BS DD IEC PAS 62443-3-2008 Security for industrial process measurement and control - Network and system security《工业过程的测量和控制安全 网络和系统安全》.pdf

上传人:花仙子 文档编号:548300 上传时间:2018-12-09 格式:PDF 页数:56 大小:1.82MB
下载 相关 举报
BS DD IEC PAS 62443-3-2008 Security for industrial process measurement and control - Network and system security《工业过程的测量和控制安全 网络和系统安全》.pdf_第1页
第1页 / 共56页
BS DD IEC PAS 62443-3-2008 Security for industrial process measurement and control - Network and system security《工业过程的测量和控制安全 网络和系统安全》.pdf_第2页
第2页 / 共56页
BS DD IEC PAS 62443-3-2008 Security for industrial process measurement and control - Network and system security《工业过程的测量和控制安全 网络和系统安全》.pdf_第3页
第3页 / 共56页
BS DD IEC PAS 62443-3-2008 Security for industrial process measurement and control - Network and system security《工业过程的测量和控制安全 网络和系统安全》.pdf_第4页
第4页 / 共56页
BS DD IEC PAS 62443-3-2008 Security for industrial process measurement and control - Network and system security《工业过程的测量和控制安全 网络和系统安全》.pdf_第5页
第5页 / 共56页
亲,该文档总共56页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、DRAFT FOR DEVELOPMENTDD IEC/PAS 62443-3:2008Security for industrial process measurement and control Part 3: Network and system securityICS 25.040.40; 35.040; 35.110g49g50g3g38g50g51g60g44g49g42g3g58g44g55g43g50g56g55g3g37g54g44g3g51g40g53g48g44g54g54g44g50g49g3g40g59g38g40g51g55g3g36g54g3g51g40g53g4

2、8g44g55g55g40g39g3g37g60g3g38g50g51g60g53g44g42g43g55g3g47g36g58DD IEC/PAS 62443-3:2008This Draft for Development was published under the authority of the Standards Policy and Strategy Committee on 29 August 2008 BSI 2008ISBN 978 0 580 62208 3National forewordThis Draft for Development is the UK imp

3、lementation of IEC/PAS 62443-3:2008.This publication is not to be regarded as a British Standard.It is being issued in the Draft for Development series of publications and is of a provisional nature. It should be applied on this provisional basis, so that information and experience of its practical

4、application can be obtained.A PAS is a Technical Specification not fulfilling the requirements for a standard, but made available to the public and established in an organization operating under a given procedure.A review of this Draft for Development will be carried out not later than three years a

5、fter its publication.Notification of the start of the review period, with a request for the submission of comments from users of this Draft for Development, will be made in an announcement in the appropriate issue of Update Standards. According to the replies received, the responsible BSI Committee

6、will judge whether the validity of the PAS should be extended for a further three years or what other action should be taken and pass their comments on to the relevant international committee.Observations which it is felt should receive attention before the official call for comments will be welcome

7、d. These should be sent to the Secretary of the responsible BSI Technical Committee at British Standards House, 389 Chiswick High Road, London W4 4AL.The UK participation in its preparation was entrusted to Technical Committee AMT/7, Industrial communications: process measurement and control, includ

8、ing fieldbus.A list of organizations represented on this committee can be obtained on request to its secretary.This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application.Amendments/corrigenda issued since publicationDate

9、 CommentsIEC/PAS 62443-3Edition 1.0 2008-01PUBLICLY AVAILABLE SPECIFICATIONPRE-STANDARD Security for industrial process measurement and control Network and system security DD IEC/PAS 62443-3:2008CONTENTS INTRODUCTION.3 1 Scope.4 2 Normative references .4 3 Terms, definitions, symbols, abbreviated te

10、rms and conventions 5 3.1 Terms and definitions 5 3.2 Symbols and abbreviated terms.11 4 Introduction and compliance.12 5 Principles and reference models.12 5.1 General .12 5.2 Threat-risk model 13 5.3 Security life cycle 15 5.4 Policy 16 5.5 Generic reference configurations.19 5.6 Protection models

11、 .22 6 ICS security policy Overview .27 7 ICS security policy Principles and assumptions .29 7.1 ICS security policy Principles .29 7.2 ICS security policy Assumptions and exclusions.30 7.3 ICS security policy Organization and management. 32 8 ICS security policy Measures.36 8.1 Availability managem

12、ent36 8.2 Integrity management38 8.3 Logical access management .41 8.4 Physical access management44 8.5 Partition management .45 8.6 External access management46 Annex A Projected new edition of IEC 62443 50 Bibliography52 Figure 1 Threat-risk relationship 13 Figure 2 Security life cycle.15 Figure 3

13、 Policy levels.17 Figure 4 Industrial control system (ICS) .20 Figure 5 GPH reference configuration: Generic ICS host with external devices 21 Figure 6 Device protection: Hardening and access management22 Figure 7 Defense-in-depth through partitioning 24 Figure 8 Example: ICS partitioning.25 Figure

14、9 Generic external connectivity .26 DD IEC/PAS 62443-3:2008 2 INTRODUCTION The increasing degree of public networking of formerly isolated automation systems increases the exposure of such systems to attack. Standard IT security protection mechanisms have protection goals and strategies that may be

15、inappropriate for automation systems. This PAS addresses the topic of securing access to and within industrial systems while assuring timely response which may be critical to plant operation. For safety applications and applications in the pharmaceutical or other highly specialized industries, addit

16、ional standards, guidelines, definitions and stipulations may apply, for example, IEC 61508, GAMP (ISPE), for GMP Compliance 21 CFR (FDA) and the Standard Operating Procedure of the European Medicines Agency (SOP/INSP/2003). DD IEC/PAS 62443-3:2008 3 SECURITY FOR INDUSTRIAL PROCESS MEASUREMENT AND C

17、ONTROL NETWORK AND SYSTEM SECURITY 1 Scope This PAS establishes a framework for securing information and communication technology aspects of industrial process measurement and control systems including its networks and devices on those networks, during the operational phase of the plants life cycle.

18、 This PAS provides guidance on a plants operational security requirements and is primarily intended for automation system owners/operators (responsible for ICS operation) Furthermore, the operational requirements of this PAS may interest ICS stakeholders such as: a) automation system designers; b) m

19、anufacturers (vendors) of devices, subsystems, and systems; c) integrators of subsystems and systems. The PAS allows for the following concerns: graceful migration/evolution of existing systems; meeting security objectives with existing COTS technologies and products; assurance of reliability/availa

20、bility of the secured communications services; applicability to systems of any size and risk (scalability); coexistence of safety, legal and regulatory and automation functionality requirements with security requirements. NOTE 1 Plants and systems may contain safety critical components and devices.

21、Any safety-related security components may be subject to certification based on IEC 61508 and according to the SILs therein. This PAS does not guarantee that its specifications are all or in part appropriate or sufficient for the security of such safety critical components and devices. NOTE 2 This P

22、AS does not include requirements for security assurance evaluation and testing. NOTE 3 The measures provided by this PAS are rather process-based and general in nature than technically specific or prescriptive in terms of technical countermeasures and configurations. NOTE 4 The procedures of this PA

23、S are written with the plant owner/operators mind set. NOTE 5 This PAS does not cover the concept, design and implementation live cycle processes, i.e. requirements on control equipment manufacturers future product development cycle. NOTE 6 This PAS does not cover the integration of components and s

24、ubsystems into a system. NOTE 7 This PAS does not cover procurement for integration into an existing system, i.e. procurement requirements for owner/operators of a plant. NOTE 8 This PAS will be extended into a 3-part International Standard to cover most of the restrictions expressed in the previous

25、 notes; for the planned scope of the extended standards, refer to Annex A. 2 Normative references The following referenced documents are indispensable for the application of this document. For dated references, only the edition cited applies. For undated references, the latest edition of the referen

26、ced document (including any amendments) applies. ISO/IEC 15408 (all parts), Information technology Security techniques Evaluation criteria for IT security ISO/IEC 27002:2005, Information technology Security techniques Code of practice for IT security management DD IEC/PAS 62443-3:2008 4 ISO/IEC Guid

27、e 73:2002, Risk management Vocabulary Guidelines for use in standards 3 Terms, definitions, symbols, abbreviated terms and conventions 3.1 Terms and definitions For the purposes of this document, the following terms and definitions apply. 3.1.1 access control prevention of unauthorized use of a rest

28、ricted resource, including its use in an unauthorized manner ISO/IEC 18028-2:2006, modified 3.1.2 adversary entity that attacks, or is a threat to, a system RFC 2828 3.1.3 alert instant indication that an information system and network may be under attack, or in danger because of accident, failure o

29、r people error ISO/IEC 18028-1:2006 3.1.4 asset anything that has value to the organization ISO/IEC 13335-1:2004 3.1.5 assurance performance of appropriate activities or processes to instil confidence that a deliverable meets its security objectives ISO/IEC/TR 15443-1 3.1.6 attack attempts to destro

30、y, expose, alter, or disable an information system and/or information within it or otherwise reach the security policy ISO/IEC 18043 3.1.7 attack surface set of system resources exposed directly and indirectly to potential attack. 3.1.8 audit formal inquiry, formal examination, or verification of fa

31、cts against expectations, for compliance and conformity ISO/IEC 18028-1 3.1.9 authenticate, authentication provision of assurance of the claimed identity of an entity ISO/IEC 19792 DD IEC/PAS 62443-3:2008 5 3.1.10 availability property of being accessible and usable upon demand by an authorized enti

32、ty ISO/IEC 7498-2 3.1.11 commercial off-the shelf (COTS) items which are manufactured and distributed commercially for multiple usages and/or customers; may be tailored for specific usage NOTE COTS is in contrast to custom products designed entirely and uniquely for the specific application. 3.1.12

33、compromise unauthorized use, disclosure, modification, or substitution, respectively, of data, programs or systems configuration, i.e., by and after intrusion. 3.1.13 confidentiality property that information is not made available or disclosed to unauthorized individuals, entities, or processes ISO/

34、IEC 13335-3 3.1.14 credentials means of proving that it is the one who claim to be, the abstract can be an IT account to access an information service or resource ISO/IEC 24760 3.1.15 demilitarized zone (DMZ) security host or small network (also known as a screened sub-net) inserted as a neutral zon

35、e between networks ISO/IEC 18028-3 NOTE It forms a security buffer zone (ISO/IEC 18028-3). 3.1.16 denial of service (attack) attack against a system to deter its availability ISO/IEC 18028-4 3.1.17 event occurrence in a system that is relevant to the security of the system RFC 2828, modified 3.1.18

36、exposed, exposure evident state of being vulnerable and exposed to attack 3.1.19 external outside of, or at the external border of the security perimeter of the ICN, i.e. relating to an external organizational or public network DD IEC/PAS 62443-3:2008 6 3.1.20 external connectivity gateway (ECG) ded

37、icated security gateway (SGW) at the external border of the security perimeter of the ICN, typically with additional functionality to meet specific requirements, i.e. for the connectivity of external devices 3.1.21 external network (EN) network external to the ICN and either part of the organization

38、 to which the ICN belongs, belonging to a third party or public, i.e., the Internet 3.1.22 forensic post-incident effort to explain an event in a formal and verifiable manner to attribute responsibilities in a consecutive and logical manner 3.1.23 gateway, security gateway (SGW) point of connection

39、between networks, or from a network to subnetworks and external networks, intended to protect a network or subnetwork according to a specified security policy ISO/IEC 18028-3, modified NOTE A security gateway comprises more than only firewalls; the term includes routers and switches which provide th

40、e functionality of access control and optionally encryption (ISO/IEC 18028-3). 3.1.24 harden, hardening removing unnecessary functionality to reduce physical, logical and/or organizational vulnerabilities 3.1.25 human-machine-interface (HMI) equipment function designed to present information output

41、to, and to accept information input from the operator to make a human, as operator, integral part of a process 3.1.26 incident security event, or a combination of multiple security events, that constitutes a security 3.1.27 industrial control network (ICN) network connecting ICS equipment; different

42、 ICNs may coexist within one plant and may be connected to remote equipment and resources outside the plant 3.1.28 industrial control system (ICS) system consisting of computing and industrial control hosts, devices and equipment, that are integrated together to control an industrial production, tra

43、nsmission, or distribution process NOTE In the context of this PAS, the term ICS stands for automation systems in general, including supervisory control and data acquisition (SCADA). 3.1.29 insider, inside, internal (entity) inside the security perimeter; insider is an entity authorized to access sy

44、stem resources NOTE An insider attack refers to use of system resources in an unauthorized manner. 3.1.30 integrity safeguarding the accuracy and completeness of information and processing methods ISO/IEC 21827 DD IEC/PAS 62443-3:2008 7 NOTE Integrity may apply specifically to data (data integrity)

45、or to the integrity of the operational ICS as system integrity. 3.1.31 intranet computer network, especially one based on public network technology, that an organization uses for its own internal, and usually private, purposes and that is closed to outsiders 3.1.32 intrusion incident in which an una

46、uthorized entity, i.e. an attacker, gains or evidently attempts to gain, access to restricted system resources RFC 2828, modified 3.1.33 intrusion detection security service that monitors and analyses system events for the purpose of finding, and providing real-time or near real-time warning of, att

47、empts to access system resources in an unauthorized manner RFC 2828 3.1.34 (cryptographic or physical) key device, media or plaintext associated with authentication or cryptographic methods or access control privileges. 3.1.35 log, logging gathering of data on information security events for the pur

48、pose of review and analysis, and ongoing monitoring ISO/IEC 18028-1 3.1.36 malware malicious software, such as a virus or a trojan, designed specifically to damage or disrupt a system ISO/IEC 18028-1 3.1.37 (counter-) measure action, device, procedure, or technique that reduces a threat, a vulnerabi

49、lity, or an incident by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken RFC 2828 3.1.38 message ordered series of octets (or bits) intended to convey information ISO/IEC 2382, modified 3.1.39 monitor observe real-time actions and events to provide evidence about what was observed ISO/IEC 13888-1, modified DD IEC/PAS 62443-3:2008 8 3.1.40 non-repud

展开阅读全文
相关资源
  • BS ISO IEC 29150-2011 Information technology Security techniques Signcryption《信息技术 安全技术 签密》.pdfBS ISO IEC 29150-2011 Information technology Security techniques Signcryption《信息技术 安全技术 签密》.pdf
  • BS ISO IEC 15408-1-2009 Information technology - Security techniques - Evaluation criteria for IT Security - Introduction and general model《信息技术 安全技术 IT安全评价准则 一.pdfBS ISO IEC 15408-1-2009 Information technology - Security techniques - Evaluation criteria for IT Security - Introduction and general model《信息技术 安全技术 IT安全评价准则 一.pdf
  • BS ISO 7295-1988+A1-2014 Tyre valves for aircraft Interchangeability dimensions《飞机轮胎汽门嘴 互换性尺寸》.pdfBS ISO 7295-1988+A1-2014 Tyre valves for aircraft Interchangeability dimensions《飞机轮胎汽门嘴 互换性尺寸》.pdf
  • BS ISO 15118-1-2013 Road vehicles Vehicle to grid communication interface General information and use-case definition《道路车辆 车辆到电力通讯接口 通用信息和使用案例定义》.pdfBS ISO 15118-1-2013 Road vehicles Vehicle to grid communication interface General information and use-case definition《道路车辆 车辆到电力通讯接口 通用信息和使用案例定义》.pdf
  • BS ISO 13765-2-2004 Refractory mortars - Determination of consistency using the reciprocating flow table method《耐熔灰浆 使用往复流动表法测定一致性》.pdfBS ISO 13765-2-2004 Refractory mortars - Determination of consistency using the reciprocating flow table method《耐熔灰浆 使用往复流动表法测定一致性》.pdf
  • BS ISO 10998-2008+A1-2014 Agricultural tractors Requirements for steering《农业拖拉机 操纵要求》.pdfBS ISO 10998-2008+A1-2014 Agricultural tractors Requirements for steering《农业拖拉机 操纵要求》.pdf
  • BS Z 9-1998 Space data and information transfer systems - Advanced orbiting systems - Networks and data links - Architectural specification《空间数据和信息传输系统 高级轨道系统 网络和数据链接 结构规范》.pdfBS Z 9-1998 Space data and information transfer systems - Advanced orbiting systems - Networks and data links - Architectural specification《空间数据和信息传输系统 高级轨道系统 网络和数据链接 结构规范》.pdf
  • BS Z 7-1998 Space data and information transfer systems - ASCII encoded English《空间数据和信息传输系统 ASCII 编码英语》.pdfBS Z 7-1998 Space data and information transfer systems - ASCII encoded English《空间数据和信息传输系统 ASCII 编码英语》.pdf
  • BS Z 5-1997 Space data and information transfer systems - Standard formatted data units - Control authority procedures《航天数据和信息发送系统 标准格式数据单元 控制授权程序》.pdfBS Z 5-1997 Space data and information transfer systems - Standard formatted data units - Control authority procedures《航天数据和信息发送系统 标准格式数据单元 控制授权程序》.pdf
  • BS Z 4-1997 Space data and information transfer systems - Standard formatted data units - Structure and construction rules《航天数据和信息传输系统 标准格式数据单元 结构和构造规则》.pdfBS Z 4-1997 Space data and information transfer systems - Standard formatted data units - Structure and construction rules《航天数据和信息传输系统 标准格式数据单元 结构和构造规则》.pdf
  • 猜你喜欢
    相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > BS

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1