ImageVerifierCode 换一换
格式:PDF , 页数:56 ,大小:1.82MB ,
资源ID:548300      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-548300.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(BS DD IEC PAS 62443-3-2008 Security for industrial process measurement and control - Network and system security《工业过程的测量和控制安全 网络和系统安全》.pdf)为本站会员(花仙子)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

BS DD IEC PAS 62443-3-2008 Security for industrial process measurement and control - Network and system security《工业过程的测量和控制安全 网络和系统安全》.pdf

1、DRAFT FOR DEVELOPMENTDD IEC/PAS 62443-3:2008Security for industrial process measurement and control Part 3: Network and system securityICS 25.040.40; 35.040; 35.110g49g50g3g38g50g51g60g44g49g42g3g58g44g55g43g50g56g55g3g37g54g44g3g51g40g53g48g44g54g54g44g50g49g3g40g59g38g40g51g55g3g36g54g3g51g40g53g4

2、8g44g55g55g40g39g3g37g60g3g38g50g51g60g53g44g42g43g55g3g47g36g58DD IEC/PAS 62443-3:2008This Draft for Development was published under the authority of the Standards Policy and Strategy Committee on 29 August 2008 BSI 2008ISBN 978 0 580 62208 3National forewordThis Draft for Development is the UK imp

3、lementation of IEC/PAS 62443-3:2008.This publication is not to be regarded as a British Standard.It is being issued in the Draft for Development series of publications and is of a provisional nature. It should be applied on this provisional basis, so that information and experience of its practical

4、application can be obtained.A PAS is a Technical Specification not fulfilling the requirements for a standard, but made available to the public and established in an organization operating under a given procedure.A review of this Draft for Development will be carried out not later than three years a

5、fter its publication.Notification of the start of the review period, with a request for the submission of comments from users of this Draft for Development, will be made in an announcement in the appropriate issue of Update Standards. According to the replies received, the responsible BSI Committee

6、will judge whether the validity of the PAS should be extended for a further three years or what other action should be taken and pass their comments on to the relevant international committee.Observations which it is felt should receive attention before the official call for comments will be welcome

7、d. These should be sent to the Secretary of the responsible BSI Technical Committee at British Standards House, 389 Chiswick High Road, London W4 4AL.The UK participation in its preparation was entrusted to Technical Committee AMT/7, Industrial communications: process measurement and control, includ

8、ing fieldbus.A list of organizations represented on this committee can be obtained on request to its secretary.This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application.Amendments/corrigenda issued since publicationDate

9、 CommentsIEC/PAS 62443-3Edition 1.0 2008-01PUBLICLY AVAILABLE SPECIFICATIONPRE-STANDARD Security for industrial process measurement and control Network and system security DD IEC/PAS 62443-3:2008CONTENTS INTRODUCTION.3 1 Scope.4 2 Normative references .4 3 Terms, definitions, symbols, abbreviated te

10、rms and conventions 5 3.1 Terms and definitions 5 3.2 Symbols and abbreviated terms.11 4 Introduction and compliance.12 5 Principles and reference models.12 5.1 General .12 5.2 Threat-risk model 13 5.3 Security life cycle 15 5.4 Policy 16 5.5 Generic reference configurations.19 5.6 Protection models

11、 .22 6 ICS security policy Overview .27 7 ICS security policy Principles and assumptions .29 7.1 ICS security policy Principles .29 7.2 ICS security policy Assumptions and exclusions.30 7.3 ICS security policy Organization and management. 32 8 ICS security policy Measures.36 8.1 Availability managem

12、ent36 8.2 Integrity management38 8.3 Logical access management .41 8.4 Physical access management44 8.5 Partition management .45 8.6 External access management46 Annex A Projected new edition of IEC 62443 50 Bibliography52 Figure 1 Threat-risk relationship 13 Figure 2 Security life cycle.15 Figure 3

13、 Policy levels.17 Figure 4 Industrial control system (ICS) .20 Figure 5 GPH reference configuration: Generic ICS host with external devices 21 Figure 6 Device protection: Hardening and access management22 Figure 7 Defense-in-depth through partitioning 24 Figure 8 Example: ICS partitioning.25 Figure

14、9 Generic external connectivity .26 DD IEC/PAS 62443-3:2008 2 INTRODUCTION The increasing degree of public networking of formerly isolated automation systems increases the exposure of such systems to attack. Standard IT security protection mechanisms have protection goals and strategies that may be

15、inappropriate for automation systems. This PAS addresses the topic of securing access to and within industrial systems while assuring timely response which may be critical to plant operation. For safety applications and applications in the pharmaceutical or other highly specialized industries, addit

16、ional standards, guidelines, definitions and stipulations may apply, for example, IEC 61508, GAMP (ISPE), for GMP Compliance 21 CFR (FDA) and the Standard Operating Procedure of the European Medicines Agency (SOP/INSP/2003). DD IEC/PAS 62443-3:2008 3 SECURITY FOR INDUSTRIAL PROCESS MEASUREMENT AND C

17、ONTROL NETWORK AND SYSTEM SECURITY 1 Scope This PAS establishes a framework for securing information and communication technology aspects of industrial process measurement and control systems including its networks and devices on those networks, during the operational phase of the plants life cycle.

18、 This PAS provides guidance on a plants operational security requirements and is primarily intended for automation system owners/operators (responsible for ICS operation) Furthermore, the operational requirements of this PAS may interest ICS stakeholders such as: a) automation system designers; b) m

19、anufacturers (vendors) of devices, subsystems, and systems; c) integrators of subsystems and systems. The PAS allows for the following concerns: graceful migration/evolution of existing systems; meeting security objectives with existing COTS technologies and products; assurance of reliability/availa

20、bility of the secured communications services; applicability to systems of any size and risk (scalability); coexistence of safety, legal and regulatory and automation functionality requirements with security requirements. NOTE 1 Plants and systems may contain safety critical components and devices.

21、Any safety-related security components may be subject to certification based on IEC 61508 and according to the SILs therein. This PAS does not guarantee that its specifications are all or in part appropriate or sufficient for the security of such safety critical components and devices. NOTE 2 This P

22、AS does not include requirements for security assurance evaluation and testing. NOTE 3 The measures provided by this PAS are rather process-based and general in nature than technically specific or prescriptive in terms of technical countermeasures and configurations. NOTE 4 The procedures of this PA

23、S are written with the plant owner/operators mind set. NOTE 5 This PAS does not cover the concept, design and implementation live cycle processes, i.e. requirements on control equipment manufacturers future product development cycle. NOTE 6 This PAS does not cover the integration of components and s

24、ubsystems into a system. NOTE 7 This PAS does not cover procurement for integration into an existing system, i.e. procurement requirements for owner/operators of a plant. NOTE 8 This PAS will be extended into a 3-part International Standard to cover most of the restrictions expressed in the previous

25、 notes; for the planned scope of the extended standards, refer to Annex A. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referen

26、ced document (including any amendments) applies. ISO/IEC 15408 (all parts), Information technology Security techniques Evaluation criteria for IT security ISO/IEC 27002:2005, Information technology Security techniques Code of practice for IT security management DD IEC/PAS 62443-3:2008 4 ISO/IEC Guid

27、e 73:2002, Risk management Vocabulary Guidelines for use in standards 3 Terms, definitions, symbols, abbreviated terms and conventions 3.1 Terms and definitions For the purposes of this document, the following terms and definitions apply. 3.1.1 access control prevention of unauthorized use of a rest

28、ricted resource, including its use in an unauthorized manner ISO/IEC 18028-2:2006, modified 3.1.2 adversary entity that attacks, or is a threat to, a system RFC 2828 3.1.3 alert instant indication that an information system and network may be under attack, or in danger because of accident, failure o

29、r people error ISO/IEC 18028-1:2006 3.1.4 asset anything that has value to the organization ISO/IEC 13335-1:2004 3.1.5 assurance performance of appropriate activities or processes to instil confidence that a deliverable meets its security objectives ISO/IEC/TR 15443-1 3.1.6 attack attempts to destro

30、y, expose, alter, or disable an information system and/or information within it or otherwise reach the security policy ISO/IEC 18043 3.1.7 attack surface set of system resources exposed directly and indirectly to potential attack. 3.1.8 audit formal inquiry, formal examination, or verification of fa

31、cts against expectations, for compliance and conformity ISO/IEC 18028-1 3.1.9 authenticate, authentication provision of assurance of the claimed identity of an entity ISO/IEC 19792 DD IEC/PAS 62443-3:2008 5 3.1.10 availability property of being accessible and usable upon demand by an authorized enti

32、ty ISO/IEC 7498-2 3.1.11 commercial off-the shelf (COTS) items which are manufactured and distributed commercially for multiple usages and/or customers; may be tailored for specific usage NOTE COTS is in contrast to custom products designed entirely and uniquely for the specific application. 3.1.12

33、compromise unauthorized use, disclosure, modification, or substitution, respectively, of data, programs or systems configuration, i.e., by and after intrusion. 3.1.13 confidentiality property that information is not made available or disclosed to unauthorized individuals, entities, or processes ISO/

34、IEC 13335-3 3.1.14 credentials means of proving that it is the one who claim to be, the abstract can be an IT account to access an information service or resource ISO/IEC 24760 3.1.15 demilitarized zone (DMZ) security host or small network (also known as a screened sub-net) inserted as a neutral zon

35、e between networks ISO/IEC 18028-3 NOTE It forms a security buffer zone (ISO/IEC 18028-3). 3.1.16 denial of service (attack) attack against a system to deter its availability ISO/IEC 18028-4 3.1.17 event occurrence in a system that is relevant to the security of the system RFC 2828, modified 3.1.18

36、exposed, exposure evident state of being vulnerable and exposed to attack 3.1.19 external outside of, or at the external border of the security perimeter of the ICN, i.e. relating to an external organizational or public network DD IEC/PAS 62443-3:2008 6 3.1.20 external connectivity gateway (ECG) ded

37、icated security gateway (SGW) at the external border of the security perimeter of the ICN, typically with additional functionality to meet specific requirements, i.e. for the connectivity of external devices 3.1.21 external network (EN) network external to the ICN and either part of the organization

38、 to which the ICN belongs, belonging to a third party or public, i.e., the Internet 3.1.22 forensic post-incident effort to explain an event in a formal and verifiable manner to attribute responsibilities in a consecutive and logical manner 3.1.23 gateway, security gateway (SGW) point of connection

39、between networks, or from a network to subnetworks and external networks, intended to protect a network or subnetwork according to a specified security policy ISO/IEC 18028-3, modified NOTE A security gateway comprises more than only firewalls; the term includes routers and switches which provide th

40、e functionality of access control and optionally encryption (ISO/IEC 18028-3). 3.1.24 harden, hardening removing unnecessary functionality to reduce physical, logical and/or organizational vulnerabilities 3.1.25 human-machine-interface (HMI) equipment function designed to present information output

41、to, and to accept information input from the operator to make a human, as operator, integral part of a process 3.1.26 incident security event, or a combination of multiple security events, that constitutes a security 3.1.27 industrial control network (ICN) network connecting ICS equipment; different

42、 ICNs may coexist within one plant and may be connected to remote equipment and resources outside the plant 3.1.28 industrial control system (ICS) system consisting of computing and industrial control hosts, devices and equipment, that are integrated together to control an industrial production, tra

43、nsmission, or distribution process NOTE In the context of this PAS, the term ICS stands for automation systems in general, including supervisory control and data acquisition (SCADA). 3.1.29 insider, inside, internal (entity) inside the security perimeter; insider is an entity authorized to access sy

44、stem resources NOTE An insider attack refers to use of system resources in an unauthorized manner. 3.1.30 integrity safeguarding the accuracy and completeness of information and processing methods ISO/IEC 21827 DD IEC/PAS 62443-3:2008 7 NOTE Integrity may apply specifically to data (data integrity)

45、or to the integrity of the operational ICS as system integrity. 3.1.31 intranet computer network, especially one based on public network technology, that an organization uses for its own internal, and usually private, purposes and that is closed to outsiders 3.1.32 intrusion incident in which an una

46、uthorized entity, i.e. an attacker, gains or evidently attempts to gain, access to restricted system resources RFC 2828, modified 3.1.33 intrusion detection security service that monitors and analyses system events for the purpose of finding, and providing real-time or near real-time warning of, att

47、empts to access system resources in an unauthorized manner RFC 2828 3.1.34 (cryptographic or physical) key device, media or plaintext associated with authentication or cryptographic methods or access control privileges. 3.1.35 log, logging gathering of data on information security events for the pur

48、pose of review and analysis, and ongoing monitoring ISO/IEC 18028-1 3.1.36 malware malicious software, such as a virus or a trojan, designed specifically to damage or disrupt a system ISO/IEC 18028-1 3.1.37 (counter-) measure action, device, procedure, or technique that reduces a threat, a vulnerabi

49、lity, or an incident by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken RFC 2828 3.1.38 message ordered series of octets (or bits) intended to convey information ISO/IEC 2382, modified 3.1.39 monitor observe real-time actions and events to provide evidence about what was observed ISO/IEC 13888-1, modified DD IEC/PAS 62443-3:2008 8 3.1.40 non-repud

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1