# Industrial Automation and Control Systems (IACS) Cybersecurity Standard
## 1. Introduction
### 1.1 Purpose
This document establishes the cybersecurity standard for industrial automation and control systems (IACS) at [Refinery Name]. It is based on the ISA-62443 series of standards, specifically addressing Security Level 1 (SL-1) and Security Level 2 (SL-2) requirements. This standard also incorporates elements from NIST SP 800-82, NERC CIP-006, and CFATs to ensure comprehensive coverage of cybersecurity controls.
### 1.2 Scope
This standard applies to all IACS within [Refinery Name], including but not limited to Emerson, Yokogawa, Schneider, Allen Bradley, and Honeywell systems. It covers both greenfield implementations and brownfield upgrades.
## 2. Access Control
### 2.1 Identification and Authentication
**Scope**: This section covers the requirements for uniquely identifying and authenticating all users (humans, software processes, and devices) attempting to access the IACS.
#### 2.1.1 SL-1 Requirements
- All human users shall have a unique identifier (ID) and authenticator (e.g., password, token) before being granted access to the IACS.
- Default passwords on all devices and software shall be changed before being put into production.
#### 2.1.2 SL-2 Requirements
- Multi-factor authentication shall be implemented for all human users accessing critical systems.
- Machine-to-machine authentication shall be implemented using cryptographic methods (e.g., TLS certificates).
- Failed authentication attempts shall be logged and alerts generated after a defined threshold.
**Technical Implementation**:
- Configure Active Directory or LDAP for centralized user management.
- Implement a password policy enforcing complexity, history, and expiration.
- Deploy a multi-factor authentication solution compatible with the IACS environment (e.g., RSA SecurID, Duo Security).
**Compliance References**:
- ISA-62443-3-3: SR 1.1, SR 1.2, SR 1.5, SR 1.7
- NIST SP 800-82 Rev. 2: 6.2.1
- NERC CIP-007-6: R5
### 2.2 Use Control
**Scope**: This section defines the controls for enforcing the assigned privileges of an authenticated user and preventing unauthorized use of the IACS.
#### 2.2.1 SL-1 Requirements
- Access to IACS functions and data shall be restricted based on an individual's role and responsibilities.
- Shared accounts shall be prohibited except where technically necessary, and their use shall be logged and monitored.
#### 2.2.2 SL-2 Requirements
- The principle of least privilege shall be enforced for all user accounts.
- All privileged actions shall be logged and monitored.
- Session lock shall be implemented on all workstations after a period of inactivity.
**Technical Implementation**:
- Implement role-based access control (RBAC) in the IACS.
- Configure session timeout settings on all workstations and servers.
- Deploy a privileged access management (PAM) solution for managing and auditing privileged accounts.
**Compliance References**:
- ISA-62443-3-3: SR 2.1, SR 2.2, SR 2.3
- NIST SP 800-82 Rev. 2: 6.2.2
- NERC CIP-004-6: R4
## 3. System Integrity
### 3.1 Communication Integrity
**Scope**: This section covers the protection of the integrity of network communication within the IACS and between the IACS and external systems.
#### 3.1.1 SL-1 Requirements
- Critical data transmitted over untrusted networks shall be protected against unauthorized changes.
- Network segmentation shall be implemented to separate the IACS from business networks.
#### 3.1.2 SL-2 Requirements
- All communication within the IACS and between the IACS and external systems shall use cryptographic mechanisms to detect unauthorized changes.
- A demilitarized zone (DMZ) shall be implemented between the IACS network and external networks.
**Technical Implementation**:
- Deploy firewalls and configure access control lists (ACLs) to enforce network segmentation.
- Implement VLANs to logically separate different parts of the IACS network.
- Use IPsec or TLS for encrypting critical data transmissions.
- Configure intrusion detection/prevention systems (IDS/IPS) to monitor for unauthorized changes.
**Compliance References**:
- ISA-62443-3-3: SR 3.1, SR 3.8
- NIST SP 800-82 Rev. 2: 5.1, 5.2
- NERC CIP-005-5: R1
### 3.2 System Hardening
**Scope**: This section defines the requirements for reducing the attack surface of IACS components through system hardening techniques.
#### 3.2.1 SL-1 Requirements
- All unnecessary services, applications, and network ports shall be disabled or removed.
- Anti-malware software shall be installed and maintained on all applicable IACS components.
#### 3.2.2 SL-2 Requirements
- Host-based firewalls shall be implemented on all IACS servers and workstations.
- Application whitelisting shall be implemented on all IACS servers and workstations.
- All IACS components shall undergo regular vulnerability assessments and be patched according to a defined process.
**Technical Implementation**:
- Develop and maintain baseline configurations for all IACS components.
- Use automated tools (e.g., Microsoft SCCM, Ansible) to deploy and maintain system configurations.
- Implement application whitelisting solutions (e.g., AppLocker, Carbon Black).
- Deploy and configure host-based firewalls (e.g., Windows Firewall, iptables).
- Establish a vulnerability management program, including regular scanning and a patching process.
**Compliance References**:
- ISA-62443-3-3: SR 3.4, SR 3.5, SR 3.7
- NIST SP 800-82 Rev. 2: 6.2.6, 6.2.7
- NERC CIP-007-6: R1, R2, R3
## 4. Data Confidentiality
### 4.1 Information Confidentiality
**Scope**: This section covers the protection of sensitive information at rest and in transit within the IACS environment.
#### 4.1.1 SL-1 Requirements
- Sensitive data shall be identified and classified according to its criticality and sensitivity.
- Access to sensitive data shall be restricted based on the principle of least privilege.
#### 4.1.2 SL-2 Requirements
- Encryption shall be used to protect sensitive data at rest on removable media and mobile devices.
- Cryptographic key management processes shall be implemented to secure and manage encryption keys.
**Technical Implementation**:
- Implement data classification tools and processes.
- Use file system encryption (e.g., BitLocker, LUKS) for protecting sensitive data at rest.
- Deploy a key management solution for managing cryptographic keys.
- Configure access controls to restrict access to sensitive data based on user roles.
**Compliance References**:
- ISA-62443-3-3: SR 4.1, SR 4.2, SR 4.3
- NIST SP 800-82 Rev. 2: 6.2.1.3
- NERC CIP-011-2: R1
## 5. Restricted Data Flow
### 5.1 Network Segmentation and Segregation
**Scope**: This section defines the requirements for controlling the flow of information within the IACS and between the IACS and other connected systems.
#### 5.1.1 SL-1 Requirements
- The IACS network shall be logically segmented from the enterprise network.
- Access between network segments shall be controlled using firewalls or other network security devices.
#### 5.1.2 SL-2 Requirements
- The IACS network shall be further segmented into zones based on criticality and function.
- A demilitarized zone (DMZ) shall be implemented for secure communication between the IACS and external networks.
- Data diodes or unidirectional gateways shall be used for one-way communication where applicable.
**Technical Implementation**:
- Implement VLANs to create logical network segments.
- Deploy next-generation firewalls to control traffic between network segments.
- Use virtual routing and forwarding (VRF) for network isolation where applicable.
- Implement data diodes for securing critical one-way data flows.
**Compliance References**:
- ISA-62443-3-3: SR 5.1, SR 5.2
- NIST SP 800-82 Rev. 2: 5.1, 5.2
- NERC CIP-005-5: R1
## 6. Timely Response to Events
### 6.1 Auditing and Accountability
**Scope**: This section covers the requirements for creating, protecting, and analyzing audit records for security-relevant events within the IACS.
#### 6.1.1 SL-1 Requirements
- Security-relevant events shall be logged on all IACS components where technically feasible.
- Audit logs shall be protected from unauthorized access, modification, and deletion.
#### 6.1.2 SL-2 Requirements
- A centralized log management system shall be implemented to collect and analyze audit logs from all IACS components.
- Automated alerting shall be configured for critical security events.
- Time synchronization shall be implemented across all IACS components to ensure accurate event correlation.
**Technical Implementation**:
- Configure local logging on all IACS components.
- Implement a Security Information and Event Management (SIEM) system (e.g., Splunk, ELK stack) for centralized log collection and analysis.
- Deploy Network Time Protocol (NTP) servers for time synchronization.
- Develop and implement alert rules for critical security events.
**Compliance References**:
- ISA-62443-3-3: SR 6.1, SR 6.2
- NIST SP 800-82 Rev. 2: 6.2.8
- NERC CIP-007-6: R4
### 6.2 Incident Response and Recovery
**Scope**: This section defines the requirements for detecting, responding to, and recovering from cybersecurity incidents affecting the IACS.
#### 6.2.1 SL-1 Requirements
- An incident response plan shall be developed and maintained.
- Incident response roles and responsibilities shall be defined and communicated.
#### 6.2.2 SL-2 Requirements
- Regular incident response drills shall be conducted to test the effectiveness of the incident response plan.
- Automated tools shall be implemented to support incident detection and response.
- A recovery plan shall be developed and tested to ensure timely restoration of IACS operations after an incident.
**Technical Implementation**:
- Develop and maintain an incident response plan specific to the IACS environment.
- Implement automated incident detection tools (e.g., SIEM correlation rules, IDS/IPS).
- Establish an incident response team with defined roles and responsibilities.
- Conduct regular tabletop exercises and technical drills to test incident response procedures.
- Implement backup and recovery solutions suitable for the IACS environment.
**Compliance References**:
- ISA-62443-3-3: SR 6.4, SR 7.3, SR 7.4
- NIST SP 800-82 Rev. 2: 6.2.9
- NERC CIP-008-5: R1, R2, R3
## 7. Resource Availability
### 7.1 Backup and Recovery
**Scope**: This section covers the requirements for ensuring the availability of critical IACS components and data through backup and recovery processes.
#### 7.1.1 SL-1 Requirements
- Regular backups of critical IACS data and configurations shall be performed.
- Backup media shall be stored in a secure, off-site location.
#### 7.1.2 SL-2 Requirements
- Automated backup solutions shall be implemented for all critical IACS components.
- Backup integrity and recoverability shall be regularly tested.
- A comprehensive disaster recovery plan shall be developed and tested annually.
**Technical Implementation**:
- Implement an automated backup solution compatible with the IACS environment.
- Configure regular backups of critical data, system configurations, and application settings.
- Establish secure off-site storage for backup media.
- Conduct regular restore tests to verify backup integrity and recoverability.
- Develop and maintain a disaster recovery plan specific to the IACS environment.
**Compliance References**:
- ISA-62443-3-3: SR 7.3, SR 7.4
- NIST SP 800-82 Rev. 2: 6.2.3.11
- NERC CIP-009-6: R1
### 7.2 Network and System Monitoring
**Scope**: This section defines the requirements for monitoring the health, performance, and security of IACS networks and systems.
#### 7.2.1 SL-1 Requirements
- Critical IACS components shall be monitored for availability and performance.
- Network traffic shall be monitored for unusual patterns or unauthorized access attempts.
#### 7.2.2 SL-2 Requirements
- A network and security operations center (NOC/SOC) shall be established to provide 24/7 monitoring of the IACS environment.
- Automated alerting shall be implemented for critical system and security events.
- Regular vulnerability assessments shall be conducted on IACS components.
**Technical Implementation**:
- Implement network monitoring tools (e.g., SolarWinds, Nagios) to monitor IACS component health and performance.
- Deploy network traffic analysis tools (e.g., Wireshark, Zeek) for monitoring network communications.
- Establish a NOC/SOC with appropriate staffing and tools for continuous monitoring.
- Configure automated alerts for critical events using the SIEM or monitoring tools.
- Implement a vulnerability management program, including regular scans and risk assessments.
**Compliance References**:
- ISA-62443-3-3: SR 3.2, SR 6.1
- NIST SP 800-82 Rev. 2: 6.2.6.1
- NERC CIP-007-6: R4
## 8. Continuous Improvement
### 8.1 Security Program Management
**Scope**: This section covers the requirements for maintaining and improving the overall cybersecurity posture of the IACS environment through ongoing program management.
#### 8.1.1 SL-1 Requirements
- A cybersecurity policy specific to the IACS environment shall be developed and maintained.
- Roles and responsibilities for IACS cybersecurity shall be clearly defined and communicated.
#### 8.1.2 SL-2 Requirements
- A formal risk assessment process shall be implemented and conducted annually for the IACS environment.
- Key Performance Indicators (KPIs) and Key Risk Indicators (KRIs) shall be established and regularly reviewed to measure the effectiveness of the cybersecurity program.
- An IACS cybersecurity awareness and training program shall be implemented for all relevant personnel.
**Technical Implementation**:
- Develop and maintain IACS-specific cybersecurity policies and procedures.
- Implement a risk assessment methodology tailored to the IACS environment.
- Establish a set of cybersecurity KPIs and KRIs, and implement tools to track and report on these metrics.
- Develop and deliver role-based cybersecurity training for IACS personnel.
- Conduct regular cybersecurity program reviews and audits to identify areas for improvement.
**Compliance References**:
- ISA-62443-2-1: 4.3.2, 4.3.3, 4.3.4
- NIST SP 800-82 Rev. 2: 6.1
- NERC CIP-003-7: R1, R2