ДСТУ EN IEC 62443-4-2:2022 Безопасность систем промышленной автоматизации и управления. Часть 4-2. Технические требования по безопасности для компонентов IACS (EN IEC 62443-4-2:2019, IDT; IEC 62443-4-2:2019,...

Данный документ доступнен в тарифе «ВСЕ ВКЛЮЧЕНО»

У Вас есть вопросы по документу? Мы рады на них ответить!Перечень бесплатных документовОбнаружили ошибку в документе или на сайте? Пожалуйста, напишите нам об этом!Оставить заявку на документ


ДСТУ EN IEC 62443-4-2:2022
(EN IEC 62443-4-2:2019, IDT; IEC 62443-4-2:2019, IDT)

Безпека систем промислової автоматизації та управління. Частина 4-2. Технічні вимоги щодо безпеки для компонентів IACS

 
   
 
 
     
Не є офіційним виданням.
Офіційне видання розповсюджує національний орган стандартизації
(ДП «УкрНДНЦ» http://uas.gov.ua)

Contents

Forewords

Introduction

1 Scope

2 Normative references

3 Terms, definitions, abbreviated terms, acronyms, and conventions

3.1 Terms and definitions

3.2 Abbreviated terms and acronyms

3.3 Conventions

4 Common component security constraints

4.1 Overview

4.2 CCSC 1: Support of essential functions

4.3 CCSC 2: Compensating countermeasures

4.4 CCSC 3: Least privilege

4.5 CCSC 4: Software development process

5 FR 1- Identification and authentication control

5.1 Purpose and SL- C(IAC) descriptions

5.2 Rationale

5.3 CR 1.1- Human user identification and authentication

5.3.1 Requirement

5.3.2 Rationale and supplemental guidance

5.3.3 Requirement enhancements

5.3.4 Security levels

5.4 CR 1.2- Software process and device identification and authentication

5.4.1 Requirement

5.4.2 Rationale and supplemental guidance

5.4.3 Requirement enhancements

5.4.4 Security levels

5.5 CR 1.3- Account management

5.5.1 Requirement

5.5.2 Rationale and supplemental guidance

5.5.3 Requirement enhancements

5.5.4 Security levels

5.6 CR 1.4- Identifier management

5.6.1 Requirement

5.6.2 Rationale and supplemental guidance

5.6.3 Requirement enhancements

5.6.4 Security levels

5.7 CR 1.5- Authenticator management

5.7.1 Requirement

5.7.2 Rationale and supplemental guidance

5.7.3 Requirement enhancements

5.7.4 Security levels

5.8 CR 1.6- Wireless access management

5.9 CR 1.7 - Strength of password- based authentication

5.9.1 Requirement

5.9.2 Rationale and supplemental guidance

5.9.3 Requirement enhancements

5.9.4 Security levels

5.10 CR 1.8 - Public key infrastructure certificates

5.10.1 Requirement

5.10.2 Rationale and supplemental guidance

5.10.3 Requirement enhancements

5.10.4 Security levels

5.11 CR 1.9 - Strength of public key- based authentication

5.11.1 Requirement

5.11.2 Rationale and supplemental guidance

5.11.3 Requirement enhancements

5.11.4 Security levels

5.12 CR 1.10 - Authenticator feedback

5.12.1 Requirement

5.12.2 Rationale and supplemental guidance

5.12.3 Requirement enhancements

5.12.4 Security levels

5.13 CR 1.11 - Unsuccessful login attempts

5.13.1 Requirement

5.13.2 Rationale and supplemental guidance

5.13.3 Requirement enhancements

5.13.4 Security levels

5.14 CR 1.12 - System use notification

5.14.1 Requirement

5.14.2 Rationale and supplemental guidance

5.14.3 Requirement enhancements

5.14.4 Security levels

5.15 CR 1.13 - Access via untrusted networks

5.16 CR 1.14 - Strength of symmetric key- based authentication

5.16.1 Requirement

5.16.2 Rationale and supplemental guidance

5.16.3 Requirement enhancements

5.16.4 Security levels

6 FR 2 - Use control

6.1 Purpose and SL- C(UC) descriptions

6.2 Rationale

6.3 CR 2.1 - Authorization enforcement

6.3.1 Requirement

6.3.2 Rationale and supplemental guidance

6.3.3 Requirement enhancements

6.3.4 Security levels

6.4 CR 2.2 - Wireless use control

6.4.1 Requirement

6.4.2 Rationale and supplemental guidance

6.4.3 Requirement enhancements

6.4.4 Security levels

6.5 CR 2.3- Use control for portable and mobile devices

6.6 CR 2.4- Mobile code

6.7 CR 2.5- Session lock

6.7.1 Requirement

6.7.2 Rationale and supplemental guidance

6.7.3 Requirement enhancements

6.7.4 Security levels

6.8 CR 2.6- Remote session termination

6.8.1 Requirement

6.8.2 Rationale and supplemental guidance

6.8.3 Requirement enhancements

6.8.4 Security levels

6.9 CR 2.7- Concurrent session control

6.9.1 Requirement

6.9.2 Rationale and supplemental guidance

6.9.3 Requirement enhancements

6.9.4 Security levels

6.10 CR 2.8- Auditable events

6.10.1 Requirement

6.10.2 Rationale and supplemental guidance

6.10.3 Requirement enhancements

6.10.4 Security levels

6.11 CR 2.9- Audit storage capacity

6.11.1 Requirement

6.11.2 Rationale and supplemental guidance

6.11.3 Requirement enhancements

6.11.4 Security levels

6.12 CR 2.10- Response to audit processing failures

6.12.1 Requirement

6.12.2 Rationale and supplemental guidance

6.12.3 Requirement enhancements

6.12.4 Security levels

6.13 CR 2.11- Timestamps

6.13.1 Requirement

6.13.2 Rationale and supplemental guidance

6.13.3 Requirement enhancements

6.13.4 Security levels

6.14 CR 2.12- Non-repudiation

6.14.1 Requirement

6.14.2 Rationale and supplemental guidance

6.14.3 Requirement enhancements

6.14.4 Security levels

6.15 CR 2.13- Use of physical diagnostic and test interfaces

7 FR 3- System integrity

7.1 Purpose and SL- C(Si) descriptions

7.2 Rationale

7.3 CR 3.1 - Communication integrity

7.3.1 Requirement

7.3.2 Rationale and supplemental guidance

7.3.3 Requirement enhancements

7.3.4 Security levels

7.4 CR 3.2 - Protection from malicious code

7.5 CR 3.3 - Security functionality verification

7.5.1 Requirement

7.5.2 Rationale and supplemental guidance

7.5.3 Requirement enhancements

7.5.4 Security levels

7.6 CR 3.4 - Software and information integrity

7.6.1 Requirement

7.6.2 Rationale and supplemental guidance

7.6.3 Requirement enhancements

7.6.4 Security levels

7.7 CR 3.5 - Input validation

7.7.1 Requirement

7.7.2 Rationale and supplemental guidance

7.7.3 Requirement enhancements

7.7.4 Security levels

7.8 CR 3.6 - Deterministic output

7.8.1 Requirement

7.8.2 Rationale and supplemental guidance

7.8.3 Requirement enhancements

7.8.4 Security levels

7.9 CR 3.7 - Error handling

7.9.1 Requirement

7.9.2 Rationale and supplemental guidance

7.9.3 Requirement enhancements

7.9.4 Security levels

7.10 CR 3.8 - Session integrity

7.10.1 Requirement

7.10.2 Rationale and supplemental guidance

7.10.3 Requirement enhancements

7.10.4 Security levels

7.11 CR 3.9 - Protection of audit information

7.11.1 Requirement

7.11.2 Rationale and supplemental guidance

7.11.3 Requirement enhancements

7.11.4 Security levels

7.12 CR 3.10 - Support for updates

7.13 CR 3.11 - Physical tamper resistance and detection

7.14 CR 3.12 - Provisioning product supplier roots of trust

7.15 CR 3.13 - Provisioning asset owner roots of trust

7.16 CR 3.14 - Integrity of the boot process

8 FR 4 - Data confidentiality

8.1 Purpose and SL- C(DC) descriptions

8.2 Rationale

8.3 CR 4.1 - Information confidentiality

8.3.1 Requirement

8.3.2 Rationale and supplemental guidance

8.3.3 Requirement enhancements

8.3.4 Security levels

8.4 CR 4.2 - Information persistence

8.4.1 Requirement

8.4.2 Rationale and supplemental guidance

8.4.3 Requirement enhancements

8.4.4 Security levels

8.5 CR 4.3 - Use of cryptography

8.5.1 Requirement

8.5.2 Rationale and supplemental guidance

8.5.3 Requirement enhancements

8.5.4 Security levels

9 FR 5 - Restricted data flow

9.1 Purpose and SL- C(RDF) descriptions

9.2 Rationale

9.3 CR 5.1 - Network segmentation

9.3.1 Requirement

9.3.2 Rationale and supplemental guidance

9.3.3 Requirement enhancements

9.3.4 Security levels

9.4 CR 5.2 - Zone boundary protection

9.5 CR 5.3 - General-purpose person- to- person communication restrictions

9.6 CR 5.4 - Application partitioning

10 FR 6 - Timely response to events

10.1 Purpose and SL- C(TRE) descriptions

10.2 Rationale

10.3 CR 6.1 - Audit log accessibility

10.3.1 Requirement

10.3.2 Rationale and supplemental guidance

10.3.3 Requirement enhancements

10.3.4 Security levels

10.4 CR 6.2 - Continuous monitoring

10.4.1 Requirement

10.4.2 Rationale and supplemental guidance

10.4.3 Requirement enhancements

10.4.4 Security levels

11 FR 7 - Resource availability

11.1 Purpose and SL- C(RA) descriptions

11.2 Rationale

11.3 CR 7.1 - Denial of service protection

11.3.1 Requirement

11.3.2 Rationale and supplemental guidance

11.3.3 Requirement enhancements

11.3.4 Security levels

11.4 CR 7.2 - Resource management

11.4.1 Requirement

11.4.2 Rationale and supplemental guidance

11.4.3 Requirement enhancements

11.4.4 Security levels

11.5 CR 7.3 - Control system backup

11.5.1 Requirement

11.5.2 Rationale and supplemental guidance

11.5.3 Requirement enhancements

11.5.4 Security levels

11.6 CR 7.4 - Control system recovery and reconstitution

11.6.1 Requirement

11.6.2 Rationale and supplemental guidance

11.6.3 Requirement enhancements

11.6.4 Security levels

11.7 CR 7.5 - Emergency power

11.8 CR 7.6 - Network and security configuration settings

11.8.1 Requirement

11.8.2 Rationale and supplemental guidance

11.8.3 Requirement enhancements

11.8.4 Security levels

11.9 CR 7.7 - Least functionality

11.9.1 Requirement

11.9.2 Rationale and supplemental guidance

11.9.3 Requirement enhancements

11.9.4 Security levels

11.10 CR 7.8 - Control system component inventory

11.10.1 Requirement

11.10.2 Rationale and supplemental guidance

11.10.3 Requirement enhancements

11.10.4 Security levels

12 Software application requirements

12.1 Purpose

12.2 SAR 2.4 - Mobile code

12.2.1 Requirement

12.2.2 Rationale and supplemental guidance

12.2.3 Requirement enhancements

12.2.4 Security levels

12.3 SAR 3.2 - Protection from malicious code

12.3.1 Requirement

12.3.2 Rationale and supplemental guidance

12.3.3 Requirement enhancements

12.3.4 Security levels

13 Embedded device requirements

13.1 Purpose

13.2 EDR 2.4 - Mobile code

13.2.1 Requirement

13.2.2 Rationale and supplemental guidance

13.2.3 Requirement enhancements

13.2.4 Security levels

13.3 EDR 2.13 - Use of physical diagnostic and test interfaces

13.3.1 Requirement

13.3.2 Rationale and supplemental guidance

13.3.3 Requirement enhancements

13.3.4 Security levels

13.4 EDR 3.2 - Protection from malicious code

13.4.1 Requirement

13.4.2 Rationale and supplemental guidance

13.4.3 Requirement enhancements

13.4.4 Security levels

13.5 EDR 3.10 - Support for updates

13.5.1 Requirement

13.5.2 Rationale and supplemental guidance

13.5.3 Requirement enhancements

13.5.4 Security levels

13.6 EDR 3.11 - Physical tamper resistance and detection

13.6.1 Requirement

13.6.2 Rationale and supplemental guidance

13.6.3 Requirement enhancements

13.6.4 Security levels

13.7 EDR 3.12 - Provisioning product supplier roots of trust

13.7.1 Requirement

13.7.2 Rationale and supplemental guidance

13.7.3 Requirement enhancements

13.7.4 Security levels

13.8 EDR 3.13 - Provisioning asset owner roots of trust

13.8.1 Requirement

13.8.2 Rationale and supplemental guidance

13.8.3 Requirement enhancements

13.8.4 Security levels

13.9 EDR 3.14 - Integrity of the boot process

13.9.1 Requirement

13.9.2 Rationale and supplemental guidance

13.9.3 Requirement enhancements

13.9.4 Security levels

14 Host device requirements

14.1 Purpose

14.2 HDR 2.4 - Mobile code

14.2.1 Requirement

14.2.2 Rationale and supplemental guidance

14.2.3 Requirement enhancements

14.2.4 Security levels

14.3 HDR 2.13 - Use of physical diagnostic and test interfaces

14.3.1 Requirement

14.3.2 Rationale and supplemental guidance

14.3.3 Requirement enhancements

14.3.4 Security levels

14.4 HDR 3.2 - Protection from malicious code

14.4.1 Requirement

14.4.2 Rationale and supplemental guidance

14.4.3 Requirement enhancements

14.4.4 Security levels

14.5 HDR 3.10 - Support for updates

14.5.1 Requirement

14.5.2 Rationale and supplemental guidance

14.5.3 Requirement enhancements

14.5.4 Security levels

14.6 HDR 3.11 - Physical tamper resistance and detection

14.6.1 Requirement

14.6.2 Rationale and supplemental guidance

14.6.3 Requirement enhancements

14.6.4 Security levels

14.7 HDR 3.12 - Provisioning product supplier roots of trust

14.7.1 Requirement

14.7.2 Rationale and supplemental guidance

14.7.3 Requirement enhancements

14.7.4 Security levels

14.8 HDR 3.13 - Provisioning asset owner roots of trust

14.8.1 Requirement

14.8.2 Rationale and supplemental guidance

14.8.3 Requirement enhancements

14.8.4 Security levels

14.9 HDR 3.14 - Integrity of the boot process

14.9.1 Requirement

14.9.2 Rationale and supplemental guidance

14.9.3 Requirement enhancements

14.9.4 Security levels

15 Network device requirements

15.1 Purpose

15.2 NDR 1.6 - Wireless access management

15.2.1 Requirement

15.2.2 Rationale and supplemental guidance

15.2.3 Requirement enhancements

15.2.4 Security levels

15.3 NDR 1.13 - Access via untrusted networks

15.3.1 Requirement

15.3.2 Rationale and supplemental guidance

15.3.3 Requirement enhancements

15.3.4 Security levels

15.4 NDR 2.4 - Mobile code

15.4.1 Requirement

15.4.2 Rationale and supplemental guidance

15.4.3 Requirement enhancements

15.4.4 Security levels

15.5 NDR 2.13 - Use of physical diagnostic and test interfaces

15.5.1 Requirement

15.5.2 Rationale and supplemental guidance

15.5.3 Requirement enhancements

15.5.4 Security levels

15.6 NDR 3.2 - Protection from malicious code

15.6.1 Requirement

15.6.2 Rationale and supplemental guidance

15.6.3 Requirement enhancements

15.6.4 Security levels

15.7 NDR 3.10 - Support for updates

15.7.1 Requirement

15.7.2 Rationale and supplemental guidance

15.7.3 Requirement enhancements

15.7.4 Security levels

15.8 NDR 3.11 - Physical tamper resistance and detection

15.8.1 Requirement

15.8.2 Rationale and supplemental guidance

15.8.3 Requirement enhancements

15.8.4 Security levels

15.9 NDR 3.12 - Provisioning product supplier roots of trust

15.9.1 Requirement

15.9.2 Rationale and supplemental guidance

15.9.3 Requirement enhancements

15.9.4 Security levels

15.10 NDR 3.13 - Provisioning asset owner roots of trust

15.10.1 Requirement

15.10.2 Rationale and supplemental guidance

15.10.3 Requirement enhancements

15.10.4 Security levels

15.11 NDR 3.14 - Integrity of the boot process

15.11.1 Requirement

15.11.2 Rationale and supplemental guidance

15.11.3 Requirement enhancements

15.11.4 Security levels

15.12 NDR 5.2 - Zone boundary protection

15.12.1 Requirement

15.12.2 Rationale and supplemental guidance

15.12.3 Requirement enhancements

15.12.4 Security levels

15.13 NDR 5.3 - General purpose, person- to- person communication restrictions

15.13.1 Requirement

15.13.2 Rationale and supplemental guidance

15.13.3 Requirement enhancements

15.13.4 Security levels

Annex A (informative) Device categories

A.1 General

A.2 Device category: embedded device

A.2.1 Programmable logic controller (PLC)

A.2.2 Intelligent electronic device (IED)

A.3 Device category: network device

A.3.1 Switch

A.3.2 Virtual private network (VPN) terminator

A.4 Device category: host device/application

A.4.1 Operator workstation

A.4.2 Data historian

Annex B (informative) Mapping of CRs and REs to FR SLs 1- 4

B.1 Overview

B.2 SL mapping table

Bibliography

Полная версия документа доступна в тарифе «ВСЕ ВКЛЮЧЕНО».

Войти в Личный кабинет Подробнее о тарифах

БУДСТАНДАРТ Online