Sectrio

Leveraging IEC 62443 for securing critical industrial assets  

By Prayukth K V
September 27, 2024
Leveraging IEC 62443 for securing critical industrial assets

Summary


Asset owners and organizations across critical industries are cognizant of the rising risks of cyberattacks impacting physical processes. The consequences of a cyberattack impacting critical industrial assets or OT (Operational Technology) could cause a cascading impact across the value chain. Today, there are several measures one can take to prevent such attacks, but a lack of standardized and structured approaches across industries and verticals is long awaited. Find out how asset owners, suppliers, and members of the value chain can leverage IEC 62443, an international standard that can help you protect your critical systems and assets.
IEC 62443

IEC 62443 is a gold standard when it comes to cybersecuring industrial infrastructure. In addition to that, a encrusted approach can be adopted using IEC 62443 and NIST CSF to provide an added layer of cybersecurity to critical assets. How can that be done, let’s find out.  

Three IEC 62443 standards can be considered for overall infrastructure protection. These are: 

  • IEC 62443-2-1: outlines the responsibility of ICS asset owners. IEC 62443-2-1:2024  spells out the asset owner security program (SP) policy and procedure requirements for an industrial automation and control system (IACS). An asset owner includes the IACS operator as well. 
  • IEC 62443-3-3: deals with technical control system requirements (SRs) associated with the seven foundational requirements (FRs) that are mentioned in IEC 62443-1-1. These include defining the requirements related to control system capability security levels, SL-C(control system). These requirements can be used along with the defined zones and conduits for the system under consideration (SuC) to develop the relevant control system target SL, SL-T(control system), for any asset. 
  • IEC 62443-4-2:2019: provides detailed technical control system component requirements (CRs) for the seven Foundational Requirements (FRs) that are described in IEC TS 62443-1-This includes defining the requirements for control system capability security levels and their components, SL-C (component). 

Also read: The Complete Guide to OT SOC

IEC 62443-1-1 defines seven Foundational Requirements (FRs) which include: 

  • Identification and authentication control (IAC) 
  • Use control (UC), 
  • System integrity (SI), 
  • Data confidentiality (DC), 
  • Restricted data flow (RDF), 
  • Timely response to events (TRE), and 
  • Resource availability (RA). 

Now lets take a look at the relevant NIST CSF recommendations.  

Under NIST CSF, we can look at these aspects that are specific to critical assets: 

NIST CSF Core Function Categories  Action specific to critical assets  
Identify  Asset Management 
Protect  Access Control  
Detect  Anomalies and events  
Respond  Respond to events appropriately  
Recover  Plan recovery to minimize business impact 

When we overlay the applicable IEC 62443 standards on NIST CSF for critical assets, we can derive a more comprehensive approach to securing these assets.  

Levels for securing critical OT assets according to IEC 62443 and NIST CSF  

Applicable standard  Derivative for critical asset protection  
IEC 62443-2-1 and NIST CSF category identify  1. Define what critical assets are and the level of security they need  
2. Maintain a current list of critical assets as per this definition 
3. If required, assign a checker (a second pair of eyes) to ensure adherence to the requirements and to enable QA for the quality of security assigned to the assets.   
4. Ensure a mechanism for updating the asset inventory  
5. Ensure clear asset ownership for critical assets  
IEC 62443-4-2:2019, IEC TS 62443-1-1  and NIST CSF category protect  1. FR: Identification and authentication control (IAC) 
2. Deploy controls that align with the principle of least privilege 
3. Ensure authenticated use with one credential per user  
4. Ensure maintenance of logs for user sessions  
5. Develop and publish an asset fair use and access control policy  
6. Deploy a stringent version of all the above controls for critical resources  
IEC 62443-3-3 and NIST CSF category protect and/or detect 1. FR: Identification and authentication control (IAC) 
2. Deploy controls that align with the principle of least privilege 
3. Ensure authenticated use with one credential per user  
4. Ensure maintenance of logs for user sessions  
5. Develop and publish an asset fair use and access control policy  
6. Deploy a stringent version of all the above controls for critical resources  
IEC 62443-2-1 and NIST CSF category detect  1. All critical asset owners to have an unambiguous understanding of anomalous events within and beyond what is flagged by a monitoring solution  
2. Have playbooks for handling such events including communication and event categorization 
3. Events to be mapped to impact and response mechanisms to be triggered  
IEC 62443-2-1, IEC TS 62443-1-1 foundational level: timely response to events NIST CSF category respond 1. Ensure timebound response to events as per event priority  
2. Ensure means to deal with false positives  
3. List of key stakeholders to be informed to be maintained and updated along with key actions for each set of stakeholders  
4. All responses should be documented along with deviations, if any  
5. Ensure testing of responses through stimulated events along with potential outcomes and business impacts if responses fail  
All the above from IEC 62443 and NIST CSF category recover  1. Have all the recovery mechanisms in place  
2. Constantly monitor infrastructure for risks and state of recovery mechanisms  
3. Ensure system integrity levels support recovery means  

Also Read: A Buyer’s Guide to OT/ICS Security Solutions

Learn more about leveraging IEC 62443 and NIST CSF to secure critical infrastructure. Talk to our compliance consultant.  

Reach out to us now.

Conduct an IEC 62443/NIST-CSF based risk assessment and gap analysis now!

Looking at checking your ICS environment for IEC 62443/NIST CSF/NIS2 compliance? Connect with our Compliance and Governance expert.   

Learn more about our ICS security solution and its capabilities around asset inventory, vulnerability management, threat management, and compliance.  

 Thinking of an ICS security training program for your employees? Talk to us for a custom package.   

Summary


Asset owners and organizations across critical industries are cognizant of the rising risks of cyberattacks impacting physical processes. The consequences of a cyberattack impacting critical industrial assets or OT (Operational Technology) could cause a cascading impact across the value chain. Today, there are several measures one can take to prevent such attacks, but a lack of standardized and structured approaches across industries and verticals is long awaited. Find out how asset owners, suppliers, and members of the value chain can leverage IEC 62443, an international standard that can help you protect your critical systems and assets.

Summary


Asset owners and organizations across critical industries are cognizant of the rising risks of cyberattacks impacting physical processes. The consequences of a cyberattack impacting critical industrial assets or OT (Operational Technology) could cause a cascading impact across the value chain. Today, there are several measures one can take to prevent such attacks, but a lack of standardized and structured approaches across industries and verticals is long awaited. Find out how asset owners, suppliers, and members of the value chain can leverage IEC 62443, an international standard that can help you protect your critical systems and assets.
Leveraging IEC 62443 for securing critical industrial assets

Read More

Protecting your critical assets is only a few steps away

Scroll to Top