ISA TR84 00 09-2017 Cybersecurity Related to the Functional Safety Lifecycle.pdf

上传人:amazingpat195 文档编号:789998 上传时间:2019-01-31 格式:PDF 页数:118 大小:3.31MB
下载 相关 举报
ISA TR84 00 09-2017 Cybersecurity Related to the Functional Safety Lifecycle.pdf_第1页
第1页 / 共118页
ISA TR84 00 09-2017 Cybersecurity Related to the Functional Safety Lifecycle.pdf_第2页
第2页 / 共118页
ISA TR84 00 09-2017 Cybersecurity Related to the Functional Safety Lifecycle.pdf_第3页
第3页 / 共118页
ISA TR84 00 09-2017 Cybersecurity Related to the Functional Safety Lifecycle.pdf_第4页
第4页 / 共118页
ISA TR84 00 09-2017 Cybersecurity Related to the Functional Safety Lifecycle.pdf_第5页
第5页 / 共118页
点击查看更多>>
资源描述

1、 NOTICE OF COPYRIGHT This is a copyright document and may not be copied or distributed in any form or manner without the permission of ISA. This copy of the document was made for the sole use of the person to whom ISA provided it and is subject to the restrictions stated in ISAs license to that pers

2、on. It may not be provided to any other person in print, electronic, or any other form. Violations of ISAs copyright will be prosecuted to the fullest extent of the law and may result in substantial civil and criminal penalties. TECHNICAL REPORT ISA-TR84.00.09-2017 Cybersecurity Related to the Funct

3、ional Safety Lifecycle Approved 10 April 2017 ISA-TR84.00.09-2017, Cybersecurity Related to the Functional Safety Lifecycle ISBN: 978-1-945541-49-0 Copyright 2017 by ISA. All rights reserved. Not for resale. Printed in the United States of America. ISA 67 Alexander Drive P. O. Box 12277 Research Tri

4、angle Park, NC 27709 USA - 3 - ISA-TR84.00.09-2017 PREFACE This preface, as well as all footnotes and annexes, is included for information purposes and is not part of ISA-TR84.00.09-2017. This document has been prepared as part of the service of ISA, the International Society of Automation, toward a

5、 goal of uniformity in the field of instrumentation. To be of real value, this document should not be static but should be subject to periodic review. Toward this end, the Society welcomes all comments and criticisms and asks that they be addressed t o the Secretary, Standards and Practices Board; I

6、SA; 67 Alexander Drive; P. O. Box 12277; Research Triangle Park, NC 27709; Telephone (919) 549-8411; Fax (919) 549-8288; E-mail: standardsisa.org. It is the policy of ISA to encourage and welcome the participation of all concerned individuals and interests in the development of ISA standards, recomm

7、ended practices and technical reports. Participation in the ISA standards-making process by an individual in no way constitutes endorsement by the employer of that individual, of ISA or of any of the standards, recommended practices and technical reports that ISA develops. CAUTION ISA DOES NOT TAKE

8、ANY POSITION WITH RESPECT TO THE EXISTENCE OR VALIDITY OF ANY PATENT RIGHTS ASSERTED IN CONNECTION WITH THIS DOCUMENT, AND ISA DISCLAIMS LIABILITY FOR THE INFRINGEMENT OF ANY PATENT RESULTING FROM THE USE OF THIS DOCUMENT. USERS ARE ADVISED THAT DETERMINATION OF THE VALIDITY OF ANY PATENT RIGHTS, AN

9、D THE RISK OF INFRINGEMENT OF SUCH RIGHTS, IS ENTIRELY THEIR OWN RESPONSIBILITY. PURSUANT TO ISAS PATENT POLICY, ONE OR MORE PATENT HOLDERS OR PATENT APPLICANTS MAY HAVE DISCLOSED PATENTS THAT COULD BE INFRINGED BY USE OF THIS DOCUMENT AND EXECUTED A LETTER OF ASSURANCE COMMITTING TO THE GRANTING OF

10、 A LICENSE ON A WORLDWIDE, NONDISCRIMINATORY BASIS, WITH A FAIR AND REASONABLE ROYALTY RATE AND FAIR AND REASONABLE TERMS AND CONDITIONS. FOR MORE INFORMATION ON SUCH DISCLOSURES AND LETTERS OF ASSURANCE, CONTACT ISA OR VISIT WWW.ISA.ORG/STANDARDSPATENTS. OTHER PATENTS OR PATENT CLAIMS MAY EXIST FOR

11、 WHICH A DISCLOSURE OR LETTER OF ASSURANCE HAS NOT BEEN RECEIVED. ISA IS NOT RESPONSIBLE FOR IDENTIFYING PATENTS OR PATENT APPLICATIONS FOR WHICH A LICENSE MAY BE REQUIRED, FOR CONDUCTING INQUIRIES INTO THE LEGAL VALIDITY OR SCOPE OF PATENTS, OR DETERMINING WHETHER ANY LICENSING TERMS OR CONDITIONS

12、PROVIDED IN CONNECTION WITH SUBMISSION OF A LETTER OF ASSURANCE, IF ANY, OR IN ANY LICENSING AGREEMENTS ARE REASONABLE OR NON-DISCRIMINATORY. ISA REQUESTS THAT ANYONE REVIEWING THIS DOCUMENT WHO IS AWARE OF ANY PATENTS THAT MAY IMPACT IMPLEMENTATION OF THE DOCUMENT NOTIFY THE ISA STANDARDS AND PRACT

13、ICES DEPARTMENT OF THE PATENT AND ITS OWNER. ADDITIONALLY, THE USE OF THIS DOCUMENT MAY INVOLVE HAZARDOUS MATERIALS, OPERATIONS OR PROCESS EQUIPMENT. THE DOCUMENT CANNOT ANTICIPATE ALL POSSIBLE APPLICATIONS OR ADDRESS ALL POSSIBLE SAFETY ISSUES ASSOCIATED WITH USE IN HAZARDOUS CONDITIONS. THE USER O

14、F THIS TECHNICAL REPORT SHOULD EXERCISE SOUND PROFESSIONAL JUDGMENT CONCERNING ITS USE AND APPLICABILITY UNDER THE USERS PARTICULAR CIRCUMSTANCES. THE USER SHOULD ALSO CONSIDER THE APPLICABILITY OF ANY GOVERNMENTAL REGULATORY LIMITATIONS AND ESTABLISHED SAFETY AND HEALTH PRACTICES BEFORE IMPLEMENTIN

15、G THIS TECHNICAL REPORT. ISA (www.isa.org) is a nonprofit professional association that sets the standard for those who apply engineering and technology to improve the management, safety, and cybersecurity of modern ISA-TR84.00.09-2017 - 4 - automation and control systems used across industry and cr

16、itical infrastructure. Founded in 1945, ISA develops widely used global standards; certifies industry professionals; provides education and training; publishes books and technical articles; hosts conferences and exhibits; and provides networking and career development programs for its 40,000 members

17、 and 400,000 customers around the world. ISA owns A, a leading online publisher of automation-related content, and is the founding sponsor of The Automation Federation (www.automationfederation.org), an association of non-profit organizations serving as “The Voice of Automation.“ Through a wholly ow

18、ned subsidiary, ISA bridges the gap between standards and their implementation with the ISA Security Compliance Institute (www.isasecure.org) and the ISA Wireless Compliance Institute (www.isa100wci.org). The following members of ISA84 Working Group 9 served as active contributors in the development

19、 of this technical report revision: NAME AFFILIATION Harold W Thomas (Hal), Chair exida Kevin Arnold Phillips 66 David Bennett Phillips 66 Rahul Bhojani BP John D. Day Air Products and Chemicals David Deibert Air Products and Chemicals Andrew Feben Eigen Ltd David Gunter Air Products and Chemicals E

20、ric Hopp Rockwell Automation Kevin Klein Chevron ETC Vic Maggioli Feltronics Corp Marcelo Mollicone SYM PCS Nagappan Muthiah Wood Group Eric Persson exida Jeff Potter Emerson Richard Roberts Suncor Energy Eloise Roche SIS-TECH Solutions Byron Schneidau BP Pipelines risk may be quantified - Based on

21、likelihood and severity; risk is currently qualitative - Risk categorization for every cybersecurity requirement - Multi-dimensional problem - Assigned to zone with target SL for each zone/conduit Risk mitigation measures - Relies on independent protection layers concept - Safeguards reduce likeliho

22、od of consequence evaluated - Identifies integrity requirements for safeguards; for SIF assigns target SIL - Relies on cybersecurity countermeasures within zones, conduits interconnecting zones, and defense in depth concept - Countermeasures reduce likelihood - Identifies requirements for countermea

23、sures to meet the zone target SL for each threat vector Implementation of measures - Safety manual for components - Quantitative SIL verification for SIF - Cybersecurity manual for components - Verification through different levels of testing for target SL Operation and maintenance - Restrict access

24、 to IACS components to competent personnel with necessary access privileges - Periodic testing of measures - Demand rate and component failures to be monitored - Awareness and training - Restrict access to IACS components to competent personnel with necessary access privileges - Periodic testing of

25、measures - Frequent reviews to identify new vulnerabilities and take appropriate action, if necessary - Awareness and training - Cyber risk reassessment after each software or hardware change Management system - Defines requirements for competency, training, verification, testing, audit, MOC, and do

26、cumentation - Defines requirements for competency, training, verification, testing, audit, MOC, and documentation ISA-TR84.00.09-2017 - 16 - This page intentionally left blank. - 17 - ISA-TR84.00.09-2017 1 Scope This document is intended to address and provide guidance on integrating the cybersecuri

27、ty lifecycle with the safety lifecycle as they relate to Safety Controls, Alarms, and Interlocks (SCAI), inclusive of Safety Instrumented Systems (SIS). This scope includes the work processes and countermeasures used to reduce the risk involved due to cybersecurity threats to the Industrial Automati

28、on and Control System (IACS) network. This scope provides recommendations to ensure SCAI are adequately secured due to the potential for cyber attacks that can act like common mode failures that initiate a hazardous demand and also prevent instrumented protection functions, including the SIS, from p

29、erforming their intended purpose. The scope is intended to address cybersecurity from both external and internal threats. Although not directly within the scope, enterprise networks, business networks and process information networks (demilitarized zones) that represent a threat vector to the SCAI s

30、ystems, or contain countermeasures that reduce the risk to the SCAI systems from external cyber threats, are included. The scope does not address physical plant protection (for example, fences, bollards, and grounding) that has the intent of preventing unauthorized entry into the plant so as to prev

31、ent theft , vandalism, or physical damage, but does address physical access issues related to cybersecurity of the IACS (12.4 of this technical report). SCAI systems that are constructed exclusively of electrical/electronic components without digital signal technology are not vulnerable to cybersecu

32、rity attacks, and these technologies are not discussed in this technical report. 2 References The following documents are important for understanding this technical report. For dated references, only the edition cited applies. For undated references, the latest edition of the referenced document (in

33、cluding any amendments) applies. For information on obtaining ISA standards and technical reports, visit: www.isa.org/findstandards In addition, readers should be aware of the ongoing development of additional standards in the ANSI/ISA-62443 series, Security for Industrial Automation and Control Sys

34、tems, listed in the Bibliography. For an update on the status of these standards, visit https:/www.isa.org/isa99/ . IEC-61508-2010, Functional Safety of Electrical/Electronic/Programmable Electronic Safety-Related Systems IEC-61511-1, Functional Safety: Safety Instrumented Systems for the Process In

35、dustry Sector Part 1: Framework, Definitions, System, Hardware and Software Requirements . ISA-84.00.01-Part 1 (IEC 61511-1), Functional Safety: Safety Instrumented Systems for the Process Industry Sector Part 1: Framework, Definitions, System, Hardware and Software Requirements. ANSI/ISA-84.91.01-2

36、012, Identification and Mechanical Integrity of Safety Controls, Alarms, and Interlocks in the Process Industry, 2012. ISA-TR84.00.09-2017 - 18 - 3 Terms, definitions, abbreviated terms, acronyms, and conventions 3.1 Terms and definitions Conduit ANSI/ISA-62443-1-1 neither should it be assumed that

37、each type is necessarily separate and independent. Note 2 to entry: Refer to ISA-84.00.01-2004 (IEC 61511 Mod) for additional requirements related to safety instrumented systems. Note 3 to entry: Examples of non-instrumented safeguards include rupture disks, relief valves, dikes, etc. Security level

38、 ANSI/ISA-62443-1-1 Level corresponding to the required effectiveness of countermeasures and inherent security properties of devices and systems for a zone or conduit based on assessment of risk for the zone or conduit. Security level 0 ISA -62443-3-2 Security level with the following attributes: No

39、 specific requirements or security protection. Security level 1 Security level 1 has the following attributes: Intended to protect against casual or coincidental violation Countermeasure and detection effectiveness capable of delaying or denying an attack for a period of 4 to 8 hour Security level 2

40、 Security level with the following attributes: Intended to protect against intentional violation using simple means with low resources, generic skills and low motivation Countermeasure and detection effectiveness capable of delaying or denying an attack for a period of days Order of magnitude improv

41、ement in risk reduction factor (RRF) over a security level 1 Security level 3 Security level with the following attributes: Intended to protect against intentional violation using sophisticated means with moderate resources, IACS specific skills and moderate motivation Countermeasure and detection e

42、ffectiveness capable of delaying or denying an attack for a period of days to weeks ISA-TR84.00.09-2017 - 20 - Order of magnitude improvement in risk reduction factor (RRF) over a security level 2 Security level 4 Security level with the following attributes: Intended to protect against intentional

43、violation using sophisticated means with extended resources, IACS specific skills and high motivation Countermeasure and detection effectiveness capable of delaying or denying an attack for a period of weeks to months Order of magnitude improvement in risk reduction factor (RRF) over a security leve

44、l 3. Threat 1) Potential for violation of security, which exists when there is a circumstance, capability, action or event that could breach security and cause harm. 2) Circumstance or event with the potential to adversely affect organizational operations (e.g., mission, functions, reputation), orga

45、nizational assets, IACS, or personnel via means contrary to security policy, intentionally or unintentionally cause the destruction, disclosure, modification of data, control logic, SCAI logic, and/or denial of service. Threat agent Method(s), individual(s) or organization(s) that could breach the s

46、ecurity of a facility, operation or system by exploiting a vulnerability Threat vector ISA -62443-1-2 Path or means by which a threat agent can gain access to an asset resulting in a negative outcome Unmitigated cyber risk Level of risk that is present in a system before any cybersecurity countermea

47、sures are considered Vulnerability ISA -62443-1-2 slight revision to no. 2 1) Flaw or weakness in a systems design, implementation, or operation and management that could be exploited to violate the systems integrity or security policy. 2) Weakness in an IACS function, procedure, internal control or

48、 implementation that could be exploited or triggered by a threat source, either intentionally designed into computer components (e.g., remote port access) or accidentally inserted at any time during the lifecycle. Zone ISA -62443-3-3 Grouping of logical or physical assets that share common security

49、requirements. Note to entry: A zone has a clear border. The security policy of a zone is typically enforced by a combination of mechanisms both at the zone edge and within the zone. For additional definitions, see IEC-61511 2, ISA-84.00.01-2004 3, and ISA-62443-1-2 5 3.2 Abbreviated terms and acronyms The abbreviated terms and acronyms used in this document are defined as follows: ACL Access Control List APT Advanced Persistent Threat ALARP As Low as Reasonably Practical - 21 - ISA-TR84.00.09-2017 ANSI American Nati

展开阅读全文
相关资源
猜你喜欢
  • BS PD IEC TS 62763-2013_5284 Pilot function through a control pilot circuit using PWM (pulse width modulation) and a control pilot wire《通过控制导向线使用PWM (脉冲宽度调制) 的导向功能和控制导向线》.pdf BS PD IEC TS 62763-2013_5284 Pilot function through a control pilot circuit using PWM (pulse width modulation) and a control pilot wire《通过控制导向线使用PWM (脉冲宽度调制) 的导向功能和控制导向线》.pdf
  • BS ISO 8070-2007 Milk and milk products - Determination of calcium sodium potassium and magnesium contents - Atomic absorption spectrometric method《牛奶和奶制品 钙、钠、钾和镁含量的测定 原子吸.pdf BS ISO 8070-2007 Milk and milk products - Determination of calcium sodium potassium and magnesium contents - Atomic absorption spectrometric method《牛奶和奶制品 钙、钠、钾和镁含量的测定 原子吸.pdf
  • BS ISO 8082-1-2009 Self-propelled machinery for forestry - Laboratory tests and performance requirements for roll-over protective structures - General machines《林业用自推进机械 防倾.pdf BS ISO 8082-1-2009 Self-propelled machinery for forestry - Laboratory tests and performance requirements for roll-over protective structures - General machines《林业用自推进机械 防倾.pdf
  • BS ISO 8082-2-2011 Self-propelled machinery for forestry Laboratory tests and performance requirements for roll-over protective structures Machines having a rotating platf.pdf BS ISO 8082-2-2011 Self-propelled machinery for forestry Laboratory tests and performance requirements for roll-over protective structures Machines having a rotating platf.pdf
  • BS ISO 8083-2006 Machinery for forestry - Falling-object protective structures (FOPS) - Laboratory tests and performance requirements《林业机械 落体防护装置(FOPS) 实验室试验和性能要求》.pdf BS ISO 8083-2006 Machinery for forestry - Falling-object protective structures (FOPS) - Laboratory tests and performance requirements《林业机械 落体防护装置(FOPS) 实验室试验和性能要求》.pdf
  • BS ISO 8086-2004 Dairy plant - Hygiene conditions - General guidance on inspection and sampling procedures《乳品厂 卫生条件 检验和取样程序通用指南》.pdf BS ISO 8086-2004 Dairy plant - Hygiene conditions - General guidance on inspection and sampling procedures《乳品厂 卫生条件 检验和取样程序通用指南》.pdf
  • BS ISO 8096-2005 Rubber- or plastics-coated fabrics for water resistant clothing - Specification《雨衣用橡胶或塑料涂覆织物 规范》.pdf BS ISO 8096-2005 Rubber- or plastics-coated fabrics for water resistant clothing - Specification《雨衣用橡胶或塑料涂覆织物 规范》.pdf
  • BS ISO 8097-2001 Aircraft Minimum airworthiness requirements and test conditions for certified air cargo unit load devices《航空器 经认证的航空货运集装单元装置最低适航性要求和试验条件》.pdf BS ISO 8097-2001 Aircraft Minimum airworthiness requirements and test conditions for certified air cargo unit load devices《航空器 经认证的航空货运集装单元装置最低适航性要求和试验条件》.pdf
  • BS ISO 8114-1993 Textile machinery and accessories - Spindles for ring-spinning and doubling machines - List of equivalent terms《纺织机械和附件 环锭纺纱机和并线机用锭子 同义术语表》.pdf BS ISO 8114-1993 Textile machinery and accessories - Spindles for ring-spinning and doubling machines - List of equivalent terms《纺织机械和附件 环锭纺纱机和并线机用锭子 同义术语表》.pdf
  • 相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > 其他

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1