 -
automation and control systems used across industry and critical infrastructure. Founded in 1945,
ISA develops widely used global standards; certifi es industry professionals; provides education
and training ; publ ishes books and technical articles; hosts conferences and exhibits; and provides
networking and career development programs for its 40,000 members and 400,000 customers
around the world .
ISA owns Automation.com , a leading online publisher of automation-related co,ntent, and is the
founding sponsor of The Automa tion Federation (www.automationfederation.org ), an association
of non-profit organizations serving as "The Voice of Automation ." Through a wholly owned
subsidiary, ISA bridges the gap between standards and their implementation with the ISA Security
Compliance Institute (www.isasecure.org ) and the ISA Wireless Compliance Institute
(www.isa100wci.org).
The fo llowing members of ISA84 Working Group 9 served as active contributors in the development
of this technical report revision :
NAME AFFILIATION
Kevin Arnold Phillips 66
Dave Bennett Phillips 66
Rahul Bhojani BP
John D. Day Air Products and Chemicals
David Deibert Air Products and Chemicals
Andrew Feben Eigen Ltd
David Gunter Air Products and Chemicals
Eric Hopp Rockwell Automation
Kevin Klein Chevron
Vic Maggioli Feltronics Corp
Marcelo Mollicone SYM PCS
Nagappan Muthiah Wood Group
Eric Persson ex id a
Jeff Potter Emerson
Richard Roberts Suncor Energy
Eloise Roche SIS-T ECH Solutions, LP
Byron Schneidau BP Pipelines & Logistics
Herm an Storey Herman Storey Consulting
Harold W Thomas (Hal) ex id a
Paulo Vergara Zavior Consulting
The following members of ISA84 and ISA99 are acknowledged for their peer review of this
technical report revision .
NAME AFFILIATION
Eric Cosman OIT Concepts , LLC
John Cusimano AE Solutions
Marc Baque Total
Dennis Holstein OPUS Consulting Group
Joe Weiss Applied Control Solutions LLC
John Ayuk Mustang Engineering
Scott Nielsen Mustang Engineering
Rahul Gupta Worley Parsons
Brad Bonnette Wood Group
David Dalke Mustang Engineering
Paul Gruhn AE Solutions
-5- ISA-TR84 .00.09-2017
The following served as members of the Standards and Practices Board and approved the
document on 10 Apri l 2017 :
NAME AFFILIATION
M. Wilkins, Vice President Yokogawa
D. Bartusiak ExxonMobil Research & Engineering
D. Brandl BR&L Consulting
P. Brett Honeywell Inc.
E. Cosman OIT Concepts, LLC
D. Dunn Phillips 66
J . Federtein Federtein & Assoc. LLC
B. Fitzpatrick Wood Group Mustang
J . Gilsinn Kenexis Consulting
J.-P. Hauet KB Intelligence
D. Lee UCDS
G. Lehmann AECOM
K.-P. Lindner Endress+Hauser Process Solutions AG
T. McAvinew Consultant
V . Mezzano Fluor Corp.
C. Monchinski Automated Control Concepts Inc.
G. Nasby City of Guelph Water Services
M. Nixon Emerson Process Management
D. Reed Rockwell Automation
N. Sands DuPont
H. Sasajima Fieldcomm Group Inc. Asia-Pacific
H. Storey Herman Storey Consulting
K. Unger Consultant
I. Verhappen Industrial Automation Networks
D. Visnich Bums & McDonnell
W . Weidman Consultant
J. Weiss Applied Control Solutions LLC
D. Zetterberg Chevron Energy
This page intentionally left blank.
-7- ISA-TR84 .00.09-2017
CONTENTS
FOREWORD .......................................................................................................................... 9
0 Introduction .................................................................................................................... 11
0.1 Executive summary ............................................................................................... 11
0.2 Integrated lifecycle ................................................................................................ 11
0.3 Safety versus cybersecurity considerations ........................................................... 13
Scope ............................................................................................................................ 17
2 References .................................................................................................................... 17
3 Terms, definitions, abbreviated terms, acronyms, and conventions ................................ 18
3.1 Terms and definitions ............................................................................................ 18
3.2 Abbreviated terms and acronyms .......................................................................... 20
4 Management of SCAI cybersecurity in the process sector .............................................. 23
4.1 Objective .............................................................................................................. 23
4.2 Guidelines ............................................................................................................. 23
5 Cyber risk assessment phase ... .. .................................................................................... 27
5.1 Overview ............................................................................................................... 27
6 Hazard and risk analysis ................................................................................................ 29
7 Allocation of Security Levels (SL) ................................................................................... 32
8 Cybersecurity Requirements Specification (CSRS) for the IACS ..................................... 33
9 Cybersecurity design and implement phase .................................................................... 35
9.1 Overview ............................................................................................................... 35
10 Design and engineering ........... .. .................................................................................... 37
10.1 Cybersecurity concept ........................................................................................... 37
10.2 Other means of cyber risk reduction ...................................................................... 40
10.3 Security level verification ...................................................................................... 40
10.4 Detailed design ..................................................................................................... 41
10.5 Detailed design verification ................................................................................... 42
10.6 System Integration ................................................................................................ 43
10.7 Cybersecurity FAT (CFAT) .................................................................................... 43
11 Installation, commissioning and validation ...................................................................... 44
11 .1 Overview ............................................................................................................... 44
11 .2 Cybersecurity Site Acceptance Test (CSAT) ......................................................... 44
11 .3 Initial validation of countermeasures ..................................................................... 44
11.4 Pre-Startup Safety Review (PSSR) ....................................................................... 44
12 Operate and maintain phase .......................................................................................... 45
12. 1 Overview ............................................................................................................... 45
12.2 Operation ............ ...... ...... ........................... .............. .... ....... ........... ... ......... ....... .... 47
12.3 Cybersecurity metrics ........................................................................................... 4 7
12.4 Physical security of a SCAI system ....................................................................... 47
12.5 Unauthorized access of a SCAI system ................................................................. 48
12.6 Authorized change management of a SCAI system ............................................... 48
12.7 Unauthorized communication with a SCAI system ................................................. 48
ISA-T R84 .00.09-2017 -8-
FOREWORD
This technical report is part of a series of standards and technical reports that address the issue
of safety instrumented system security. It has been developed by Working Group 9 of the ISA84
committee in cooperation with the ISA99 committee.
This technical report provides gu idance on how to implement cybersecurity within the I EC-61511
and ISA-84 .00.01-2004 lifecycle. This is the second issue of this technical report. Members of the
ISA84 and ISA99 committees contributed to this effort.
Readers of this technical report are asked to send comments on the content and suggestions for
coverage in future revisions to the following email address:
standards@lsa.org
This page intentionally left blank .
- 11 - ISA-TR84.00.09-2017
0 Introduction
0.1 Executiv e summary
Safety Instrumented Systems (SIS) represent one layer of protection that may be implemented in
order to reduce risk within the process industry. Other layers of protection may consist of
instrumented systems performing alarms, interlocks , permissive functions or controls using
devices within the basic process control system (BPCS), as well as non-instrumented systems
such as relief devices , check valves, etc. Traditional process hazard analysis (PHA). in the past,
has generally excluded the potential for cyber related attacks to cause process safety incidents.
Given that targeted attacks on industrial automation and control systems (IACS) , including the
systems executing safety controls, alarms , and interlocks (SCAI), have occurred and these
systems are increasingly being connected to other business systems, cyber vulnerabilities
represent a significant potential for common mode fa ilure . As a result, it is necessary in today's
world to include cyber risk in the overall PHA.
Without addressing cybersecurity throughout the entire safety lifecycle, it is not possible to
adequately understand the relative independence and integrity of the various layers of protection
that involve instrumented systems, including the SIS.
The underlying premise of this document is to help the reader understand how to integrate
cybersecurity into the safety lifecycle . Guidance is provided on how to implement, operate and
maintain safety controls, alarms , and interlocks (SCAI) in a secure manner. As part of this
integration, it should also be understood that achieving higher security levels may result in less
convenience to the end user. Addressing cybersecurity and functiona l safety of the SCAI systems
within the IACS requires that this document serve both the ISA84 series of standards as well as
the ANS l/I SA-62443 series of standards.
Figure 2 seeks to show, at a high level, how functional safety and cybersecurity could integrate
within the overall safety lifecycle , starting with a new process plant at the initial scope stage and
continuing throughout all phases of the lifecycle. Although the NIST (National Institute of Standards
and Technology) framework is not the only one that can be selected , it was used as a quality
assurance tool when developing this technical report to help ensure any potential gaps were
minimized . The overall result is an example of a single process safety management process,
incorporating IEC-61511 , ISA-84 .00 .01 , ANSl/ISA-84.91 .01 , Draft ISA-84 .'91.03, and the
applicable ANSl /I SA-62443 series of standards. Additional lifecycle details are provided
throughout this technical report. It is recognized that the lifecycle figures in this technical report
are an interpretation and that there may be other appropdate means to address the IEC 615 11
lifecycle with respect to functional safety and cybersecuri1ty. It should also be recognized that
different functional disciplines will of necessity be responsible for different aspects of the lifecycle .
This technical report is mainly targeted at process control , process safety, and operations
personnel so that the impact of cybersecurity regards process safety can be better understood as
well as to help understand the necessary relationship with i nformation technology (IT} personnel.
While not directl y targeted at IT personnel, they may find this document useful regards the
relationship between safety and cybersecurity in the process industry.
ISA-T R84 .00.09- 201 7 - 12 -
Safety Requirements
Specification for the
Safety I n1trvmented
System Clau&es
3 10 & 12
Clau11ts 7,
ClauH 5 Clause 6.2 12.4 &
12.7
Oec:ommlsslonlng
~ [j] 8 CiauH 18 [ID
Logond:
,---,
L__ ~ No guidance given in this tecmical report.
NOTE The clause numbers w ithin tho olomonts of Figure above rofor to clauses in
ISA-84.00.01· 2004 Part 1 (IEC 61511 · 1 Mod).
- 13 - ISA-TR84.00.09-2017
NIST Framework
Common differences between IT and IACS that typically exist today are included in Table 1:
ISA-T R84 .00.09-2017 - 14 -
IT IACS
Response time performance Limited knowledge of process Should be real time relati ve to the
response time requirements process dynamics. e.g., milli·
seconds, seconds.
Ava II ability Occasional outages tolerated Outages not tolerable
Data confidentiality Data privacy is critical Data privacy generally less critical
Data integrity I Configuration and/or Critical Critical
software integrity
Technology lifecycle 3 - 5 years 20• years
Outsourcing Common Less common
Patching Timely Less frequent I As required
Anti-virus Common Old legacy systems may not be
supported. Potential undesirable
side-effects with real-time process
Cybersecurity awareness
I Good
-
control software.
Poor I Improving
Process safety risk awareness Poor Good
Risk assessment granularity Coarse (e.g .. all control loops) Fine (e.g.. individual loop)
Changes Easy to implement Dif icult to implement
Sa' ety integrity awareness Poor Good
PHA revalidation No expl icit requirement No greater than 5 years
Successful cybersecurity programs consider the differences between traditional IT roles and
IACS to develop a cohesive program that delivers on the needs of both organizations.
Table 2 below contrasts cybersecurity versus functional safety as a functi on of the safety lifecycle .
- 15 - ISA-TR84 .00.09- 2017
Ta1get o' Equipment urder control (EUC) Systerr. under Considerat on (SuC)
evaluation
Random fa lures due to opere:ional and enwoomen:al Tiveal5: in:emal, extell'al or combnation
,tresses
Sys:Sr.iatc fa hites due to errors dunng sa'e:y llfecycle .
Vulrerab-1 ~ a\re to
=a1lure
'le!hood .. componen: or system aesign ~ws
malt ng non-vahda:ea changes
not following cybersecur ty practices and
procedures
. Th.rea:s explo t.og vulnerab h:1es leads to
'a ure
~IS'(
ian~)'s s
Conseqoence Im pact on environment, health and sa'e:y of personnel Loss of ava ab1I : y ana! or data 11tegn:y has d1ect
seven:y i3l'd the general publ c mpact, ano loss o' cool den:1al ty has rd1rect impact on
•unctJOnal sa!ety
Sasao on hkel rood and seventy; nsk may be a\Iantlf ed Based on likelihood ard seven:y; ris'( ~ currently
iaualitalve
Rls '( categonzation 'or every cybersecunty reqtrrer.i ent
~ISk
~'ufu..d11T1ens1onal problem
categoriza Lon
Assignee to zone wlh targets lor each zone/conduit
Relles on independent protection layers concep: Relies on cybe'5ecu;ty coun:Bfrleasures w:th.n zones,
Sa!eguatds reduce hketihood of conseouence lcondul\S nteroonneccing mres, and defense n aepth
ievaruateo iconcep:
~1sk mitigation Countermeas~es reduce li'(el.hood
ldenufles n:egr1tyrequ.1err.en:s for safeguards; for SIF
measures oentifes reauiremerls for c:ouitenneasures to meet
!assigns target S L
:he zone targets _ for each threat vector
Restrc: access to IACS corrponenlS to oorrpetent Restnct access to IACS components to competent
P>ersonnel w:h necessary access pr1Vleges Pelsonnel with necessary access privfeges
Perodic testrg of measures Pe1"0dic test ng of rr. easures
pPeratlOn and rr.antenance Derrana rate and oorr.ponent fa lures to be rr.oni:oreo Frequent reviews to i<lentifynew vulnerabill:iesano
Awareness and uainmg .ake appropriate acticm . ' necessary
Awareness and trallllllg
Cyber nsk reassessnent after each software or
~·are change
Management system Defines requirerrents for competency, training. Deines requirenenlS for COIT pe:ency, tra., ng,
rvenflcat10n, tesL1'9, audh, MOC. and docurr.en:a:ion r.-en'icaLJOn, testrg, aua11.. l.10C, ard docurr.en:a:lon
ISA-T R84 .00. 09-2017 - 16 -
1 Scope
This document is intended to address and provide guidance on integrating the cybersecurity
lifecycle with the safety lifecycle as they rela te to Safety Controls , Alarms, and Interlocks (SCAI),
inclusive of Safety Instrumented Systems (SIS). This scope includes the work processes and
countermeasures used to reduce the risk involved due to cybersecurity threats to the Industrial
Automation and Control System (IACS) network.
This scope provides recommendations to ensure SCAI are adequately secured due to the potential
for cyber attacks that can act like common mode failures that initiate a hazardous demand and
also prevent instrumented protection functions , including the SIS , from performing their intended
purpose. The scope is intended to address cybersecurity from both externa l and internal threats.
Although not directly within the scope , enterprise networks, business networks and process
information networks (demilitarized zones) that represent a threat vector to the SCAI systems, or
contain countermeasures that reduce the risk to the SCAI systems from external cyber threats, are
included .
The scope does not address physical plant protection (for example , fences, bollards, and
grounding) that has the intent of preventing unauthorized entry into the plant so as to prevent theft ,
vandalism , or physical damage, but does address physical access issues related to cybersecurity
of the IACS ( 12.4 of this technical report ). SCAI systems that are constructed exclusively of
electrical/electronic components without digital signal technology are not vulnerable to
cybersecurity attacks, and these technologies are not discussed in this technical report.
2 References
The fo llowing documents are important for understanding this technical report. For dated
references, only the ed ition cited applies . For undated references, the latest editi on of the
referenced document (including any amendments) applies . For information on obtaining ISA
standards and technical reports, visit: www.isa.org/findstandards
In addition, readers should be aware of the ongoing development of additional standards in the
ANSl/I SA-62443 series, Security for Industrial Automation and Control Systems , listed in the
Bibliography. For an update on the status of these standards , visit https://www.isa.org/isa99/ .
• IEC-61511-1 , Functional Safety: Safety Instrumented Systems for the Process Industry Sector
- Part 1: Framework, Definitions, System, Hardware and Software Requirements .
• ISA-84 .00.01-Part 1 (I EC 61511-1 ), Functional Safety: Safety Instrumented Systems for the
Process Industry Sector - Part 1: Framework, Definitions, System, Hardware and Software
Requirements.
• ANSI/I SA-84 .9 1.0 1-20 12, Identification and Mechanical Integrity of Safety Controls, Alarms,
and Interlocks in the Process Industry , 2012 .
ISA-TR84 .00.09-2017 - 18 -
Cyber asset Device contained within the system under consideration (SuC), e.g .,
controller, server, engineering work station , etc .
Cyber incident Communication with an E/E/PE device within a control system that
negatively impacts process safety, the environment, operations,
confidentiality, SCAI integrity, or IACS availability
Risk Reduction The measure of the degree of risk reduction required to achieve
Factor (RRF) - tolerable risk. RRF can be expressed as the ratio of unmitigated risk
Target divided by tolerable risk.
Risk Reduction The measure of the degree of risk reduction achieved by a safeguard ,
Factor (RRF) - countermeasure, or protection strategy. Achieved RRF can be
Achieved expressed as the ratio of unmitigated risk divided by mitigated risk
resulting from that safeguard, countermeasure, or protection
strategy. For an independent low demand safety function, this can be
expressed as the reciprocal of the average probability of failure on
demand.
that everyone would agree without reservation to take this risk or have it
imposed on them .
Risk tolerance A predeterm ined measure of risk used to aid decisions about whether
criteria (CCPS cr-cer•aJ further efforts to reduce risk are warranted.
Threat vector Path or means by which a threat agent can gain access to an asset
[ISA -62443·1 · 21 resulting in a negative outcome
Unmitigated cyber Level of risk that is present in a system before any cybersecurity
risk countermeasures are considered
zone 11sA -s2••3·3·J I Grouping of logical or physical assets that share common security
requirements .
Noto to entry: A zone has a clear border. Tho security poli cy of a zono is typically
enforced by a combination of mechanisms both at tho zone odgo and within tho zone.
For additional definitions, see IEC-61511 121, ISA-84.00.01-2004 13 1, and ISA-62443-1-2 151
Any cybersecurity management system implemented within an organization should have included
in it conditions which dictate re-evaluating the risk assessment. These may include, but are not
limited to
• developing a new, or designing a modification to, an existing process con trol system or
SCAI system ;
• implementing a new or modified process control system or SCAI system ; and
• retiring/decommissioning a process control system or SCAI system .
4.2.2 Organ izati on and resources
Those responsible for the execution and/or measurement of the performance for each of the safety
lifecycle phases should be clearly identified and then communicated to applicable personnel so
that they understand their accountabilities and responsibilities therein . These roles and
responsibilities extend beyond the organization itself and includes product suppliers as well. There
are a range of potential requirements that may apply, requiring a breadth of applicable engineering
competencies , including process engineering , instrumentation and controls , cybersecurity,
physical security, legal and regulatory knowledge , functional safety engineering , etc .
The roles and responsibilities associated with cybersecurity should be aligned with both internal
roles as well as with external partners .
The complexities and potential shortfalls in individual, organizational , and product supplier
competency while maintaining cybersecurity and functional safety within the IACS are such that a
sustainable, auditable program of training, famili arization and assessment is recommended.
4.2.3 Competency
The achievement of functional safety and cybersecurity requires the implementation of the safety
lifecycle while ensuring that persons who are responsible for any safety lifecycle activities also
have the appropriate competency in cybersecurity. The following competence factors should be
addressed when assess ing as well as justifying the competency level of persons to carry out their
duties :
ISA-TR84 .00.09-2017 - 24 -
Having access to the sensitive information contained in zone and conduit drawings and the
documents related to countermeasure design, verification , and validation would provide significant
assistance to a malicious attacker. For this reason , this information should be documented
separately from the remainder of the safety plan and consideration should be given in the safety
plan to identifying access restrictions that should be applied to this information duri ng all stages
of the lifecycle. Documents that are intended to be more widely available (e .g., safety plan and
safety requirement specification) should avoid providing countermeasure related details .
Within each organization, a chain of command should be established so that appropriate levels of
authority can have access to the information necessary to maintain a safe and cyber secure plant
- 25 - ISA-TR84.00.09-2017
environment. The plant manager should not be the only person with access to the implementation
plan, however; it should also not be publicly available to those without a clear need to know.
Network and design information and attributes should be properly classified as to their sensitivity.
Distribution and access to the information should be controlled appropriately to prevent distribution
of confidential information that is vital to the cybersecurity of the system .
Whenever a person is no longer associated with the SuC, all means of access should be eliminated
immediately.
Tile stages in the safety lifecycle at which the CSA activities are to be carried should be identified
during the safety planning. Consideration should be given to carrying out CSA activities at the
following stages :
• Stage 1 - After the detailed cyber risk assessment has been carried out, the required
countermeasures have be·en identified and the CSRS has been developed . Intent of this
assessment is to ensure that the conceptual design is complete and cons istent with the
intent of the risk assessment prior to detailed design engineering commencing.
• Stage 2 - After the IACS cybersecurity countermeasures have been designed . Intent of this
assessment is to ensure that the detailed design engineering is complete and consistent
with the intent of the conceptual design prior to issuing contracts for construction.
ISA-T R84 .00.09-2017 - 26 -
• Stage 3 - After the installation, pre-comm1ss1oning and final val idation of the IACS
cybersecurity countermeasures have been completed and operation, mai ntenance, and
emergency response procedures have been developed. This should be conducted as part
of the pre-startup safety review (PSSR) . Intent of this assessment is to ensure the plant is
secure and safe to begin operations.
• Stage 4 - After gaining experience in operating and maintenance. Intent is to validate
assumptions made and to correct risk assessment as applicable .
• Stage 5 - After modifications and prior to decommissioning . Intent is to ensure robust
management of change (MOC).
During the CSA, the team may also need to evaluate any development, production or tools used
to develop, support or maintain the systems in order to safeguard against negative impact on the
SCAI through the use, or misuse , of these tools .
Periodic or reactive CSA's may be performed throughout the lifecycle . These are used to review
existing procedures and performance or to evaluate the impact of a change. These are additional,
not replacement, activities which complement the scheduled FSA's embedded in the safety
lifecycle plan .
The roles and responsibilities of those responsible for physical security and those responsible for
cybersecurity should be identified and communicated so that the required security level is not
compromised .
A requirement in ISA-62443-3-2 1131 is to perform a high level cyber risk assessment. Its purpose
is to help final ize the scope for the project.
In preparation for a high level cyber risk assessment, it is necessary to identify the system under
consideration (SuC). As part of this, initial system architecture drawings should be prepared based
upon corporate policies and standards. A complete inventory of cyber assets that is intended to
comprise the scope of the project also should be developed and documented .
Results from the high level cyber risk assessment should be used to modify initial architectural
drawings I zone and conduit drawings if necessary, once a better understanding of high level risk
is available . It is also important at this stage to consider and provide an initial definition of the
countermeasures to be implemented based upon known potential vulnerabilities. T he zone and
conduit drawings and planned countermeasures provide needed information in order to conduct
the detailed cyber risk assessment required by ISA-62443-3-2 113 1 that follows the traditional
process hazard analysis (PHA).
ISA-T R84 .00.09-2017 - 28 -
The traditional process hazard review , utilizing HAZID, HAZOP, LOPA or other applicable
methodologies , should be performed prior to the detailed level cyber risk review . This sequence
allows the traditional review to identify and analyze the major process hazards that should be
considered when conducting the detailed level cyber risk assessment.
Any major cyber risks identified may need a more rigorous evaluation. This can involve traditional
quantitative consequence analysis techniques and possibly quantita tive cyber threat analysis as
part of the likelihood analysis when determining risk in order to determine if the tolerable risk
criteria can be achieved. If the risk criterion is not met, then additional measures should be
considered until the risk criterion is met.
Once the risk criterion is determ ined to be achievable , a CSRS is documented in a similar manner
to the safety requirements specification (SRS) for SIS so detailed design can begin. Following
development of the CSRS, a stage 1 CSA can be performed as part of the FSA that is
recommended in IEC-61S11 .
Clause 6 addresses the high level and detailed level cyber risk assessments . Clause 7 addresses
the determination of security leve l targets (SL-T) for the zones and cyber assets . Clause 8
addresses the CSRS .
l
Ide nt fy System Under U?a..atcd SVlte.,, Ater ~cct.1. ·e 01agra"11s.
Consideration [SuC) - - - -• 11rd lr•'"Cito-y v.· ti IACS ntcrr.1
Beg." P·o .,, De. g, ie-v-ce,./n. g:>ci-t 1cer~ "r:c
i
Hig'l Level Cyber R sk ,.or1"rv C· tc•lilv lb,k,rs /Ir:•
Sc.cur ty Lr>., tSLI Ta-geu
Assessment
l
h l.,1Zc'1c .rd Co.,c, l Orov,,rp w/
ary re"'11ote 11«e:ss. ?ti -i:t:s 1rd1..ded
From a process safety perspective in the process industry, there are added concerns beyond data
confidentiality and degraded performance that much of the overall industries focus on . When SCAI
is involved, there are two overriding concerns that set these systems and functions apart when
considering security measures :
• Safety function fai lure to perform when needed . This concern is exacerbated as a cyber
attack poses as a potential common mode that may produce the demand and cause the
safety function failing to respond . This can directly relate to the functional safety
requirement specificat ion (SRS} requirement to identify dangerous combinations of output
states the SIS needs to avoid and to the requirement to assess all protection layers for the
impact of common cause failures with other protection layers and with the initiating source
of the hazard . As a result, when considering cybersecurity, the cyber risk analysis should
be extended to the overall IACS .
• Spurious operation. In this case , the potential goes beyond simply causing a safety function
to spuriously operate. As a cyber attack is more likely to affect multiple safety functi ons ,
the potential business interruption and equipment damage may be much more significant.
When performing the hazard and risk analysis, the methodology should facilitate not only the
identification of potential hazards and vulnerabilities, but also should provide the ability to make
practical recommendations for implementation as well as decisions.
The cybersecurity threat landscape is continually changing , but there are some general
classifications of potential threat agents or sources that an organization should consider, as each
of these could be a cause of cyber incidents .
• Credential reuse - using the same set of credentials at multiple locations allows a threat
source to potentially compromise multiple systems.
• Confidential information release - releasing confidential information to a potential threat
source, whether intentionally or unintentionally, that allows the threat source to circumvent
cybersecurity countermeasures. These vulnerabilities could be in both technical and
countermeasures specified by cybersecurity policies , such as by not securing credential
databases, sending passwords in clear text across a network, or targeted social
engineering of employees.
• Systematic errors leading to misconfiguration (for example, failure to change default
passwords) .
• · General Viruses• that are not created to target a particular host, but they may cause
hazards after penetrating into the plant network.
• · unintentional Deactivation of a Cybersecurity Countermeasure" where a cybersecurity
countermeasure is bypassed as an indirect result of an action that is taken for a different
purpose.
The other aspect when conducting a cyber risk assessment that should be considered are threat
vectors that represent the pathways that various threat agents may use to exploit vulnerabilities
that exist for the system under consideration (SuC) . Additionally, common inadvertent actions that
result in degradation of the cybersecurity of the network, although non-malicious , should also be
considered . Some examples include :
• A well-meaning insider unwittingly introduces malware via a USB port using a flash drive
that had been compromised when using it on their personal computer connected to the
internet.
• A vendor or employee adding an unauthorized wireless access point because wireless was
not available.
• Attaching an unauthorized laptop to the process control network (PCN) to do work.
• Plugging in a cable that (bypasses the firewall) connects the PCN to the internet.
• Plugging both ends of a cable into the same switch or two switches wh ich already are
connected to the network thereby causing broadcast data (storm) to be fed directly back
into the network.
• Defective network interface card (NIC) card causing chatter.
• Equipment plugged in with duplicate IP Address creating IP Address conflict.
• Lab or test environment connected creating duplicate IPs, loops, duplicate HMI connections
etc .
• Modbus , Ethernet/IP, DNP3, and most other protocols having false master send commands
or data to slaves .
• Malware collects system data to be utilized later during an active attack .
• Unauthorized/Inadvertent switch/router/firewall change allows unauthorized , or blocks
necessary, traffic.
• Multi-homed computer gets compromised propagating malware or inadvertent routing
across NICs .
- 31 - ISA-TR84 .00.09-2017
The high level risk assessment can usually be performed at a corporate level to determine in
general what high level risks exist for their various processes. A high level risk review can be
completed using brain storming sessions or a more methodical criticality assessment. These type
of risk assessments are particularly important for new process technology or when no past cyber
risk assessments have been performed. For plants using processes that have been previously
reviewed using a high level risk assessment methodology, a quick checklist approach to determine
if any significant changes exist in the new project scope is a more appropriate means to conduct
this review. If significant changes are found to exist in the new project scope, then a more rigorous
review of those changes and their potential impact would be appropriate.
The more detailed cyber risk assessment should contain aspects of both safety and cybersecurity
and reflect the possible consequences of a failure to provide adequate cybersecurity
countermeasures as well as non-cyber layers of protection where appropriate for a given facility
with a specific design. The major hazards identified during a traditional process hazard analysis
should be considered during the cyber risk assessment. As part of this consideration, some
scenarios may have safeguards that are not prone to cyber attack, e.g ., hard wired safety
instrumented functions , check valves, relief devices, etc. This level of understanding can assist
criticality ranking and prioritization of potential recommendations when conducting a detailed level
cyber risk assessment.
Safety risk assessments are, in general , much more quantitative in nature than those currently
performed for cybersecurity due to the different potential threat sources and relative maturity of
the current analysis techniques . Based upon industry cyber incidents, it should be possible to
create histograms that allow a relative estimate of probabilities for different types of cyber attack.
For instance, it would be expected to see external attacks involving non-targeted malware or
viruses on essentially a continuous basis that would be considered high demand wh ile a targeted
malware attack would be more likely to be seen as a low demand mode attack. This type of
information is necessary in order to estimate risk during a cyber risk assessment, even if it is only
semi-quantitative for the present.
Just as a process hazard analysis requires process safety information, equ ivalent base line
information is necessary to conduct a detailed level cyber risk assessment. This information
includes but is not necessarily limited to :
Just as there are multiple PHA methodologies , there is no single means to conduct a cyber risk
assessment. Example(s) are provided in Annex B.
During the high level cyber risk assessment, a first pass may be taken to define security level
targets (SL-T) for cyber assets or cyber asset categories. See Annex B for an example(s)
methodology.
The specified SL for the cyber assets to support the zone security level should be confirmed and/or
modified as needed during the detailed level cyber risk assessment. The sophistication of the
attack and its associated likel ihood are greatly impacted by the specific threat agent and their
motivation at any given point in time. The potential worst case consequences are fixed once the
process (e.g ., chemical, means of electrical generation, etc.) is fixed heading into design. The SL
target should be determ ined as a function of risk, which in turn is a function of the potential
consequences and their likelihood.
Risk criteria for cyber incidents in the process industry should be aligned with risk criteria for
process safety, business interruption/financial loss, and environmental harm . When allocating
security levels, they should be such that reduction against worst case risk is afforded . This
generally includes consideration of worst case consequences . Once worst case risk reduction
requirements are established, as long as it is shown that recognized and generally accepted good
engineering practices (RAGAGEP) have been employed, it is generally not necessary to further
consider lesser risk events with respect to security level allocation and verification, unlike more
traditional safety hazard analysis.
It should be recognized that cybersecurity is necessary for the reliable function of the process
control and SCAI systems , however the reverse may not be true. 1171 SL-T are assigned to zones
and conduits that potentially encompass multiple logic solvers and other associated equipment
such as fire walls, engineering work stations, HMI , etc . This situation allows a targeted malware
attack to potentially cause a demand from instrumented controller(s), while preventing the function
of the alarm layer of protection as well as the SIS as part of a single attack. A lesser effort could
simply attack one of the three aforementioned layers, however, countermeasures that protect
against all three should provide risk reduction against this case as well. In contrast, safety integrity
levels (SIL) are assigned to specific safety instrumented functions. This is a significant contrast in
granularity between functional safety and cybersecurity. Security levels in effect are intended to
protect against the cumulative risks associated with the zone being compromised, while a SIF is
intended to protect against a specific hazard.
When demarcating zone security levels , it is important to take into consideration interdependency
between the zones to implement functional safety. Very often zones are demarcated on the basis
of hardware and software components within the zone without consideration of the safety
functionality. For example , consider a hydraulic valve that is closed on high pressure as part of a
SIF. The close signal for the hydraulic valve is connected to the SIS logic solver, while the hydraulic
system is controlled by a process control logic solver. This is an example of an energize-to-trip
SIF, where utilities should be available in order to take the valve to closed position , i.e ., safe state
in response to a SIF demand . When zone security levels are being demarcated, a typical approach
would to be place the SIS in a zone with a higher target security level than the process control
logic solver controlling the hydraulic system as shown on the left side in Figure 4. However from a
safety risk perspective, it would be sensible to include both the SIS and the process control log ic
solver for the hydraulic system in the same zone and thereby the same target security level as
shown on the right side in Figure 4. An alternative would be to keep them in separate zones, but
implement the same security level.
- 33 - ISA-TR84.00.09-2017
SIS SIS
PLC Logic PLC Log c
Solver Solver
IL Interface-.....-----.
~ IL nterface - ----.~
.....
FLP Fp
S.-- - Target Security level FLP - Fa il i..ast Pos lion
F P - Fail Last Posit;on
The likelihood part of risk is dependent on the threats and vu lnerabilities. In tine event different
threat vectors and associated vulnerabilities are evaluated separately from a risk perspective , it is
possible to define different security levels for each threat vector. The security level for each class
of threat vector should be selected based upon the worst case risk identified among the threat
vectors within that class . In such a case, it is possible to have more finely defined security level
requirements within a zone or conduit that results in greater or lesser need for each of the seven
foundational requirements described and defined in ANSl/ISA-62443-3-3 as they relate to the
different security levels.
• List of third parties with external interfaces and type of connection for each:
- Modbus ;
- Profi bus;
- OPC ;
- IEC-61850 ;
- DNP3;
- Wireless (ISA-100, WiHART, 802.11 );
- Other vendor system-specific protocols .
• Description of all cybersecurity countermeasures required for each documented third party
interface.
• Requirement that the cybersecurity countermeasures should not impact the performance of
the SCAI system .
• If the cybersecurity countermeasure(s) has the potential to impact the overall response time
of the safety functions , then the response time impact of the cybersecurity countermeasure
should be incorporated in the evaluation of the overall response time of the safety functions
(for example, the time from process deviation detection through the process response to
fina l element action).
• Definition of the safe state of the process for each identified countermeasure.
• Target security level to be achieved for each zone.
• Security level (SL) risk reduction expected to be achieved by each countermeasure as a
function of threat vector.
• Requirement for cybersecurity testing, e.g.:
- penetration testing ;
- vulnerability assessments;
- white hat.
• Cybersecurity countermeasure inspection and test frequencies .
• Response time requ irement for each countermeasure to bring the process to a safe state.
• Requirements for manual action as part of countermeasure, for example , physical isolation
of the control network from enterprise network/DMZs , etc.
• Disaster recovery requirements for restoring full functional ity following actuation of a
countermeasure.
• Remote access requirements, e .g ., safeguards for remote access.
• Description of system hardening measures to be implemented .
• Management support requirements for countermeasures .
• User access control strategy to be implemented for IACS, including SCAI systems .
• Physical access restriction requirements.
• Required virus prevention and detection measures to be employed on the control network ,
as well as frequency of scans .
• Patching strategy and requirements to be implemented where relevant to the IACS ,
including SCAI systems .
• Upgrade strategy to address emerging and future potential threats as they become known .
• Frequency of detailed cyber risk assessment revalidation.
- 35 - ISA-TR84.00.09-2017
• Required network communications uptime (at all levels) with required need for high
reliability of network devices. Network specification should consider frequency of network
upgrades.
9.1 Overview
Figure 5 shows the various activities during the design and implement phase . Once the CSRS is
provided, an iterative design process between network, IACS, and process safety personnel should
take place to ensure that the planned layers of cybersecurity countermeasures, including policies,
procedures equipment, software capabilities, and level of rigor are appropriate for the
cybersecurity performance expectations.
The zone and conduit drawings coupled with the specification of cyber assets and the CSRS
comprise the conceptual design . The security levels recommended during the detailed cyber risk
assessment should be verified. Should the risk criteria not be met, alternate means of risk
reduction may need to be considered . Once security level verification has been completed and it
is determined that a tolerable risk level can be achieved with the proposed design , detailed design
can begin . In parallel with the detailed design , the procedures to test and validate the cybersecurity
countermeasures should be developed . Following completion of design , a stage 2 CSA can be
performed as part of the FSA that is recommended in IEC 61511 .
The test procedures should support the cyber portions of the factory acceptance test (CFAT) and
the site acceptance test ( CSAT), as well as the initial validation of the cybersecurity
countermeasures. This work parallels and should be conducted as part of the SCAI verification
and validation .
Following the CFAT, the IACS is delivered, installed and the commissioning begins . Once all
devices in the SuC have been installed, connected , and configured, a CSAT may be performed .
An initial validation of the cyber countermeasures should be conducted , just as an initial validation
of the SCAI is conducted.
Concluding this phase of the lifecycle is the pre-startup safety review (PSSR) that checks to make
sure the system is ready and capable of performing as it was defined and that all of the
recommendations made during the detailed level risk assessment have been appropriately
addressed. Ensuring that the cybersecurity countermeasures are in place and have been tested
and ready to go is part of the overall PSSR . The cybersecurity contribution to the PSSR would be
considered the stage 3 CSA and shou ld be performed as part of the FSA that is required in process
safety management industry standards as well as IEC 61511 .
Clause 10 covers the countermeasure design and engineering, security level verifica tion , and
activities up to and including the CFAT . In the event cybersecurity countermeasures alone cannot
achieve the necessary risk reduction, other means of risk reduction are also addressed in Clause
10. Clause 11 covers installation and commissioning, the CSAT and the initial validation. The
PSSR is addressed in Clause 12.
ISA-TR84 .00.09-2017 - 36 -
Yes
•
•
Vendor Cyber Manual
Software Platform OS _.• .• Detailed Spec1fica1;ons
Final Zone and Condui t Model .....
• Enterprise
Raqulrements
___. Detailed Design &
Procedure Development 1 •
•
cyber Implementation Strategy
lnspect>On and Test Proced ures
Defined Metrics
QJ
.0
a-
"'c:0
Design
Meets Spacs?
~ '£
c:
::J
CSA Contribut:on to FSA 2 u..
Yes .....0
System Integration Phase
-c:
QJ
E
(Buy I Build I configure) QJ
1:11)
"'c:
nspactlon & Test
Procedures ---. Cyber Security FAT
"'
~
Installation I Commissioning
Even when the equipment is fully known, countermeasure design will still most likely be an iterative
process. Balancing the needs of the specification(s) with the infrastructure of the plant I intended
architecture I enterprise integration that delivers the target operability, reliability, and safety that
is aligned with the maintainability and support objectives of the facility is a challenge. As changes
are proposed , they should be evaluated against the risk assessment and any revisions documented.
The following information are inputs necessary in order to fully develop the conceptual design:
• CSRS
• Vendor cybersecurity manual - See Annex F
• Enterprise requirements - The envisioned support I infrastructure components I ocated
outside the IACS. Examples include local or enterprise domain controllers for authentication ,
remote access servers, anti-virus management systems, etc. The choices made based on
these factors and how they play a role in the overall cybersecurity solution will affect th e
ongoing supportability, business cost model of the installation.
• Software platform OS - the PC based software operating system
• T he software platform OS version information is used to understand the vulnerabilities and
level of application within the IACS system(s) (server vs workgroup vs domain, remote
desktop vs alternative tools, etc .). This information also allows the user to j udge useful life
and sustainability of the platform . That is, is the platform current? Having this information
is essential to creating a baseline that allows the user to request additional data regards
future supported revisions. Finally, the operating system for the platform(s) on which the
IACS, SCAI , and cybersecurity countermeasures reside should be compatible with all
software components used over the lifecycle of the system . For example, the applications
should be compatible with the OS service pack level , the supported anti-virus software
version , and also the business enterprise anti-virus management console software. If the
scope for compatibility is not established in the conceptual design and verified in the
detailed design, the cybersecurity countermeasure strategy may have long term
supportability issues that degrade the level of cybersecurity envisioned .
Please note , that if the product supplier(s) is not yet chosen, then the prospective product
supplier(s) should be asked to provide the information that defines how their proposal fits into the
overall project goals (bid basis). The following tables show recommendations as to how these
components fit into the proposal and evaluation (conceptual design) process .
ISA-T R84 .00.09-2017 - 38 -
Con ceptual design Inputs I Information avallablllty How used In co nceptu al design
Cyber risk assessment Should be known Internal document
CSRS Should be known Provided for product supplier proposal
Vendor cybersocurity manual Unknown Provided as a result o~ product supplier proposal
So'twaro platform OS Unknown Provided as o result o' product supplier proposal
Enterprise requirements Envisioned business Provided for product supplier proposal
requirements
If the product supplier is known, these documents are used to determine how the needs of the CSRS fit into the overall IACS architecture
and business enterprise .
• How the IACS design will communicate and integrate with the business enterprise network
or remote support personnel .
• How the IACS countermeasure design will meet the CSRS performance requirements and
fit into the NIST framework (reference Figure 2) elements of protection and detection.
• How the countermeasure design will integrate with the plant goals for operability, reliability,
maintainability.
• How the day to day work processes of the plant operations and technical support staff will
be affected by the decisions made during this step. For instance, if the IACS Engineering
station login and authentication is based on accounts located in the domain server, the
domain server becomes an integral part of the IACS installation. There may be new roles
and effects that should be passed on to the operating team.
The items shown above emphasize why a collaborative and iterative process should be followed.
It would be a rare case where no compromise is necessary on the part of any stakeholder (IACS
engineer, network engineer, cybersecurity engineer, and operating I support staff).
• How the solution fits into the product suppliers' offering regarding warranty, performance,
and system responsibility.
• How the solution fits into the IACS technology roadmap. In concept, security level and the
lifecycle of the asset should be commensurate with the technologies proposed . An example
could include technology that is nearing their · end of life " or are noted to have vulnerabilities
inconsistent with the security level required by the CSRS .
• How the solutions fit into the plant business enterprise network and the resultant lifecycle,
MOC , and procedures managed by the classic IT organization .
• How the solution fits into project goals regards maintainability. Emphasis should be placed
on the architecture I implementation I software design choices so as to consider the impact
of sustaining the SL of the cybersecurity solution (for example, software upgrades in order
to maintain target performance levels with the overall plant maintenance schedules) .
In addition to refinement of many of the previous documents, the following documents are outputs
of the conceptual design of cybersecurity countermeasures :
• Cybersecurity implementation strategy - The intended path forward : Agreed upon details
regarding how the IACS will meet the requirements of the CSRS , intended elements and
strategies of detection.
• Zone and conduit model (revised).
• List of 3 rd party software interfaces (identified) .
• List of countermeasures necessary to meet risk targets .
• Metrics - Practices for threat frequency and countermeasure performance data capture and
evaluation, which may be passive (review of logs) or active (dynamically notified).
Conceptual procedures necessary to support the lifecycle performance measurement of the
cybersecurity system as installed (will be refined as the design and implement process
continues).
• Test procedures - Conceptual test plans to verify the cybersecurity strategy functions as
designed (will be refined as the design and implement process continues) .
ISA-T R84 .00.09-2017 - 40 -
NOTE It is important to conside r that what was described addressed a single platform in a typical plant. There may be
interaction among various platforms in the plant that also need to be addressed as a contig uous whole. Wh en multiple
s uppl iers arc use d on site, the end user should ensure that overall compatibility is achieved and to coordinate between
product suppliers as needed.
10.2 Other means of cyber r isk reduction
There are two aspects that should be considered regarding other means of risk reduction with
respect to cybersecurity. In the first case , it may not be possible to implement sufficient
cybersecurity countermeasures in a particular system that may be needed to satisfy a security
level target. This may be due to the inherent lack of capabilities in the components that make up
a system, or due to the potential weakness of administrative procedures and enforcement to
achieve a particular security level.
For significant process safety consequence severities , it is good practice to look at other
safeguards that are not subject to cyber attack. Consideration of these other means of risk
reduction is an iterative exercise between the traditional PHA and the cyber risk assessment .
Examples of other means of risk reduction that may be considered include but are not necessarily
limited to :
Examples of compensating countermeasures include but are not necessarily limited to:
• zone/conduit drawing ;
• detailed cyber risk assessment report ;
• countermeasures as a function of threat vector;
• metrics ;
• test procedures.
- 41 - ISA-TR84.00.09-2017
Currently, the suite of ANS l/ISA-62443 published and draft standards require security level targets
(SL-T) that have been established in the cyber risk assessments to be verified so that they can be
compared to a security level capability (SL-C). See annex B for examples of risk assessment
methodologies and annex D for examples of SL verification. In the event that the SuC does not
satisfy the SL defined necessary to satisfy the risk criteria defined by the end user, then the SuC
should be upgraded with suitable countermeasure(s) or other means of risk reduction. Design and
Development of Other Means of Risk Reduction is covered in 12.2.
These seven founda tional requirements are described as follows:
Verification of a specific countermeasure design against these attributes will involve evaluating
the cybersecurity strength of any components in the zone to be defended . Where technically
possible, concepts such as mean time to compromise should be considered . If the zone consists
of components that have weak cybersecurity strength , and therefore can be compromised relatively
easily, then multiple countermeasures may be necessary to achieve the target security level.
Annex D is intended to provide some worked examples of security level verificat ion using a semi-
quantitative approach.
At this point in the process, the product supplier, architecture , version, and all specifics are
chosen. As a result of the security level verification activities, input has been received from the
persons and organizations performing lifecycle activities so that the final strategy can be
documented , any "proof of concept" tests can be performed, and detailed design can commenc e.
Countermeasures hardware, device configuration programming, and procedures are designed to
support lifecycle management requirements, including countermeasure maintenance as well as
online (dynam ic alarm ) and offline (analysis of logs) detection and metric mechanisms. The
resulting countermeasure systems should also fit into the overall mission of the IACS and Safety
system . The goal is to final ize all aspects of the cybersecurity solution so that the next phases
may be conducted as efficiently as possible with minimal re-work. This includes the initial design,
the metrics, the work process and production impacts to operations, and the long term
sustainability plan of the system . All should work together to meet the intended level of
performance and draft the necessary documents for the sustainment of the system.
ISA-TR84 .00.09-2017 - 42 -
The input documents for this step i n the process are listed in Figure 5 . In addition , all the
conceptual design deliverables are additional inputs to this step.
• The cybersecurity implementation strategy, zone and conduit details and security level
targets are discussed with all stakeholders (network , IACS engineer, safety engineer,
operation , and maintenance personnel, and the product supplier). The design and
sustainment goals and strategies are agreed .
• Required policies , procedures , and mechanisms for sustaining the countermeasures are
developed and agreed . Examples include software upgrades, patches, maintenance
outages, etc.
• Detailed organizational requirements for implementing, operating and maintaining the
countermeasures are developed . Roles and responsibilities for administration of the system
are developed and agreed upon .
• Identification of any · proof of concept" lab testing that will be needed so that all aspects of
the design can be verified to function as specified .
• As new cybersecurity threats are always present, a review of technical currency should be
done (i.e ., IACS alerts, vendor identifi ed vulnerabilities and patches, etc .) at project
milestone reviews. T he design should include countermeasures to all known threats at the
time .
• Update conceptual inspection and test procedures .
Outputs from this step include:
This stage executes the agreed upon designs while building and configuring the system in
accordance to the overall functional specifications. Focus shifts to execution , qualifications of the
integrator, and cybersecurity management during the build and configure phase . The goal during
this phase is to build an integrated system that meets the functiona l specifications and ensuring
that the system has not been compromised during this phase of work (such as insertion of malware}.
Proper handling of the equipment and adherence to cybersecurity principles during the integration
process are essential. The integration team should be trained and have demonstrated competence
to carry out work on the system . The training and demonstrated competence should be at least
equal to the design security level of the system being integrated . Some examples of specific items
for consideration in the competency review include :
The CFAT confirms that cybersecurity countermeasures have been properly set-up and configured
in accordance with the CSRS and all other agreed documents .
As new cybersecurity threats are always present, and significant time may have passed since the
purchase of the equipment, a review of technical currency should be done (i.e ., IACS alerts ,
product supplier patches, etc .). The system's countermeasures should be current to all known
threats at the time of CFAT. If it is not possible to take the latest updates, a written understanding
between all parties should occur.
Inputs to this work are the inspection and test procedures and countermeasure detailed design
documents. The CSRS and all other documentation related to countermeasure identification or
design should be available for reference as the tests are conducted.
Test outputs include a signed (pass I fa il) response and any notes and observations for the purpose
of revising and improving the overall cybersecurity solution and work process.
ISA-T R84 .00.09-2017 - 44 -
11 .1 Overview
The cybersecurity requirements (e .g., CSRS, company policies and procedures, detailed design
documents, etc.) implemented during the design portion of the lifecycle should be continued during
insta llati on, commissioning and initial validation . The procedures used to validate the cybersecurity
of the SCAI systems should be used to provide a foundation for the ongoing mechanical integrity
program, such as inspecti on , preventive maintenance, and testing (re : ISA-TR84.00 .03-20 12, see
Bibliography) . Note that the installation, commissioning , and validation team should show the same
demonstrated competency as the integration team. It is critical for the system to remain
· uncompromised" (for example, no introduction of malware) , during this pre-operational phase .
Documents used in this phase are the system inventory along with inspection and test procedures .
The specific output of this phase is an updated system inventory with any updates shown as well
as any additional reference document revisions .
Anytime large changes are made to the system, there is potential for disruption in the
commissioning process due to system issues that may occur. Every change (e.g., firmware ,
software updated, network engineering integration , connectivity, patches , etc.) should be analyzed
for reliability and safety impacts to the plant and I or stability of the software platforms. Proposed
or discovered modifications tha t could impact achieved security levels should be reviewed for
impact on the cyber risk assessment before implementation or upon discovery.
Essentially, this is a repeat of the inspection and test procedures under independent evaluation
plus any additional tests necessary to confirm the installed business enterprise connections
against the approved design .
At a minimum :
• Countermeasures are tested and practiced with plant support personnel pre sent.
• Typical support work processes and procedures are final ized and tested .
• Metrics collection systems are reviewed and tested in the production environmen t.
• Deviations are discussed and resolved following change management practices, including
the update of documentation .
The pre-startup safety review is supposed to confirm that prior to the introduction of highly hazardous
chemicals to a process:
Process safety risks once defi ned , can be relatively stable as long as the management of functional
safety is maintained. Cybersecurity is an ever-evolving environment which is highly dependent on
the motivation of the attackers as well as changing technology. Events such as political,
environmental, economic, and public image can change how a company may view risk of cyber
attacks or in some cases actually increasing the likelihood resulting in increased risk . As the
cybersecurity landscape changes , a plan of response should be put in action , as needed , to reduce
the risk to the tolerable criteria set by the authority having jurisdiction, e.g., end user.
As such, it is the end users' responsibility to ensure the continued useful life of the cybersecurity
countermeasures, i.e ., its technology currency. Procedures should be in place to measure
performance capability and make improvements shou ld they be determined to be necessary. This
is done on a routine basis as part of cybersecurity monitoring and measurement against metrics.
In some cases, this monitoring may require immediate action to respond to a threat.
From
Design/Engineering/Implement Phase
Detailed Cyber
Risk Assessment
Startup
Operation
Monilonng Prooodures
Security Monitoring and
Evolving threat Metrics
Landscape Mitigate Attac
voe
Security Events mplement Upgrades
Immediate
Threat Assess men ls Threat?
...
QJ
Performance Indicators ..c
~
No ro
c:
Conditions requlnng 0
immediate?, Intermediate '€
c:
t
Maintenance? Records
-
::J
u..
0
.....
c:
QJ
\11anage?ment of Modifying
Yes
Chal'lge? Procedures ~ System Under Consideration
(SuC)?
No Yes
Decommission?
Process safety management regulations also call for periodic revalidations or reassessments to
ensure that the assumptions made in the process hazard review are still current and correct. For
cybersecurity, this means revalidation of the detailed cyber risk assessment based on what has
been learned in the interim and how the sophistication of cyber threats has evolved.
Just as the PHA should be periodically revalidated after gaining experience in operating and
maintenance, the revalidation work process should account for cybersecurity. The intent is to
validate assumptions made during the detailed cyber risk assessment and to correct the cyber risk
assessment as applicable.
Performing a cyber vulnerability assessment is a key part of this reval idation , which also serves to
fulfill a stage 4 CSA as part of the FSA that is required in IEC 61511 .
After modifications and prior to decommissioning , a stage 5 CSA can be performed as part of the
FSA that is required in IEC 61511 .
Finally, if a portion of the facility is being decommissioned , the fu ll lifecycle , treating it as a new
project should be considered to ensure that the remaining plant and equipment are not adversely
impacted.
Clause 14 covers the management of cybersecurity during the operation and maintenance phase
of the lifecycle, including mechanical integrity, bypassing, and periodic assessments that should
be performed. Modification impacting cyber risk or cybersecurity countermeasure design is
addressed in Clause 15. Decommissioning is addressed in Clause 16 .
• Are roles and responsibilities for each type of account on the SCAI system defined and
documented?
• Are passwords changed at documented intervals?
• Are procedures followed to immediately remove access to users that no longer have
authorization?
• Are there exceptions to the above during a regular occurring audit?
12.6 Authorized change management of a SCAI system
Another cybersecurity mitigation that can be done without waiting on a risk assessment is to
confirm that all changes to a SCAI system are authorized . Unauthorized changes can affect the
integrity of the safeguard as well as the SL of the countermeasures . This metric can be as simple
as matching program changes in the SCAI applica tion program to an authorized change
management request. Any deviations to this would be outside of acceptable limits. Example
questions that might be used to develop an unauthorized user access metrics are :
• Are there changes in the SCAI system that are not authorized by an approved MOC
document that are discovered during a regul ar occurring audit? (yi n)
12.7 Unauthorized communi cation w ith a SCAI system
Contemporary cyber incidents have demonstrated that cyber attacks and malware associated with
portable media have the ability to bypass boundary countermeasures . The purpose of these
metrics are to measure the risk associated with portable media . Portable media includes USB flash
drives , external/removable hard drives , CDs, DVDs, Zip/Jazz disks, data tapes , floppy disks, etc.;
also known as "removable media". Any portable media used to communicate with a SCAI system
would be part of this metric . Example questions that might be used to develop an unauthorized
user access metrics are :
• Is all portable media scanned for malware prior to communicating with a SCAI system?
• Is all portable media used to communicate with a SCAI system authorized in a written
cybersecurity policy?
• Are all USB ports on a SCAI system physically or logically disabled?
• Are there exceptions to the above during a regular occurring audit?
Refer to Annex E for further deta ils on cybersecurity metrics.
- 49 - ISA-TR84.00.09-2017
Following an attack that was or was not partially successful, it should be analyzed to determine
what upgrades should be considered to reduce the likelihood in the future.
As part of normal maintenance, patching should be performed as applicable . End users should
assure that all firmware upgrades have been implemented securely and that no unauthorized
firmware changes have been made . Additional guidance may be found in ANSI/I SA-TR62443-2-3-
2015.
When SCAI system workstations are updated , an authorized person should be present at the
workstation to either perform the work or monitor the work if being done remotely, with the ability
to terminate the session if problems arise .
Backup and restoration means and procedures of all the SCAI network configurations should be
provided and tested on a defined periodic basis.
12.11 Inspection/Aud it
Diagnostics , remote access to calibration information , and on-board device description features
can provide an increased level of assurance that the corresponding device is in place and in
working order. The user should assure that the diagnostics, remote access to calibration
information , and on-board device description features have not been compromised.
• Authentication sufficient to ensure that an approved person is accessing the SCAI system
to perform programming .
• Confidentiality - all flows crossing public networks (for example , the internet) should be
encrypted; refer to ANS l/ISA-62443 for guidance .
• Integrity - adopt and implement visiting PC/laptop cybersecurity policies. External PCs
should have a supported antivirus protection program running , with a recent virus signature .
Refer to ANSl/ISA-62443 for guidance.
• Remote access and communication of application external to the SCAI system should not
be able to interfere neither with the operation of the SCAI nor the safety-critical
communications .
When remote access to the SCAI system is required , consideration should be given to having a
person that is competent in cybersecurity and SCAI systems on site who has primary
responsibility for any work being done and has:
For example, this may be needed to have corporate personnel or vendor support personnel provide
needed work on the SCAI system . When this occurs, access to the SCAI system should go through
all of the boundary detection devices and safeguards (see the figures in Annex A) .
Whenever remote access to the SCAI system is allowed, sufficient cybersecurity controls should
be in place to ensure that:
• The host device that is used for remote access meets guidelines as set forth in the
cybersecurity policy, including installation of antivirus software with acceptable revision of
signature files.
• Use of host-based firewall s, and operating system/application software patches have been
applied per company and vendor guidelines .
• All activities of the remote session are maintained in a cybersecurity log fi le .
• Whenever remote access is permitted , there should be no potential for split tunnel ing.
• The data and the communication path between the authenticated remote user's computer
and the computer connected to the SCAI system should be implemented in a manner that
prevents unauthorized disclosure or modification of the data.
• Additional monitoring , such as intrusion detection techniques, should be used on all remote
connections to assure that no abnormal activity or actions occur while the connection is
established .
- 51 - ISA-TR84 .00.09-2017
• Remote access should be for a limited time and remote access ports closed after the access
is complete .
12.13 Bypasses
B,ypassing (disabling) cybersecurity countermeasures should not in any way directly impact the
ability of any SCAI from performing its safety function . In addition, the cybersecurity
countermeasures should not compromise the SCAI bypass requirements.
12.14 Tools
Tools and procedures for updating cybersecurity countermeasures should be provided and tested .
Tools that can be compromised via viruses , malware, and the like and used while performing
configuration, test, or repair activities should be dedicated for that purpose and not be exposed to
other systems. This applies to all equipment within the SCAI system , sensor, logic solver and smart
final elements. Special consideration should be given to any intelligent device that may be used in
the testing , configuration, and commissioning of smart field devices (both point-to-point and
network-based devices) .
Any tool intended to be used for work on a SCAI system should be tested for malware , and
cybersecurity patches for all software components (operating system , client applications , vendor
tools, and the like) should be applied per vendor's recommendations prior to connection or use on
a SCAI system .
13 Mod ification
Changes to the overall IACS and safety system may occur due to many reasons. First is the
process safety requirements, second, and perhaps more frequent, are the needs to maintain
technical currency and cybersecurity countermeasure risk reduction. Items such as system
obsolescence , product supplier and operating system patches and revisions, operating system
updates, and network system upgrades as well as accommodations for new business strategies
are typical reasons for the modifi cation(s).
ISA-TR84 .00.09-2017 - 52 -
Just as shown in the basic work process (Figure 2) and the operation and maintenance phase
detailed work prncess (Figure 6), modifications to the IACS, including the SCAI system,
cybersecurity countermeasures should follow a management of change program fu lly consistent
with the requirements of process safety management, ISA-84 .00.01 (IEC 6151 1-1 Mod), and the
cybersecurity work process. An analysis should be carried out to determine the impact on
functional safety and cybersecurity as a result of the proposed modification.
Any modification (see Figure 6) should trigger an analysis for impact. The change should be
evaluated against both the process safety information (safety lifecycle) and the cybersecurity
information (cybersecurity lifecycle) as developed and implemented .
In general , these changes should be in accordance with the conventions set forth in the project
documents and suggested adherence to:
14 Decommissioning
If decommissioning is intended to shut down or remove all the facilities at a site , then cybersecurity
analysis is necessary once the exact method and timing for each decommissioning step is defined.
The resulting cybersecurity analysis may require revisiting and modification of previously
established method and timing for each decommissioning step .
Since decommissioning is an infrequent event, lack of experience in this process is common . Thus,
an effort should be made to include all plant personnel familiar with the facility (for example,
operating, maintenance , management, engineering, controls, IT, safety) in the decommissioning
planning .
Before proceeding with decommissioning , all parties involved with this activity should fully
understand and implement as appropriate the cybersecurity issues addressed above in Clauses 4
through 14 inclusive. The following will only list typical cybersecurity issues resulting from
decommissioning in an effort to help the reader to develop a proper decommissioning cybersecurity
plan .
As-built information should be available before proceeding with any andl all aspects of
decommissioning so that existing security level (SL) and other cybersecurity-related
countermeasures, conduits, and zones are not compromised and decommissioning steps can be
planned properly.
While it is possible not all of the SLC phases apply for any given decommissioning , each phase
should be considered . Listed below are the SLC phases providing simple decommissioning issues
often encountered that are related to that phase .
• Hazard and Risk Assessment (H&RA) - The H&RA should identify risks related to
cybersecurity created through:
- improper decommissioning sequencing resulting in loss of, or reduction of,
cybersecurity;
- loss of protection in zones, conduits , process control systems, or SCAI systems;
- impact of decommissioning on utilities (for example , electrical, steam , instrument air)
that could impact the operability of programmable electronic devices used as
cybersecurity countermeasures (for example , overvoltage, under voltage , instrument air
pressure abnormality) ;
- the impact of new plant personnel and impact on existing plant personnel noted in the
introduction above.
• Allocation of security levels to countermeasures - The need for countermeasures will be
based on the results of the cyber risk analysis. This may include the addition of new
countermeasures or the modification of existing countermeasures .
• CSRS for the cybersecurity countermeasures - Assuming either of the above two bullets
results in modifications to existing specifications documented in the existing CSRS, the
CSRS should be updated.
• Design and engineering of cybersecurity countermeasures - While the previous three
bullets can result in the need for design and engineering , an additional consideration
includes the temporary construction design and engineering requirements that may be
needed to safely and securely maintain production of existing facil ities while
decommissioning is underway. T his temporary construction may induce new cybersecurity
ISA-T R84 .00.09-2017 - 54 -
issues that should be addressed in the cyber risk assessment and subsequent steps as
needed .
• Design and development of other means of risk reduction - Loss of existing
countermeasures, or need for additional countermeasures may require the design and
development of other means of cyber risk reduction .
• Installation, commissioning and validation - Any additional or modified cyber risk reduction
implementation should consider the need for installation , commissioning and validation .
• Operation and maintenance - Maintenance and operating procedures and training should
be implemented if the implementations of earlier bullets noted above are determined to be
necessary .
• Competence of the people involved in decommissioning work is necessary to confirm all
participants have the necessary training and knowledge of the cybersecurity impact of the
decommissioning prior to performing these tasks.
Based on the evaluated impact of the decommissioning , the tasks performed by personnel with
SCAI lifecycle responsibilities may change . Training should be performed when modifications
are made to personnel responsibilities, work processes, procedures or tools prior to the
decommissioning .
- 55 - ISA-TR84.00.09-2017
Annex A -
Example SCAI interfaces
A.1 Overview
This annex presents a series of example IACS/SCAI network cybersecurity architectures. The
examples are conceptual and not intended as a template for every system . For example, the
firewall symbol in the diagrams could represent a number of network cybersecurity control devices.
The examples are intended to represent different approaches an end user might elect to
incorporate a safety controls , alarms and interlocks {SCAI) system into the overall control network
architecture . These are for illustration purposes only to promote more critical thinking when making
decisions and are not intended to indicate any type of approval by virtue of being included in the
comparison . The example figures do not fulfil the requirements of zone and conduit drawings. For
more information about zones and conduits, and details on the implementation requirements for a
variety of countermeasure devices and practices, please refer to the ANSl/ISA-62443 series of
standards.
None of the displayed examples are prohibited by IEC 61511-1 [2016] . However, in most of the
examples there are potential common mode or dependent mode failures created by the choice of
network architecture that may require advanced SCAI design and management techniques to
adequately address. These failure modes will impact the design, SIL verification, and systematic
error management systems for the safety systems , per the requirements of IEC 61511-1 [2016) .
The impacted requirements include, but are not limited to , subclauses 9.2.5, 9.4, 11 .2, and 12.2.4.
As the scope of this technical report is limited to the SCAI and related IACS cybersecurity related
aspects , other design and management system implications will not be discussed here . Further
guidance on the treatment of common mode and dependent mode failures between SCAI
protection layers, or between SCAI and the process control system , is provided in ISA-TR84 .00.02
and ISA-TR84 .00.04 .
While enterprise networks , business networks , and process information networks {demilitarized
zones) are not directly included in the scope of this technical report, these network zones may
represent a threat vector to the SCAI system or may contain countermeasures that impact the
integrity of the !ACS from external cyber threats. Therefore, these higher network levels are
considered to a limited extent in this annex.
The seven examples presented in this annex represent different levels of management rigor
necessary, based on differing degrees of interconnection between the SCAI zone(s) and other
zones in the architecture . What path and degree of integration an end user decides upon and may
be supported by good engineering practice is very much a function of their risk tolerance given the
relative severity hazards contained within their processes. This annex was developed simply as a
means of comparing a small subset of potential network architectures that are known to
conceptually exist within industry today. Each successive example represents substantially
increasing challenges to designing and maintaining SCAI cybersecurity against the following seven
foundational requirements defined in ANSl/ISA- 62443 - 1- 1 (99.01.01 ):
1) Identification and authentication control (IAC) - Identify and authenticate all users (humans,
software processes and devices) .
2) Use control (UC) - Enforce the assigned privileges of an authenticated user (human,
software process or device) to perform the requested action on the IACS and monitor the
use of these privileges .
3) System integrity (SI) - Ensure the integrity of the IACS to prevent unauthorized
manipulation
4) Data confidentiality (DC) - Ensure the confidentiality of information on communication
channels and in data repositories to prevent unauthorized disclosure .
ISA-T R84 .00.09-2017 - 56 -
5) Restricted data flow (RDF) - Segment the control system via zones and conduits to limit
the unnecessary flow of data .
6) Timely response to events (TRE) - Respond to cybersecurity violations by notifying the
proper authority, reporting needed evidence of the violation and taking timely corrective
action when incidents are discovered .
7) Resource availability (RA) - Ensure the availability of the control system against the
degradation or denial of essential services .
Table A.1 provides a comparison of relative network architecture resilience to some selected
typical cyber attacks on example SCA! systems as addressed in more detail in A.2 through A.7
The communication system architecture should always be verified against the requ ired security
level for the zone with which it interacts. Increased flexibility or availability of communication
systems may lead to increased risk of cybersecurity being degraded or compromised . Achieving
the security levels 1-4 for each of the detailed sub-requirements within the seven foundational
requirements is largely dependent on the specific controller, networking , and countermeasures
chosen for a given application. Therefore, the analysis below focuses on the high level impact the
selection of architecture has on the ease or difficulty with respect to achieving the overall
cybersecurity objectives for the SCAI. In each example architecture, it is assumed that all safety
functions, including safety controls , safety alarms , and safety interlocks are executed on the safety
controller. As a result, the safety zone should include all the hardware {including the safety HMI)
necessary to execute the safety functions. For more information regarding implementation
requirements for each security level within the seven foundationa l requirements , refer to ANSl/I SA-
62443-3-3 (99 .03.03).
In addition to a high level risk analysis addressing the foundationa l requirements, a set of three
typical cyber threat vectors will be considered for their potential to compromise the SCA!
controller(s) in each example architecture. Al though not included in the examples , the same
ana lysis methodology can be applied to other zones , e .g. , process control zone, process
information network zone, etc. The following provides a short phrase that will be used within the
examples as well as a longer description of the intended cyber attack scenario:
External attack (i .e., malicious attacker) - An attack initiated by an external entity, entering the
overall control network from an internet connection to the enterprise level , with the intended
consequence of interfering wi th the functionality of the target control system . T his type of
attack can result from random malware propagati ng throughout the internet or be
specifically targeted . The more dangerous targeted attacks often result after a period of
intelligence gathering and the theft of authorization and authentication information followed
by actual modification of process control and I or SCAI logic or data.
Modification by remote user (e.g., authori zed third party support) - An attack resulting from a
modification , originating from a user that has authorization to make remote access to the
process control network, that has the unintended consequence of interfering with the
functionality of the target control system. This attack may enter the overall control network
from the internet connection to the enterprise level (the authorized user will be passed
through the outer levels of cybersecurity countermeasures), or may enter through a direct
connection (wireless , broadband or dial-up) incorporated into the PCN portion of the IACS
or directly into the target controller for the intended purpose of remote support.
Internal use of portable/mobile media - An attack resulting from the physical attachment by an
authorized person within the organization of portable/mobile media that inserts mobile code
or malicious code that can interfere with the functionality of the target control system .
• As shown in Figure A 1, the overall architecture of the network includes a process control
system and a SCA! system , such as a SIS. The facility mainta ins a level 3 process
- 57 - ISA-TR84.00.09-2017
'1'IM W-..1
" I 4
t..e.el
1
t..e.el
•
Figure A.1 1181- 0verall automation network showing hierarchical levels
As the level 3 and 4 networks do not differ among the following six examples, the associated
figures will not show these levels. In all of the examples , the other devices on the process control
network, such as the supervisory controller and the firewa ll leading to the process information
network, connects through the network switch associated with the process controller.
ISA-T R84 .00 .09-2017 - 58 -
There are other architectures in the level 3 and 4 networks that can have significant implications
for cybersecurity. For example, if the process information network (P IN) functions are performed
on the enterprise level, then there w ill be fewer countermeasures available to the information
stored on data historians , domain controllers, etc. For this reason, all network components that
are essential to continued safe operation in the event of a network attack (e.g ., data historians
used to execute advanced control) should be located within the process control network zone or
lower within the architecture.
As in a traditional risk matrix, the colors in Table A.1 indicate increasing levels of risk. See Annex
D for example risk matrix .
__1n
_pu
_ 11__ • :=:.:=! •3 •'" •" "' •11
Input 2
''~""'· ,.. -~ '""""'""""''
Figure A.2- Block diagram of air-gapped systems (2 zones)
Lev 12
l ev•I 1
Lev I 0
Evaluating the safety (SCAI ) zone in the air-gapped architecture against the seven foundational
requirements for cybersecurity and three attack scenarios:
IAC - Air-gapped SCAI network will have physically separate identification and authentication
control from the process controller portions of the network. Passwords or tokens used as a
means of SCAI network user authentication should be different from those used for the
process control network. SCAI network human user identification and authentication
features should only recognize the individuals specifically trained to interact with the SCAI
system .
UC - A ir-gapped SCAI network will have physically separate use control protocols from the
process controller portions of the network. Human user authorization to the SCAI network
should be limited to the individuals specifically trained to interact with the SCAI system .
SI - Communication to an air-gaped SCAI network, and hence the potential to impact data
integrity, will require physical access. Physical access countermeasures can reduce
unmitigated cyber risk to SCAI network data integrity. If implemented per the SCAI
standards, corrupted signals hardwired to the SCAI logic solver from the process controller
will have no capability to interfere with the functiona lity of the SCAI.
DC - Accessing air-gapped SCAI network data will require physical access, with the possible
exception of the few points of SCAI data hardwired to the process controller, which is
typically connected to the higher levels in the network. Physical access countermeasures
can reduce unmitigated cyber risk to the confidentiality of data that is res tricted to the SCAI
network.
- 61 - ISA-TR84.00.09-2017
RDF - Air-gapped SCAI network is physically segment ed from all other networks within the
overall control system . Zone boundary or other data flow is physically controlled.
Portable/mobile media are a threat to the zone boundary and should be rigorously managed .
TRE - Timely response to cybersecurity violations of an air-gapped SCAI network is largely
dependent upon the physical access control monitoring. SCAI network will need local
access logging to provide forensic evidence once any insufficiencies in portable/mobile
media management are revealed through SCAI performance problem upon demand or
periodic testing.
RA - Air-gapped SCAI network exposure to a distributed denial of service attack is highly
unlikely as it is not connected to the internet. Denial of service however would be possible
should an internal person intentionally or accidently violate the air-g1apped zone and
connect it to the internet. In addition , a communication fa ilure within the zone will result in
some measure of denial of service. Internal communication failures are just as likely in any
of the zone architectures.
External attack - A fully air-gapped SCAI network installation will have no permanently
connected exposure to external attacks
Modification by remote user - A fully air-gapped SCAI network installati on will have no remote
user access capability.
Internal use of portable/mobile media - An air-gapped SCAI network remains vulnerable to this
cyber attack. General physical access countermeasures will not be effective against the
human users that are authorized to interact with the system . Physical interactions with air-
gapped SCAI networks should be eva luated for necessity and rigorously controlled .
Resources and technology should be provided to test portable/mobile media prior to use on
air-gapped SCAI networks for malicious and mobile code that may have been introduced to
the media during the manufacturing process or through previous connections to other
networks or devices.
In an interfaced design , the process controller outputs to the SCAI system (for example, shutdown
commands via discrete output card) should be communicated via hardwired connections.
Umltad
Level 2
Level 1
Com Types
S . - FiMI
1~1·
LevelO
ser- Fftll
2 a..-.&2
Control Safety J
Figure A .5 11111 - Interfaced systems (2 zones)
Evaluating the safety (SCAI) zone in the interfaced architecture against the seven foundational
requirements for cybersecurity and three attack scenarios:
IAC - Interfaced SCAI network will have physically separate identification and authentication
control from the process controller portions of the network. Passwords or tokens used as a
means of SCAI network user authentication should be different from those used for the
process control network. SCAI network human user identification and authentication
features should only recognize the individuals specifically trained to interact with the SCAI
system . Device to device identification and authentication at the border between the
interfaced zones is limited to only the connection between the controller COMs.
UC - Interfaced SCAI network will have physically separate use control protocols from the
process controller portions of the network. Human user authorization to the SCAI network
should be limited to the individuals specifically trained to interact with the SCAI system .
SI - Interfaced SCAI network is exposed to digital communications through the controller CO Ms
or physical access. The COM to COM communications is often stringently limited in format
and may be using communication protocols not commonly present in commercial off the
shelf (COTS) networking systems. This provides some degree of cyber risk reduction.
DC - COM to COM communication can typically pass much more information than can be
achieved by point to point hardwiring. Data communicated from the SCAI to the process
controller will be exposed to the same degree of cybersecurity data confidentiality risk as
the data that is native to the process controller.
RDF - Interfaced SCAI zone is logically segmented from the other networks within the overall
control system , with the boundary being the interposing fi rewall between the two COMs .
Restriction of data flow between the zones is achieved by the interposing firewall, the COM
protocols of each controller, and any data validation programming within the controllers.
TRE - A cybersecurity violation alert, where supported by the SCAI controller and process
controller technologies and application, may be passed to the process controller and
communicated further up the network levels to a monitoring organization.
RA - No significant change in denial of service risk is created in changing from an air-gapped
to an interfaced architecture. If implemented per the SCAI standards, the degradation of
communication performance from the process controller will not prevent the execution of
the SCAI functions.
- 63 - ISA-TR84.00.09-2017
External attack - While now possible, an external attack against an interfaced SCAI controller involves navigating past the higher
level countermeasures (which address the vulnerabilities of the COTS hardware and communication protocols used up to and
including the process controller network switch), passing the limitations of the process controller operating system, the process
controller output COM limitations, the interposing firewall, and the SCAI input COM and then being able to affect the SCAI
controller operating system . Attacks against the SCAI HMI include passing the SCAI network switch.
Modification by remote user - COM-COM information communications normal ly cannot be used to perform remote support
modifications to the SCAI itself. No significant change in denial of service risk to the safety zone (SCAI) is created in changing
from an air-gapped to an interfaced architecture. If implemented per the SCAI standards, the communication of data from the
process controller will not be essential to the execution of the SCAI functions.
Internal use of portable/mobile media - No significant change in risk against portable/mobile is created in changing from an air-
gapped to an interfaced architecture.
This example also allows for systems in the SCAI zone to pull information from other systems on the network (for example, ope rating
system or software updates) in a controlled way over the network instead of using physical media. Information pulled into the SCAI zone
should not come directly from the Internet, but some intermediate location from within the PCN or lower-level system.
J s..or1 """"'
<
< Process Conlro Network
SCAI Network
Oulp•ll2 • ,.... t - 2
l 2
l 0
Control Safety
Evaluating the safety (SCAI) zone in the integrated with isolated network architecture against the
seven foundational requirements for cybersecurity and three attack seen arios :
IAC - Integrated systems with isolated networks, where the communication is usually taking
place between COTS network switches , are more likely to have very similar if not identical
identification and authentication methodologies. The achieve ment of the objectives
discussed in the interfaced example will be more dependent upon the expertise of the
personnel configuring the two switches and interposing firewall. The device-device IAC
controls at the zone boundary now address all components in the two networks.
UC - Use control at the zone interface firewall and network switches in an integrated system
with isolated networks typically address the intended separation of use control between the
two networks, with possible support by host-based countermeasures.
SI - Communication integrity between the two zones is generally exposed to the same level of
cyber risk as is data for the process controller, due to the COTS nature of the network
communication across the zone boundary. Proper implementation of the firewall and
network switch monitoring is critical to limiting exposure between the zones.
DC - Data confidentiality for SCAI network information is generally exposed to the same cyber
risk as is data for the process controller, due to the COTS nature of the network
communication across the zone boundary. Proper implementation of the firewall parameters
is critical to limiting exposure between the zones .
RDF - The SCAI zone is logically segmented from the other networks within the overall control
system , with the boundary being the interposing fi rewall between the two network switches .
Physical segregation is still possible, so long as the communicated data is not essential to
process control or SCAI operation . Restriction of data flow between the zones is achieved
by the interposing firewall and any data validation programming within the controllers . RDA
may be supported by rules implemented within the network switches, but the COTS nature
of this component increases the vulnerability beyond COM to COM communications.
TRE - Cybersecurity violation alerts can be communicated from the SCAI network to the
process control network.
RA - A denial of service attack that reaches the SCAI network switch now has the potential to
affect the SCAI human machine interface (HMI). This has the potential to directly impair the
display or annunciation of safety alarms used as process safety protective layers as well
as any safety alerts used to maintain the SCAI performance.
- 65 - ISA-TR84.00.09-2017
External attack - An external attack against the SCAI controller can now approach the SCAI HMI and engineering station directly
through attacks against typically COTS hardware and communication protocols.
Modification by remote user - Remote access to perform modifications of the SCAI logic/parameters is possible in this architecture.
Countermeasures should be established to prevent unintended or unacceptable consequences of intentional modification (e.g.,
a controller version upgrade initiated by remote support causing a system shutdown).
Internal use of portable/mobile media - Malicious or mobile code inserted into the process controller network now has a path to
impact the SCAI network. Countermeasures should be established to prevent propagation of malicious or mobile code from the
initially infected network.
In some commercial integrated systems, there may be only a single HMI and engineering workstation . These systems are able to
communicate and control bot h the SCAI system and the process controller. This type of situation can exist when an organization
decreases capital expenditures by reducing the duplication of equipment. From a cybersecurity basis, such a design would approach
the increased risk of a "combined systems with strong dependency' architecture (see A.6).
PrDc ~
Outiul 1 • F.W Flllmfont 1
Figure A .8- Block diagram of integrated systems with some shared network SCAI functions (1 zone)
ISA-T R84 .00.09-2017 - 66 -
Level 2
L v&l 1
Com Typos
S.1'llOI' nn•
1 l!.lement 1
LevelO
2
SeMor F......,
2 E._, 1112
S.1"$0<"
1
F..,
Element 1
Control Safety J
Figure A .9 1181 - Integrated systems w ith some shared network SCAI funct ions (partial 2
zone)
Evaluating the safety (SCAI ) zone in the integrated with shared network architecture against the
seven foundational requirements for cybersecurity and three attack scenarios:
IAC - Integrated systems with a shared network can only operate as a single cybersecurity
zone, as the SCAI functionality (e .g ., safety alarm annunciati on) and process controller
functionality (e.g ., operator interaction with control loops) pass through the single network
switch .
UC - The separation of access to the SCAI engineering station and controller are performed
by the interposing firewa ll or host- based countermeasures.
SI - Communication integrity to the SCAI controller has one fewer opportunity to monitor, due
to the elimination of a separate SCAI network switch . Physical network isolation between
process controller and SCAI is no longer possible , as this would isolate the SCAI controller
from the SCAI HM I.
DC - Data confi dentiality for SCAI information being passed to the SCAI HMI is exposed to
identical cyber risk as is data for the process controller
RDF - There is no segmentation between the SCAI and process controller zones, due to the
common network shared between the two. Physical segmentation is no longer possible
without impact to data communication essential to process controller and SCAI functionality.
TRE - Cybersecurity violation alerts can be communicated from the shared network.
RA - A denial of service attack that reaches the shared network switch now has the potential
to affect the SCAI human machine interface (HMI ). This has the potential to directly impair
the display or annunciati on of safety alarms used as process safety protective layers as
well as any safety alerts used to maintain the SCAI performance .
External attack - An external attack against the SCA I controller can now approach the SCAI
HMI and engineering station directly through attacks against typically COTS hardware and
communication protocols, with one fewer network switch to support cybersecurity
countermeasures (and no additional firewall in the case of the SCAI HMI ).
Modification by remote user - Risk is not significantly increased against this attack through
change from isolated to shared networks, as access for authorized remote support
personnel will be provided through the switches and fi rewalls.
- 67 - ISA-TR84.00.09-2017
Internal use of portable/mobile media - One fewer switch to provide countermeasures against propagation of malicious or mobile
code from the initially infected network.
lh.. 1
.. levelO
-
2 ~-2
~1!111
<
Flnal~11 I
Shared Contro lcr ct\llork
13 Proc
b) Blod< !Mgrwn
Re,_e
Bus 2
llO iF~~l21
Evaluating the safety (SCAI) zone in the combined systems with strong dependency architecture
against the seven foundational requirements for cybersecurity and three attack scenarios:
IAC - IAC cybersecurity protocols address identification and authentication of all 1/ 0 signals to
the controllers. This is likely to add latency and creates vulnerabilities in the information
essential to both process control and SCAI functionality.
UC - Use control protocols and countermeasures are expanded to address the intended routing
of 1/0 communication to the correct controller(s).
SI - Use of networked 1/0 exposes process control and SCAI functionality to loss of
communication integrity on the signals used to directly perform control algorithms .
Countermeasures should be established.
DC - Loss of confidentiality of the raw process data is typically of lower risk than loss of refi ned
information at higher levels within the overall control system architecture. Depending on
technology (e.g. , wireless) used to create the 1/0 network, physical access
countermeasures may not be effective in reducing the unmitigated cyber risk.
RDF - T here is limited segmentation between the SCAI and process controller zones, due to
the common networks shared between the two . Physical segmentation is no longer possible
w ithout impact to data communication essential to process controller and SCAI functionality.
TRE - Cybersecurity violation alerts can be communicated from the shared communication
network. Monitoring of the 1/0 networks should also be established.
RA - A denial of service attack against the 110 network switch will directly affect the process
controller and SCAI functionality. Countermeasures shou ld be established . Depending on
technology (e.g. , wireless) used to create the 1/0 network, physical access
countermeasures may not be effective in reducing the unmitigated cyber risk.
External attack - No significant change in risk from the integrated architecture with shared
network against this attack .
Modification by remote user - No significant change in risk from the integrated architecture
with shared network against this attack.
Internal use of portable/mobile media - Malicious or mobile code exposed to one smart fie ld
device (e.g., via a hand-held instrument communicator) might use the 1/0 network to move
into other smart devices on the network.
Lovol 2
Lev.. I
Com lype11
lovol O
! I s"""" 1
~lnput____J ·E E • F'"" Elomcot 1
b) Block Diagram
Evaluating the safety (SCAI) zone in the shared logic solver architecture against the seven
foundational requirements for cybersecurity and three attack scenarios :
IAC - There is only one network and one controller. IAC protocols appl icable to SCAI controller
apply to the network.
UC - Use control between process control and SCAI portions of the controller can only be
performed by host-based protocols. Zone boundary use control protocols applicable to
SCAI zone apply to the network.
SI - There is only one network and one controller. Communication integrity protocols applicable
to SCAI network apply.
DC - There is only one network and one controller. Most stringent data confidentiality protocols
between process control and SCAI networks apply.
RDF - There is only one network and one controller. Restricted data flow protocols applicable
to SCAI network apply.
TRE - Cybersecurity violation alerts can be communicated from the one network.
RA - There is only one network and one controller. Denial of service countermeasures
applicable to SCAI network apply.
External attack - An external attack that reaches the combined controller will impact both
process control and SCAI functionality simultaneously.
Modification by remote user - Unintended consequence of modification by an authorized
remote user will impact both process control and SCAI functional ity simultaneously.
Internal use of portable/mobile media - Effect(s) of malicious or mobile code injected from
portable/mobile media will impact both process control and SCAI functionality
simultaneously.
ISA-TR84 .00.09-2017 - 70 -
Figure A. illustrates the conceptual design of a typical SCADA control system . Unlike the previous
six examples, in this architecture components essential to the ongoing normal control of the
process equipment are present at all levels of the network hierarchy. In many cases,
communication between the upper and lower levels take place over untrusted networks through
wireless, broadband or dial-up communication media . In addition, SCADA installations are more
frequent users of wireless instrumentation technology. Physical security countermeasures are not
feasible for all segments of the process control network in this architecture . This can expose the
overall process control system to higher levels of unmitigated cyber risk than when all components
essential to process control are contained within one geograph ic area and are connected directly
to each other. The safety functions within these systems are more commonly implemented on the
process control logic solver (with necessary compliance to I EC 61511-1 Subclause 9.2 .5), although
they could also be implemented on physically separate SCAI systems (e .g ., local hi-hi level tank
interlocks using trip amplifiers).
!
I
oc#....
# I '" •
___________________
C..1 JI
t WO..
~· ~
L...-1
"~
I
I
:
I
------
I
, ----- ,
.,
-----------· # . --------------------,
I I
I P • lew 1 I
I ...1'Qf•lo0n l"CJ< :
: 4111 flt'' Ui t ' I "!.'.::,. II
I ~ ~' Ir.-.':: ' f~~~
----.,-------&;.--
w 7'
. "" ''f.t~- -----------·
#
·-·
I • ~ ' ; t I
I I
:
I : I
,----------------------------------·
I ---------------------------------- -----------2 I
I '
I
I
I
I
....
y.. '--lD
I
I
:
I
I ~ ,........
'••• ___, I
I
Evaluating the SCADA architecture against the seven foundational requirements for cybersecurity
and three attack scenarios:
IAC - As the overall process control system is spread across all levels, with multiple channels
of exposure to the internet, identification and authorization control is significantly more
complex. Secure channeling/tunneling countermeasures are typically used to manage risk
for portions of the system where communication over public networks is required .
UC - Similarly, use control countermeasures should address the distributed nature of the
SCADA control system components.
SI - Communication integrity is fundamenta l to the continued performance of a SCADA system .
Countermeasures should be designed to not insert so much latency that control
performance is compromised .
DC - Data confidentiality is typically at higher unmitigated cyber risk due to the inclusion of
public or long distance networks in SCADA systems.
- 71 - ISA-TR84 .00.09-2017
RDF - Segmentation between process control and SCAI is often achieved by having the SCAI
physically separated from the SCADA control system, using locally wired devices to protect
individual unit operations .
TRE - Cybersecurity violation alerts can be communicated within the SCADA network .
RA - A denial of service attack at one of a number of points within the SCADA network will
impact system control performance throughout the SCADA system.
External attack - Attacks to the upper levels will generally be against COTS technologies no
different than the typical personal computer.
Modification by remote user - Remote modification to different levels of the SCADA system
may not be responsive to the same countermeasures.
Internal use of portable/mobile media - There are many more points of access to
portable/mobile media within a SCADA network. These may be through devices that a re
outside any physical access control by the operating organization .
This page intentionally left blank.
- 73 - ISA-TR84.00.09-2017
Annex B -
Cyber risk assessment example procedures
The following examples in 8 1 and 82 of high level and detai led level cyber risk assessment
procedures have been adapted from the paper by Thomas H. W and Day J .; Integrating
Cybersecurity Risk Assessments into the Process Safety Management Work Process , 11th Global
Congress on Process Safety, April 2015.
Purpose
According to ANSl/I SA-62443-2-1 the purpose of a high level cyber risk assessment is to
understand the fi nancial and HSE risks in the event that availability, integrity or confidentiality of
the IACS is compromised . The fo llowing details what should be expected from a high level cyber
risk assessment:
1. Assist the establishment of scope for new projects.
2. Provide a determination of the criticality based on severity of potential worst case
consequences should a cyber attack be successful on various devices with respect t o
cybersecurity for new or existing plants . Provide an initial security level target for
devices that provides an input when establishing zone and conduit security levels .
3. Provide an initial definition of expected response should a device be compromised .
4. Provide input to the detailed level cyber risk assessm ent.
5. Review of the risk criteria to be used in a detailed level risk assessment to ensure it is
suitable for cyber risk management.
Procedure 1
Step 1A: Create an inventory lis t of all the types of cyber assets that will be used within each
specific process or utility unit where different process safety, environmental or fi nancial hazards
exist. Use of process block flow diagrams can be useful when considering potential hazards and
organization of cyber asset types that apply to each block. Typical types of cyber asset types within
a system under consideration include but are not limited to :
• business servers ;
• historian;
• personal computers ;
• eng ineering work station ;
• operator consoles for human machine interface (HMI );
• distributed control system;
• programmable logic controller;
• safety instrumented system controller;
• smart field instruments;
• printers .
Step 18: In parallel with step 1A, the PHA should be reviewed to excerpt potential worst case
consequences that exist in the various process units and utilities . A relatively quick means to
id1e ntify major hazards within a facility is to review their layer of protection analysis ( LOPA)
documentation . Major hazard scenarios that have appropriately d1esigned protection not vulnerable
to cyber attack (e.g. relief valves, check valves, etc .) should be excluded . A process block diagram
can be used to align the worst case consequences against the process and utilities as well as
listing the cyber devices that are associated with each block area . Any block area that has the
same consequences and same devices can be aggregated .
ISA-T R84 .00.09-2017 - 74 -
Step 2: Organize the cyber asset types by process/utility areas using a table similar to below.
Proce~~b~onsequence Criticality
-
Security Ease of
- Recommended
I utility asset to process I level propagation response if
area type util ity area if comprom ised
I comprom ised
I r
I I
Step 3: Conduc t the workshop using the table above to determine the criticality if the device were
compromised . The criticality of the device is determined first by the worst case consequence and
then the hazard potential or consequence severity that could occur if the asset under consideration
within the defi ned process/utility area were compromised .
NOTE Risk Is a function o' consequence severity and likelihood. As the high level ri sk assessment is evaluating
unmitigated worst case consequences . estimating likelihood is somewhat problematic. One would expect worst ca se
consequences to bo a low demand rate, however. lower consequences that are unmitigated would be expected to be
high or continuous demand. To deal with this issue in the high level risk assessment, the likelihood in procedure is
assumed to be a probability of 100% as referenced in A Sl/ISA-62443· 2· 1. Annex C.
Step 4: Document the relative ease of propagation to other asse t(s) if the asset under consideration
were compromised .
EXAMPLE For instance, should something like a historian server be compromised, it would
generally be more appropriate to isolate whil e the rest of the process continues to operate.
However, should it be determ ined a SCAI system is compromised , it may be difficult to j ustif y not
shutting down the process. A more interesting question comes about should the process c ontrol
system be compromised . If the SCAI systems are still functional, a case can be made to try and
fix on line if it can be determined that the threat is not fatal.
This last example raises an important point when selecting a control system at the beginning of a
project. As the degree of integration between control systems and safety systems increases, there
is less latitude as to the potential responses. In additi on, as the level of integration increases,
common failure resulting from a cyber attack can lead to a situa tion where it is not possible to
satisfy corporate ri sk criteria . U nderstanding these issues as soon as possib le is the best way to
minimize the cost and potential schedule impact to a proj ect. When making the determination of
what system and level of integration to use, it is advised to reference the 7 core attributes as
described in the CCPS Guidelines for Safe and Reliable Instrumented Protecti ve Systems to help
make an appropriate decision based on the relative level of risk inherently posed by the process.
Refer to Annex A to see the analysis of examples of systems with varying leve ls of integration.
With the potential consequences and ease I difficulty of propagation information documented, each
asset should be assigned to a zone and the security level rec ommended to prevent propagation
across zones should be established. Using industry recognized and generally accepted good
eng ineering practice as documented in the ANSl/ISA-62443 series of standards should be the
starting point. Finally, forma l zone and conduit drawings should be developed . These drawings
can be considered required process safety information input to the detailed cyber risk assessment.
Step 5 : Considering both the consequence severity and the relative ease of propagation , assign a
security level target (SL-T)
Step 6 : Document expected response to the asset under consideration being compromised . The
selection of recommended responses for this workshop include:
- 75 - ISA-TR84 .00.09-2017
Step 7: Review risk criteria to ensure it is appropriate for the detailed level cyber risk assessment.
Procedure summary
A detailed cyber risk assessment is intended to rigorously evaluate the instrument and control
system (IACS) and ensure the proposed design and procedures are capable of satisfying the
corporate risk criteria. To do this, identification of the potential threat vectors and associated
countermeasures is essential.
Methodology overview
This methodology is similar to a HAZOP, however, the methodology evaluates cyber nodes that
represent the cyber assets that are part of the zone and conduit design. Although the concern is
with the instrumented control and safety systems, the entire plant network including all internet
and wireless access points, including 3rd party connections , networks , and devices should be
addressed in so far as they can be pathways to compromise the IACS, or provide some level of
risk reduction via the defense in depth strategy.
It should be understood that the typical process hazard analysis (PHA) has a much greater degree
of granularity than a cybersecurity PHA. In a PHA, individual control loops are considered as
potential cause of a hazard whereas in a cyber PHA, an entire process control system consisting
of multiple loops would be considered all at once. Non-cyber causes are more predictable as the
common mode failure of an entire controller would result in all outputs failing the same way,
whereas a cyber attack is insidious as it can cause different outputs to respond so as to result in
the worst case consequence .
The final difference is that the PHA will consider safeguards that may or may not be vulnerable to
cyber attack. A cyber PHA generally has no practical means to consider safeguards that are not
vulnerable to cyber attack during the hazard identification portion of the cyber PHA due to the
different levels of granularity of what is being reviewed. For instance, if a control fai lure resulted
in high pressure , a relief valve might be listed as a safeguard in a HAZOP. In a cyber PHA it is not
practical to consider this as it does not look at individual loops, but all of the loops, alarms,
interlocks that may be contained in a single process control system . Once the major hazards have
been identifi ed, it would be reasonable to consider some safeguards that are not vulnerable to a
cyber attack on an exception basis.
ISA-T R84 .00.09-2017 - 76 -
Procedure
After the traditional PHA has been performed, it is recommended to consider whether initiating
causes and safeguards are potentially vulnerable to cyber attack. Those that are not vulnerable
do not need to be considered in the cyber risk assessment. For those that are vulnerable, the
ultimate consequence should be noted. These consequences can be ranke d into appropriate
categories to be considered in the detailed cyber risk assessment.
The exercise to determine these consequences of concern can be performed by reviewing the
HAZOP or by preferentially going through the exercise with the layer of protection analysis (LOPA)
if performed. If an adequate level of LOPA has been performed, it is more efficient to use these as
they typically cover the major hazards of concern. It is not necessary to evaluate every hazard in
a detailed cyber risk assessment as once the process control and SCAI systems are protected
against major hazards, they would also be protected against the lesser hazards. Tables B.1 and
B.2 show detailed procedures to leverage the PHA in this manner for HAZOP and LOPA
respectively.
- 77 - ISA-TR84 .00.09-2017
Discard those initiating events Review each initiating event. Treat high demand as 1 per year
(IE) not susceptible to cyber If it can be caused by a cyber attack assume as a matter of convenience .
influence. high demand
If 11 is not vulnerable to cyber attack. then IE
frequency = O/year.
Recalcul ate hazard Perform LOPA calcula tions with applicable Only take credit for safeguards
rcquency. IE frequency and safeguard PFDs. not susceptible to cyber attack.
Provide sorted hazard Categorize LOPAs by consequence severity Tho sorted information is to be
rcquoncics to cybor risk in descending order. i.e. highest seven ty to used by tho cybor risk
assessment team . lowest seventy. assessment team to :
• Improve focus of cybor
Within each category, list hazard review with respect to most
frequencies in descending order. i. e. highest significant risks.
frequency to lowest 'rcqucncy. • Achieve Improved granular ity
of risk assessment whe n
credit for cyborsccurity
countermeasures arc
evaluated.
- 79 - ISA-TR84.00.09-2017
Prior to the start of the detailed cyber risk assessment, key process safety information should be
obtained. This information includes :
• Results from the traditional PHA as leveraged in step 1.
• Complete list of cyber assets (should be available from the high level cyber risk
assessment or a vulnerability assessment).
• Zone and conduit drawings that show:
o Zone location for each cyber asset.
o Means of communication cybersecurity between zones .
Once the requisite information is available the tool/worksheet being used to conduct the review
should be organized to list the zones and assets within each zone before the fu ll team meets.
Figure 8 .1 shows a conceptual example of a zone and conduit drawing using the hierarchy
approach from ANSl/ISA-95.00 .01 .
Utilize a qualitative HAZOP type approach to perform the cyber risk assessment. A summary of
the method is included below:
1. Select a zone
2. Select cyber node, e .g., a cyber asset.
3. Identify and record a cyber threat.
4. Identify and record causes.
5. Identify and record qualitative cause likelihood (without any credit for countermeasures) .
6. Identify and record consequences (without any credit for countermeasures).
7. Determine and record qualitative severity of consequences .
ISA-TR84 .00.09-2017 - 80 -
NOTE Conscquonccs may have boon idcntifiod and I or quantified in the traditional PHA. If this is tho case, this
information should bo used as applicable.
8. Identify and record countermeasures applicable to the cyber threat and cause .
9. Document the security level requirement for the threat vector .
10. Determine and record qualitative likelihood (with existing countermeasures) .
11 . Determine if risk is tolerable per risk criteria . If not make recommendation(s) .
NOTE Socurity lovcl vorification is not part o the risk assessment methodology, but should be porformod
subsoqucnt to tho review for high scvori ty haza rds to ensure that tho idonti icd countormcasurcs arc sul'ficicnt to
provide the risk reduction needed to satisfy corporate risk criteria.
- 81 - ISA-TR84 .00.09-2017
Annex C -
Cyber vulnerability assessment
A vulnerability assessment, which is based on the elements contained in ANS l/ISA-62443· 2·1 , is
intended to provide a review of the cybersecurity environmen t for the control and instrumented
safety systems at the facility. It identifies vulnerabilities and then develops recommendations for
possible improvements. It is best done in concert with a detailed cyber risk assessment per the
lifecycle. During a vulnerability assessment, the following is accomplished:
• Existing facility cybersecurity practices and policies is reviewed versus current industry
practice , including current industry based alerts .
• IACS network architecture is reviewed and validated versus CSRS .
• Sample confi guration data for fac ility network equipment and control system devices is
collected and compared against documented expectations .
• Penetration testing is performed when the plant is offline .
• Findings are documented and compared against CSRS and with current industry best
practices.
• Gaps that show corporate ri sk criteria not being met should be further evaluated in
accordance with company policies.
Once the vulnerability assessment has been performed , it provides valuable feedback to the
company, helping them to develop appropriate policies, standar ds, and procedures. Once the
policies , standards, and procedures are in place, training for employees and contractors may begin .
In addition, segmentation of the network, access con trol and hardening of the assets can also
begin based upon recommendations that come out of the vulnerability assessment.
There is still the need to perform the cyber risk assessments , which in turn, will most likely fine
tune initial recommendations that emanated from the vulnerability assessment. After the
recommendations have been fully implemented , the plant should monitor and mainta in the system
cybersecurit y. At this point, the facility should be fully following the lifecycle .
Figure C.1 illustrates the path for an existing facility to ultimately be fully integrated with the
lifecycle described in this technical report.
ISA-T R84 .00.09-2017 - 82 -
Yes
Implement IACS Perform Vulnerability Vulnerability
__. Assessment Report
Cyber Security? Assessment
Assessment Phase
l Harden System
Components
-~
Design Phase
l l
Control Access to the
System
Start Operation Phase
l l
Segment the Network ~
l
Develop Policies and
Procedures
At the other end of the spectrum , a sophisticated intentional attack occurs at a much lower
frequency, takes much more time to conduct, and would be considered low demand per IEC 61511-
1. Should one of these attacks be successful however, the consequences could be catastrophic
as illustrated in the Table D.2.
Table 0 .1
Throat agont (hlghost to lowest llkollhood) Consoquonco potontlal quallt atlvo oxamplo
External - General Operational disruption
Internal - Unintended action Operational disruption
Internal - Intentional unsophisticated Operational disruption I Plant damage
External - Inte ntional unsophisticated Operational disruption I Plant damage
,_
External - Intentional sophisticated
- Major operational disruption. major plant damage
-
and I or personnel inj ury or fatality
Internal - Intentional sophisti cated Major operational disruption , maj or plant damage
and I or personnel inj ury or fatality
ISA-TR84 .00.09-2017 - 84 -
Example Company XYZ conducted a HAZOP and subsequent LOPAs as part of their PHA. They
decided to perform a detailed cyber risk assessment as part of the overall PHA. During a prior high
level risk assessment, they reviewed their risk criteria for suitability to cyber risk management in
a way that meshed with the risk criteria as applied to their HAZOP and LOPA procedures. Their
resulting risk criteria are shown below:
NOTE The risk criteri a in this exam ple is contrived solely for 1he purpose of facilita ting the SL verifica1ion example. It
was created based upon knowledge of several risk criteria used by di ferent compa nies. Anyone looking to create their
own risk criteria may refe r to CCPS Guidelines or Developing Quantitative Safety Risk Cri1eria 10•
Risk matrix
Consequence Likelihood
severity
6
5
4
3
2
1
NOTE Numbers resulting f rom the intersection of consequence severny and likelihood within the risk ma1rix represent
levels of increasing risk as determined by company XYZ.
Level Severity
B E s
1 Negligible Negligible impact Negl igible impact
impact
- 2 SS0,000 - Temporary release and Recordable injury
$500,000 cleanup within weeks
3 SS00,000 - Temporary damage to the Lost time inj ury
$5 million facility and cleanup within
- 4 -- - SS million -
months
Temporary damage to the
,_
Level Likelihood
L
-
- 1
2 - 10- ear
- 3
- 10- ear
- 4
- 10- ear
- -
- 5
- 85 - ISA-TR84.00.09-2017
Figure 0 .1
ISA-T R84 .00.09-2017 - 86 -
Table 0 .3
(Excerpted sample of informat ion from prior detailed level r isk assessment)
As a result of recommendations made during the high level cyber risk assessment, proposed
improvements were made in the design . Currently the proposed zone and conduit design is as
shown in Figure D.2 . Other countermeasures w ere proposed that would not appear as a physical
element on a zone and conduit drawing .
- 87 - ISA-TR84 .00.09-2017
l'Ctd
1
l'\\ 1RCo'\t"'O
I P'~C4" :::tr
SCA EW 5
SCA!
PLC
'"'"
Fi gure 0.2
ISA-TR84 .00.09-2017 - 88 -
SL verification was performed to help assess whether the conceptual design was believed to be adequate or whether further changes
needed to be made for the detailed countermeasure design . In preparation for the SL verification , the streng ths of countermeasures
were assessed and documented versus their attributes as documented in Annex G. Examples of these coun termeasures as used in
the SL verifica ti on examples is shown in Table D.4 .
Table 0 .4
...
Access control list (AC L) managed by PCN group
Minimum rule sot defin ed
Deep packet inspection capability
No irmwaro encoded rules .
Firewall .. Industrial conttol system stateful firewall 3
..
Access control list (AC L) managed by PCN group
Rules encoded in firmware
..
Access control list (AC L) managed by PCN group
Rules encoded in firmware. I.e.• no external configuration ability
Deep packet inspection capability
Administrative work
process and awareness
.. Procedur es designed to suppon human error probability of less than 1% 2
Periodic validation supports proven in use for assumed value
training
Portable media . Ports do not exist 2
Anti-virus (AV) so'twarc .. Installed and updated per formal procedures when revisions arc made available
Updated within less than a week when now updates available
2
- 89 - ISA-TR84 .00.09-2017
. Application software receiving authorization request provides obscure feedback (e.g. , asterisks).
All accounts arc managed by authorized users. including adding, activating, modifying, disabling and removing
.. accounts.
Default user names and passwords arc changed from defaults prior to use .
Administrative controls and audits in place to ensure passwords are not divulged (e.g. , sticky notes on PC or on
.. tho wall)
Secure protocol in place to encrypt password when submitted (e.g . . HTTPS. SSH)
. Password with minimum 8 characters with combination of upper caso. lower case, number and symbol
Number or consecutive Invalid login attempts limited and enforced (human, software process or device) during a
configured time period and access is denied ror a specified period of time or until unlocked by an administrator
..
when this limit is reached
Authorized users or roles arc defined and permissions mapped to roles for all human users .
Control system enforces authorizations assigned to all users (humans, software processes and devices) for
conttolling use of tho control system to suppon segregation of duties and least privilege on all Interfaces
Authentication and
access controls .. System use notification message is displayed before authenticating
Unique identification and authentication enforced for all human. software processes and devices whore
4
...
interfaces provide access to the control system
Multifactor authentication employed for human user access to the control sys tem for all networks
Least privilege in accordance with applicable cyborsecurity policies and procedures is applied .
. App lication software receiving authorization req uest provides obscure feedback (e.g. , asterisks)
All accounts utilize unified account management by authorized users . including adding, activating. modifying,
.
.
Access requests via untrusted networks arc denied unless approved by an assigned role .
Default user names and passwords are changed from defaults prior t o use .
Administrative controls and audits in place to onsure passwords arc not divulged (e.g. , sticky notes on PC or on
.. tho wall)
Secure protocol in place to encrypt password when submitted (e.g. , HTTPS. SSH)
. Hardware mechanisms in place to protect relevant authenticators for so'twaro processes and device users
Password with minimum 8 characters with combination of upper caso. lower case. number and symbol
ISA-T R84 .00.09-2017 - 90 -
. Number of consecutive invalid login attempts limited and enforced (human. software process or device) during a
configured limo period and access is denied for a specified period of time or unlil unlocked by an administra tor
lovol
..
controlling use of tho control system to support segregation of duties and least privilege on all interfaces.
Intrusion detection and Comparison diagnostics employed with alarm 3
response
. Procedure requires immediate response to investigate and respond to anomalies .
Periodic drills to validate prove n in use for assumed value
In performing the SL verification , the countermeasures would be evaluated for each threat vector. A limited number of example SL
verifications have been documented below, based on the threat vectors identified in Table D.3. Basic event tree analysis was used to
perform the SL verification . Selected countermeasure assumed security levels and their attributes were taken from Table D.4.
A somewhat more in depth listing of example countermeasures is documented in Annex G. The reader should in no way assume this
represents a complete listing.
In Figure D.3, the as found network was analyzed lo determine security level achieved against an external DoS attack. Multiple process
control and SCAI PLCs were connected directly to a network. In this case the demand rate was determined from the plant maintenance
records that recorded when PLCs needed lo be power cycled . The frequency was determined by evaluati ng work orders that required
restart of a controller due to poor or erratic performance. As can be seen, the SL capability for this threat vector is SL 0. Due to the high
frequency of maintenance and frequency of shutdowns, the financial severity was upgraded to a risk of 16.
- 91 - ISA-TR84.00.09-2017
Figure 0 .3
Subsequently, a firewall was added as a countermeasure. A firewall was proposed with attributes that were deemed to be capable of
SL3 with the feature that the configuration was embedded in firmware was proposed. This firewall did not have deep packet inspection
capability. The resulting SL verification was performed using an event tree as shown in figure D.4.
ISA-TR84 .00.09-2017 - 92 -
External communication to I
T9111ponry from PLC slowed down.
Openbllty Issue. Resumes as normal as soon
Neallslble lmlJlld. as broadcast storm subsides.
No impact on PLC primary
mission.
-
Figu re 0 .4
Although the firewall provided has no deep packet inspection capability that does not prevent the firewall from providing the needed
risk reduction for a denial of service attack from an external source . Applicable monitoring and administrative controls were added to
the facility operations plan .
- 93 - ISA-TR84.00.09-2017
UnlntentJonal lntemal
OoS, humn etro~ (e.g. Po tent al for degraded
Plu.g tn two e.nds of cable Temporary response or relative y s~ort
creating a loop, bad ------~ 01>«abllily ls.sue durat on shutdown resulting
network interlace card. in SS0.000 - 5500.000 losses
lnfttted pona ble media
(1 oe1vear)
Figure D.5
With implementation of training and documentation of prescribed work procedures, the likelihood of occurrence is reduced and the
resulting risk moved from yellow to green as shown in option 1. Option 2 looks at additional risk reduction possibilities. If the media
ports are removed from the process control systems, that threat vector is removed , however, a DoS attack could originate elsewhere
within the PCN . In those cases, risk reduction can be provided by a fi rewall. A SL 2 firewall as described in Table D.4, with
corresponding monitoring and administrative controls , was assumed in this example.
--
S. 2 Ad...,lr"ll";lltvework
:ire-i:eu ard awrerus
1·a.r-ia:suc:uuh. !19Jlo
___ --
DoS,"l\11".:.ll"Ctrotle1. f-cM :irouuc:arttal~~ a"!d
'lusntvio'OercsofWc (.O°lneaea ~"t1cir1o of L')C ~
<ROIL"ll:l~, b.ld protMtec CV a SL 1 f "'"""-a 9W
networt Interface Q"C,
tnfuted :i1uub.e ~d.a
1:~·vn1
Figure D.6
ISA-T R84 .00.09-2017 - 94 -
General viruses are ubiquitous within the cyber world. As such, with no countermeasures as shown in Figure D.7, it can be assumed
that the system will be infected. Although the consequences of a single untargeted virus might be considered to be small , with no
cybersecurity countermeasures , the situation can become untenable and the consequences would increase from the cumulative effects.
Although a SL verification example for a general virus was provided for illustration, due to the relatively low consequences in most cases ,
it would most likely not be a candidate for quantitative SL verification . Rather the qualitative review and assessment versus RAGAGEP
during the cyber detailed risk assessment would typica lly be deemed sufficient in most cases. More quanti tative techniques for SL
verification are typically performed for the high level consequences where RAGAGEP forms a fundamental foundation upon which to
build.
Figure 0 .7
Figure D.8 adds anti-virus protection as a countermeasure for those devices and software applications that are prone to attack. The
addit ion of anti-virus protection has moved the risk from yellow to green . In addition , whereas in the unmitigated case , one would assume
the consequences to be at the high end of the range, in the mitigated case, one would assume the consequences were at the lower end
of the range . It should be recognized that maintenance of the anti -virus protection is essential, it the anti-virus protection were to fail or
be out of date, it becomes inevitable that the incidence or becoming infected would occur and at an ever increasing rate.
- 95 - ISA-TR84 .00.09-2017
General Virus
Continuous Anack
Figure D.8
D.3.4 External soph isticated intent iona l malware attack examp le SL verificat ion
Should there be no mitigation ava ilable to defend against external sophisticated intentional malware attacks, the likelihood would strictl y
be a function of a suitable party wanting to do harm. There have been reports in the industry of both knowledgeable disgruntled
employees and nation states having success in these endeavors . Knowledgeable terrorists would raise the stakes even higher. The
in itiating cause frequency depends upon the specific entity. For a disgruntled employee , it is a function of how often an emp loyee
deviates beyond reasonable society norms . For a nation state the likelihood goes up or down as a funct ion of gee-politics and the
likelihood of a real war. For terrorists , headli ne news would be the driver as well as how much damage can be done at the regional or
national level due to an attack. As shown in Figure D.9, the demand rate was assumed to be once in a hundred plant years for a
catastrophic consequence with loss of on-site personnel due to the process control and the SCAI systems being compromised . This
represents a red risk.
Extern al • Intentional
Sophisticated malware
attack (le-2 per year)
Figure D.9
ISA-TR84 .00.09-2017 - 96 -
Figure D.10 shows the improvements to risk afforded by the improved zone and conduit design. Two different attack vectors were
considered, access to the engineering work stations (EW S) and an attack that would bypass the EWS. Cyber risk reduction for the EWS
is provided by authentication and access controls as well as intrusion detection and response. It was assumed that together the strength
of the cybersecurity countermeasures would provide risk reduction 90% of the time. This results in a frequency of harm of Se-4 per year,
which moved the risk from red to yellow.
For the attack path bypassing the EWS, there is still credit for the authentication and access controls as well as the intrusion detection.
In this case however, unlike when the attacker has control of the EWS, there is a SL 4 firewall protecting the SCAI system . Since the
red risk is predicated on both the process control and SCAI systems being compromised, the firewall has reduced this threat vector to
a green risk.
As a result, the process control systems are still at risk with a likelihood of Se-4 per year, however the consequences are no longer
safety but financial , as indicated in Figure D. 10. The resulting risk has been moved from red to yellow.
- 97 - ISA-TR84.00.09-2017
Figure 0.10
E.1 Preface
As of this technical report publication there are a number of referenced documents that are in draft,
some of which have major revisions under consideration. Conformance metrics by definition are
metrics that measure how well a system or set of systems · conform" to a set of standards or
guidance documents . Because key documents in the ANSl/ISA-62443 document series and in the
IEC 61511 document series are in draft or are under major revision, this document by necessity is
written at a high level and the metrics described are based on current practices and consensus of
the authors .
E.2 Introduction
This section uses the core principle of ISO 14253-1 · oecision rules for proving conformance or
non-conformance with specifications" to differentiate whether conformance or non-conformance is
determined .
Conformance metrics should be developed for the cybersecurity policies and practices specific to
the systems under consideration. This section describes general principles, for developing
conformance metrics for systems under consideration and should not be used as prescriptive
metrics .
This section defines the high-priority cybersecurity countermeasure conformance metrics related
to an IACS, including SCAI systems . High-priority metrics focus attention on the performance of
the IACS . The underlying management governance policies, procedures, and organizational
directives conforming to this document are assumed to be enforced by the IACS owner/operator.
These conformance metrics are defined to:
• monitor and manage the user-specified quality of service throughout the deployed life of
the system ;
• verify secure disposal of system , subsystem and components when they are removed from
service ; and
This section will follow the metrics development checklist as described in Table E.1 below. This
checklist guides the development of a prioritized set of metrics that are measurable, actionable ,
associated with performance criteria in this technical report, mapped to primary users of the metric
and provide the necessary extensions to provide the proper context for cybersecurity
countermeasure conformance metrics .
ISA-T R84 .00.09-2017 - 100 -
High-priority cybersecurity countermeasure conformance metrics are defined in Table E.2 that
satisfy the criteria in Table E.1.
CM. 2
I
Number of rej ected access tries and
I Use certificate logs generated by
compared against expected
source/ d est in ation
Re1ected user access attempts
use-certificates requested by each the authenticator should be recorded , investigated
supplican' address from each at some frequency. rejected
legitimate authenticator network attempts should be
I I recorded and investigated
Information on shared product supplier and operator responsibilities is provided in T able E3 below.
Table E.3 - Shared product supplier and operator responsib ilit ies
CCM2 Porcontago of IACS user > 5% roprosents IACS provides Respond to and A high rate o' failed
access attempts that fail situation that percentage of failed investigate high rates IACS user access
authen tication verification should be user access attempts of failed IACS user attempts can Indicate a
Investigated access attempts. situation whore
romodiato risks. and unauthorized users are
recover normal attempting to access to
op oration. tho IACS in a manner
that ca n compromise the
safety function.
ccm2-a Successful IACS usor access NIA - Successful IACS user NJA
attempts measuromonr access attempts are
used to calculato automatically recorded
primary motric. by IACS.
- 103 - ISA-TR84.00.09-2017
For IACS components that use technologies that could be subj ect to a cyber attack, designing an
installation that can achieve cybersecurity performance levels without impacting the IACS
performance depends on having clear guidance from the device manufacturer. This guidance
should explain any host-based countermeasure options ava ilable with the device and any
cybersecurity countermeasures that should be applied in the network around the device to address
the device cyber vulnerabilities to achieve SL-T. For standard COTS components used in process
control systems, this information should be considered part of the device operating manual,
whether it is embedded in that document or provided separately. For a cyber vulnerable device
that has been approved for use in safety systems, a manufacturer cybersecurity manual should be
considered part of the safety manual . The cybersecurity manual may be directly incorporated into
the safety manual or it may be a stand-alone document.
The cybersecurity manual should contain the product supplier's recommended I tested I supported
architectures and subsequent cybersecurity instructions that are required to achieve and maintain
cybersecurity SL-T without affecting proper operation of the IACS , including the SCAI systems.
Refer to IEC 62443-2-4 for add itional guidance .
Table G.1 includes a sampling of potential countermeasures that in general can be expected to
provide increasing risk reduction for threats where they are applicable . Their attributes as shown
help to guide the user as to their applicability with respect to threats . It is in no way a
comprehensive listing. In many cases other countermeasures must be in place to allow credi t for
the countermeasure listed. At a minimum, the personnel security and physical access security
countermeasures must be commensurate with the desired risk reduction for the zone or conduit.
Tab le G.1
~
Access control list (ACL) managed by PCN group
Minim"m rule ••t defined
ewall
• Industrial control system state'ul firewall
• Access control list (ACL) managed by PCN group
• Minimum rule set defined
• Deep pac ct inspection capability
• No firmware encoded r ules .
I Firewall
• Industrial control system stateful firewall
I· •
Access control list (ACL) managed by PCN group
Rules encoded in irmwarc
• No deep packet inspection capability
Firewall
• Industrial control system state ul firewall
• Access control list (ACL) managed by PCN group
• Rules encoded in irmware, i.e. no external con iguration ability
• Deep packet inspection capability
Router between enterpri se and PCN
• Rules unknown or PCN has no control
Router between enterpri se and PCN
• Rules known by PCN group but not under PCN control
Switch
• Configured to segment network into VLA s
Switch
• Switch configured to segment network into VLANS
I. Incorporates access control hst (ACL) to restrict communications and protocols
ISA-TR84.00.09-2017 - 108 -
Countermeasure description(•)
Vigilant user
Patch management conducted on ad hoc basis
Patch management formal procedures in place
Patch management
• Centrally managed
• Updates in accordance with documented procedure
Patch management
• Centrally managed
• Updates in accordance with documented procedure
• Whitclistlng implemented and updated in accordance with documented procedure
• Formal procedure in place to investigate whitelisting d iscrepancies identified
Anti-virus (AV) so tware
• Installed and periodically updated
Anti-virus (AV) so tware
• Installed and updated per formal procedures when revisions arc made available
~ Updotod w" hln le" than a week whoo oow "pdate• a"llablc
Anti-virus (AV) so tware
• Centrally managed and updated in accordance with documented procedure .
• Updated wnhin less than a week when now updates available
Anti-virus (AV) so tware
• Centrally managed and updated in accordance with documented procedure
• Updated wnhin less than a week when now updates available
• Whitclisting implemented and updated in accordance with documented procedure
• Formal procedure in place to investigate whitelisting d iscrepancies identified
Audit log
• Audit records relevant to cybcrsecurity arc generated or access control, request errors .
operating system events, control system events, backup and restore events, configuration
changes. potential reconnaissance activity and audit log events.
• Individual audit records include the timcstamp , source (originating device, software process
or human user account), category, type, event ID and event result. Suf icicnt audit record
storage capacity exists or log management and system configuration.
• Audit mechanisms arc in place to ensure the capacity is not exceeded .
I. Personnel are alened in tho event of audit processing ailuro wnh appropriate actions in
response de'ined in operating procedures.
- 109 - ISA-TR84 .00. 09-2017
Countermeasure descrlptlon(s)
I Audit log
Audit records relevant to cybcrsocurity arc generated for access control, request errors.
operating system events. control system events. backup and restore events. configuration
changes , potential reconnaissance activity and audit log events.
Individual audit records include the timcstamp. source (originating device. so twaro process
or human user account), category, typo, event ID and event result.
Internal system clocks synchronize at a configured frequency.
Audit events arc centrally managed.
Audit records arc compiled from multi ple components th roughout the control system into a
system -wide (logical or physical). timo-corrolatod audit tra il.
Audit records arc produced in industry standard formats for analysis by standard commercial
log analysis tools.
Compiled audit records arc periodically analyzed within a timcframc suf icicnt to mitigate the
potential identi fied risk.
Sufficient audit record storage capacity exists for log management and system confi guration.
Audit mechanisms arc in place to ensure the capacity is not exceeded. Warning is
automatically issued when tho allocated audit record storage volume reaches a configured
percentage of maximum audit record storage capacity allowing sufficient time to respond.
Personnel arc alerted in tho event of an audit processing 'ailuro and appropria to actions In
response arc defined in operating procedures.
Audit log
Audit records relevant to cybcrsocurity arc generated or access control, reques t errors.
operating system events. control system events. backup and restore events. configuration
changes , potential reconnaissance activity and audit log events.
Individual audit records include the timostamp, source (originating device. software process
or human user account) , category, typo. event ID and event result.
Internal system clocks synchronize at a configured frequency and timostamp source is
protected from unauthonzed alteration. All alterati ons cause an audn event.
Audit events arc centrally managed.
Audit records arc compiled from multi ple components throughout the control system into a
system -wide (logical or physical), timo-corrolatod audit tra il.
Audit records arc produced in industry standard formats for analysis by standard commercial
log analysis tools.
Compiled audit records arc periodically analyzed within a timeframo sufficient to mitigate tho
potential identi fied risk.
Sufficient audit record storage capacity exists for log management and system configuration .
Audit mechanisms arc in place to ensure tho capacity is not exceeded. Warning is
automatically issued when tho allocated audit record storage volume roaches a configured
percentage of maximum audit record storage capacity allowing suf icicnt time to respond.
Personnel arc alerted in tho event of an audit processing 'ailuro and appropriate actions in
response to an audn processing failure arc defined rn operating procedures.
Portable media
I
Countermeasure deacrlptl on (s)
I Portable media
• Ports disabled via hardware means
• Contrnl system prevents the execution of mobile code. requiring proper authentication and
authorization for origin of the code. restricts mobile code transfer to/ rom the control system,
and monitors the use of mobile code.
• Control system automatically en'orces configurable usage restrictions that include preventing
the use 0 1 portable and mobile devices. requiring context speci'ic authorization. and
restricting code and data transfer to/ rom portable and mobile devices.
Portable media
• Ports disabled via hardware means
Control system automatically en'orces configurable usage restrictions that include preventing
1· the use 0 1 portable and mobile devices. requiring context specific authorization. and
restricting code and data transfer to/ rom portable and mobile devices.
• Portable or mobile devices attempting to connect to a zone are verified to be in compliance
with tho cybersocurity requirements o that zone .
Portable media
• Ports do not exist
Personnel security
Table G.2
Delivery
Exploitation
-- obj ective
Transmission o' the we apon into the targeted system
Attacker's code triggered
-
Installation Allows attacker to maintain a presence within the system. e.g .. remote access
Table G.3
T his information can be used in evaluating the potential effectiveness of counterm easures to
protect against threats being made through different attach vectors or paths . Table G.4 provides
an example analysis showing a small sample of threats and vectors , the countermeasures that
may provide some level of risk reduction against those attacks, and the kill c hain phase(s ) where
each countermeasure would be effective .
Table G.4
I I !
Threat Vector Potenti al counterm easures K iii Chain Phase 121 1
Bibliography
NOTE. Draf t b ibliography items referenced in the body of the report refer to the draft copy current as of the date of
ISA-TR84 .00.09.
(1 ) ANSl/ISA-62443-1-1 (99.01 .01 )-2007, Security for Industrial Automation and Control Systems Part
1: Terminology, Concepts. and Models.
(2) DRAFT ISA-TR62443-1-2, Security for Industrial Automation and Control Systems Part 1-2: Master
Glossary. Unpublished.
(3) DRAFT ISA-62443-1-3, Security for Industrial Automation and Control Systems Part 1-3: Cyber
Security System Conformance Metrics . Unpublished.
(4) DRAFT ISA-TR62443-1-4, Security for Industrial Automation and Control Systems Part 1-4:
Security Life Cycle and Use Cases . Unpublished.
(5) ANSl/ISA-62443-2-1 (99.02.01 )-2009, Security for Industrial Automation and Control Systems Part
2-1 : Establishing an Industrial Automation and Control Systems Security Program .
(6) DRAFT ISA-TR62443-2-2, Security for Industrial Automation and Control Systems Part 2-2:
Implementation Guidance for and /ACS Security Management System . Unpublished.
(7) ANSl/ISA-TR62443-2-3-2015, Security for Industrial Automation and Control Systems Part 2-3:
Patch Management i n the /ACS Environment.
(8) IEC 62443-2-4. Security for Industrial Automation and Control Systems Part 2-4: Requirements for
IACS Solution Providers.
(9) ANSl/ISA-TR99.00.01 -2007. Security Technologies for Industrial Automation and Control Systems.
(1 OJ DRAFT ISA-62443-3-2, Security for i ndustrial automation and control systems Part 3-2: Security
risk assessment for system design . Unpublished .
[11] ANSl/ISA-62443-3-3 (99.03.03)-2013, Security for Industrial Automation and Control Systems Part
3-3: System Security Requirements and Security Levels.
[12] DRAFT ISA-62443-4-1, Security for Industrial Automation and Control Systems Part 4-1 : Secure
product development lifecycle requirements. Unpublished.
[13] DRAFT ISA-62443-4-2, Se curity for Industrial Automation and Control Systems Part 4-2: Technical
Security Requirements for IACS Components . Unpublished.
(14 J ISO/I EC 27002, Information technology - Security techniques - Code of practice for information
security controls.
[16] Thomas H. W & Day J .; Integrating Cyberse curity Risk Assessments into the Process Safety
Management Work Process, 11th Global Congress on Process Safety, April 2015.
(17] Bhojani. R.; IT Security and Functional Safety in Industrial Automation and Control Systems (/ACS) ,
Automation Conference, Baden-Baden, German y, 2010.
[18] CCPS, Guidelin es for Safe Automation of Chemical Processes . peer review copy, 2015.
(19] CCPS, Guidelines for Developing Quantitative Safety Risk Criteria, 2009.
[20] NIST, Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0, 12 February 2014 .
- 115 - ISA-TR84 .00.09-2017
[21] Hutchins. E.M; Cloppert, M. J .; and Rohan, A. M.; Intelligence-Driven Computer Network Defense
Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , Lockheed Martin
Corporation.
[22] DRAFT A Sll lSA-84 .91 .03, Functional Safety: Safety Controls, Alarms, and Interlocks for the
Process Sector. Unpubl ished .
ISA is an American National Standards Institute (ANSI) accredited organization. ISA administers
United States Technical Advisory Groups (USTAGs) and provides secretariat support for
International Electrotechnical Commission (IEC) and International Organization for
Standardization (ISO) committees that develop process measurement and control standards. To
obtain additional information on the Society' s standards program , please write:
ISA
Attn : Standards Department
67 Alexander Drive
P.O . Box 12277
Research Triangle Park , NC 27709
ISBN: 978-1-945541-49-0