Cybersecurity strategy and actions [InTech]
| By Lydon, Bill | |
| Proquest LLC |
Cybersecurity is now becoming a high priority for industry and the government, but the
Cyberattacks on industrial operations continue to be a great concern, but at the same time, management is increasingly demanding real-time communications between automation and business systems. In addition, the decreasing number of experienced automation experts is driving the need for remote plant operations over the Internet, raising vulnerability concerns. The risks of cyberattacks are growing and present serious threats to the health and well-being of our citizens' economic and national security. These attacks have the potential to disrupt or halt national power grids, transportation, telecommunications systems, financial networks, manufacturing, and government functions.
More visibility has been given to cybersecurity in the U.S. with the U.S. Presidential Executive Order 13636, announced in
The first
The framework offers a way to take a high-level, overarching view of an organization's management of cybersecurity risk by focusing on key functions of an organization's approach to this security. The high-level functions are labeled know, prevent, detect, respond, and recover. These are broken down further into categories. For instance, the "prevent" category includes identity and access management, physical security, training, and awareness. It is important to note that NIST personnel have gone to great lengths to emphasize that they are not chartered to develop any new standards but to reference industry standards. ISA has cybersecurity standards that can easily support the objectives of the executive order. NIST will release a preliminary framework for public comment in
Leadership perspective
Incentives to support adoption
ISA cybersecurity initiatives
In response to a NIST open request for information on the cybersecurity framework, the
ISA99 committee
The ISA99 standards development committee brings together more than 500 industrial cybersecurity experts from multiple industries and applications to develop the ISA-62443 series of American National Standards on IACS security. These standards are a framework for companies to achieve and maintain security improvements through a life cycle that integrates design, implementation, monitoring, and continuous improvement. This original and ongoing work is being adopted by the
Test lab accreditation assures users of the competence and impartiality of the certification body being accredited. ISASecure is an ISO/IEC Guide 65 conformance scheme. As such, all ISASecure certification bodies (test labs) are independently accredited to ISASecure requirements, ISO/IEC Guide 65, and ISO/IEC 17025 by an ISO/IEC 17011 accreditation body, such as ANSI/
ISASecure Embedded Device Security Assurance (EDSA) is a certification program for embedded devices, which are special-purpose devices running embedded software designed to directly monitor, control, or actuate an industrial process. The ISASecure EDSA certification program is currently available, and several suppliers' devices have been certified to ISASecure Security Level 1 or 2.
ISASecure System Security Assurance (SSA) is a certification program for industrial automation and control systems. The certification tests and assesses for compliance to the ISA-62443 standards. The primary focus of the SSA program is to certify compliance to the ISA-62443-3-3 cybersecurity standard. The ISASecure SSA certification program is currently under development and is expected to be released in the fourth quarter of 2013.
ISASecure Security Development Lifecycle Assurance (SDLA) is a certification program to assess the supplier's product development process to ensure it incorporates a security development life cycle and will certify to the ISA62443-4-1 cybersecurity standard. The ISASecure SDLA certification program is currently under development and is expected to be released in the fourth quarter of 2013.
Reflecting international concerns about IACS security, in
ISA99 plan overview
The figure provides a quick overview of all the work products (standards, technical reports, etc.) available, under development, or planned by the ISA99 standards development committee. More information is available in the form of a detailed list of work products, which includes links to copies of recent working drafts at http://isa99.isa.org/ ISA99%20Wiki/Home.aspx.
Each element of the work plan has three separate numerical designations. Originally, all work products of the committee were numbered in the series ISA99.xx.yy, and this terminology is still in common use. More recently, there was a decision to more closely align ISA's efforts with those of the corresponding IEC Technical Committee 65,
Other activity
The ISA99 committee continues to develop additional standards and technical reports in the ISA-62443 (IEC 62443) series, several of which will soon be circulated for review and comment. More information is available on the wiki at the ISA99 website (www.isa.org/isa99 or http://isa99.isa.org/ISA99%20Wiki/ Home.aspx). ISA offers a number of training courses on industrial cybersecurity and is currently developing a certificate program in cybersecurity.
ISA99 and the U.S. government cybersecurity framework
Putting widespread cybersecurity standards in place is vital, because many of the U.S.'s industrial production settings and infrastructure environments are woefully underprepared to address cyberwarfare. If industrial control systems and critical infrastructure-such as a power plant, water treatment facility, or transportation grid-are attacked, the result could be significant equipment impairment, production loss, regulatory violations, environmental damage, and public endangerment.
The development of a national cybersecurity framework is a significant first step in addressing the country's cyberrisks and helping owners and operators of critical infrastructure identify, assess, and manage cyberthreats.
* AF responded to two requests for information (RFIs) on 24 April to NIST on behalf of the ISA99 committee and the
* On 27 June, AF and ISA leaders took part in a telephone conference with NIST staff to discuss the
* NIST has requested help from AF in identifying a location for a "deep dive" review of the framework draft once it is released in October. AF and NIST staff are working on the details.
FAST FORWARD
* Cyberattacks on industrial operations are a growing concern with potential to disrupt the economy and do harm.
* NIST and the
*
ISASecure Embedded Device Security Assurance Certification
Industrial control suppliers earn the ISASecure(TM) desig- a nation for products that demonstrate adherence to an * industry consensus cybersecurity specification for security characteristics and supplier development practices. The first ISASecure certification, Embedded Device Security Assurance (EDSA), focuses on the security of embedded devices and addresses device characteristics and supplier development practices for those devices and will meet requirements of ISA-62443-4-2 when available. An embedded device that meets the requirements of the ISASecure EDSA specification earns the ISASecure EDSA certification. It is a trademarked designation that provides instant recognition of product security characteristics and capabilities and provides an independent industry stamp of approval similar to a "Safety Integrity Level" Certification (ISO/IEC 61508).
The ISASecure EDSA certification offers three levels of recognition for a device, reflecting increasing levels of device security assurance. The levels are ISASecure Level 1 for Devices, ISASecure Level 2 for Devices, and ISASecure Level 3 for Devices. All levels of security certification granted under this program contain the following technical elements:
* Functional security assessment (FSA)
* Software development security assessment (SDSA)
* Communication robustness testing (CRT)
FSA and SDSA evaluation requirements increase in rigor for Levels 2 and 3, while CRT criteria are the same regardless of certification level. The ISASecure Embedded Device Security Assurance Certification brochure, available at www.isasecure.org, describes the three technical certification elements, certification levels, and the certification program.
RESOURCES
ISA99 www.isa.org/isa99
NIST www.NIST.gov
ABOUT THE AUTHOR
View the online version at www.isa.org/intech/20131001.
| Copyright: | (c) 2013 International Society of Automation |
| Wordcount: | 2636 |



Parade of settlements continues for local securities firms [Indianapolis Business Journal (IN)]
Mobile Container Assessment Team Missions, Responsibilities, and Troop Leading Procedures [Army Sustainment]
Advisor News
- 2025 Top 5 Advisor Stories: From the ‘Age Wave’ to Gen Z angst
- Flexibility is the future of employee financial wellness benefits
- Bill aims to boost access to work retirement plans for millions of Americans
- A new era of advisor support for caregiving
- Millennial Dilemma: Home ownership or retirement security?
More Advisor NewsAnnuity News
- Great-West Life & Annuity Insurance Company Trademark Application for “EMPOWER BENEFIT CONSULTING SERVICES” Filed: Great-West Life & Annuity Insurance Company
- 2025 Top 5 Annuity Stories: Lawsuits, layoffs and Brighthouse sale rumors
- An Application for the Trademark “DYNAMIC RETIREMENT MANAGER” Has Been Filed by Great-West Life & Annuity Insurance Company: Great-West Life & Annuity Insurance Company
- Product understanding will drive the future of insurance
- Prudential launches FlexGuard 2.0 RILA
More Annuity NewsHealth/Employee Benefits News
Life Insurance News
- Baby On Board
- 2025 Top 5 Life Insurance Stories: IUL takes center stage as lawsuits pile up
- Private placement securities continue to be attractive to insurers
- Inszone Insurance Services Expands Benefits Department in Michigan with Acquisition of Voyage Benefits, LLC
- Affordability pressures are reshaping pricing, products and strategy for 2026
More Life Insurance News