IEC 62443 – Waterfall Security Solutions https://waterfall-security.com Unbreachable OT security, unlimited OT connectivity Tue, 09 Sep 2025 07:10:47 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.2 https://waterfall-security.com/wp-content/uploads/2023/09/cropped-favicon2-2-32x32.png IEC 62443 – Waterfall Security Solutions https://waterfall-security.com 32 32 Why I Wrote Power Generation OT Security: Applying and Interpreting ISA/IEC 62443 Standards https://waterfall-security.com/ot-insights-center/power/why-i-wrote-power-generation-ot-security-applying-and-interpreting-isa-iec-62443-standards/ Tue, 19 Nov 2024 13:06:03 +0000 https://waterfall-security.com/?p=28368 Power generation is a critical sector facing unique cybersecurity challenges. However, as I researched, it became clear that no document existed to bridge the gap between the general, industry-agnostic ISA/IEC 62443 standards and the specific needs of power generation facilities. In response, I decided to write this ebook.

The post Why I Wrote Power Generation OT Security: Applying and Interpreting ISA/IEC 62443 Standards appeared first on Waterfall Security Solutions.

]]>

Why I Wrote Power Generation OT Security: Applying and Interpreting ISA/IEC 62443 Standards

Power generation OT security is critical for ensuring operational resilience in the face of growing cyber threats.However, as I researched, it became clear that no document existed to bridge the gap between the general, industry-agnostic ISA/IEC 62443 standards and the specific needs of power generation facilities. In response, I decided to write this ebook.
Picture of Dr. Jesus Molina

Dr. Jesus Molina

Why I Wrote Power Generation OT Security: Applying and Interpreting ISA/IEC 62443 Standards

As a teacher in the Master’s program on Rail Cybersecurity, I’ve had the opportunity to guide rail professionals through the complexities of securing critical infrastructure. In my course, I frequently rely on the European Technical Specification TS-50701, which provides tailored cybersecurity guidance specifically for the rail industry. TS-50701 serves as an essential resource, helping rail professionals interpret and apply broader standards like ISA/IEC 62443 to the unique challenges of rail systems. Of course, the goal of TS-50701 (currently in the process of becoming a standard under PT 63452) goes beyond teaching; it aims to improve cybersecurity in rail networks by building directly from the foundation of the 62443 standards.

But this reliance on TS-50701 led me to ask a simple question: Where is the equivalent guide for power generation?

“…I decided to write this ebook as a resource for power generation professionals. It aims to simplify and clarify the application of ISA/IEC 62443 for this sector.”

The Gap

Power generation, like rail, is a critical sector facing unique cybersecurity challenges. However, as I researched, it became clear that no similar document existed to bridge the gap between the general, industry-agnostic ISA/IEC 62443 standards and the specific needs of power generation facilities.

In response, I decided to write this ebook as a resource for power generation professionals. It aims to simplify and clarify the application of ISA/IEC 62443 for this sector. While the standards are essential for Operational Technology (OT) security across industries, applying them effectively in power generation presents unique challenges that require tailored guidance.

Here’s what you’ll find inside the ebook:

  • A Consequence-Driven Approach: Learn how focusing on unacceptable outcomes and using a consequence-driven approach can enhance your risk assessments.
  • Zoning and Conduits for Power Generation: Practical guidance on structuring zones and conduits to address power generation’s specific needs.
  • Engineering-Grade Controls: Explore engineering-based controls that reduce reliance on vulnerable software solutions, helping to simplify security while maintaining robustness.
  • Introducing New Technologies: A practical approach to managing cloud computing and remote access within the standard.

Powergen OT Security eBook - Graphic

Looking Ahead: The Need for Power Generation-Specific Guidance

This ebook is a starting point. My hope is that it will spark further work towards creating a comprehensive guide, similar to TS-50701, but specifically for power generation. Such a document would bridge the gap between the broad 62443 standards and the specialized needs of this critical sector, providing engineers with a clear path for implementing cybersecurity measures.

I’ll be presenting my position on the importance of tailored training materials at the upcoming Sx25 conference. My focus will be on my experience teaching rail professionals, and the urgent need for OT cybersecurity training that prepares engineers to understand and apply cybersecurity principles in their unique operational environments. Right now, power generation lacks both a specialized approach to training and the specific guidance to make ISA/IEC 62443 actionable for its unique needs.

Download the eBook and Join the Effort

If you’re involved in power generation or OT cybersecurity, I invite you to Click here to  download the ebook and join me in pushing for the development of industry-specific resources for power generation.

About the author
Picture of Dr. Jesus Molina

Dr. Jesus Molina

Jesus Molina is Waterfall’s Director of Industrial Security. He is a security expert in both OT and IT security. A former hacker, his research on offensive security in industrial systems has been echoed by many publications and media, including Wired and NPR. Mr. Molina has acted as chair of several security organizations, including the Trusted Computing Group and the IoT Internet Consortium. He is the co-writer of the Industrial Internet Security Framework and the author of several security-related patents and academic research papers. Mr. Molina holds a M.S. and a Ph.D from the University of Maryland.
Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Why I Wrote Power Generation OT Security: Applying and Interpreting ISA/IEC 62443 Standards appeared first on Waterfall Security Solutions.

]]>
Engineering-Grade IEC 62443 – A Guide For Power Generation https://waterfall-security.com/ot-insights-center/power/engineering-grade-iec-62443-a-guide-for-power-generation/ Tue, 05 Mar 2024 08:01:11 +0000 https://waterfall-security.com/?p=19161 Join our upcoming webinar and learn about the IEC 62243 standard for powergen, how CIE can help with IEC 62443-3-2 risk assessments, and what kind of extra protection do 62443-4-2 certified components provide.

The post Engineering-Grade IEC 62443 – A Guide For Power Generation appeared first on Waterfall Security Solutions.

]]>

Engineering-Grade IEC 62443 – A Guide For Power Generation

Join our webinar for an in-depth look the IEC 62443 standard, IEC 62443-3-2 risk assessments, and why would we need 62443-4-2 certified components for power generation operations.

We will host 2 live streams of the webinar:
March 27 – 11:00 AM New York
March 28 – 9:00 AM Singapore

Engineering-Grade IEC 62443 - A guide for power generation Webinar

IEC 62443 is used widely in power generation, but some aspects of the standard are ambiguous, and others are easily confused. The Cyber-Informed Engineering (CIE) initiative, funded by the US Department of Energy, is a new way to look at IEC 62443 – a perspective that clears up a lot of confusion. Join Andrew Ginter and Jesus Molina in this webinar for a preview of a new Waterfall guide to IEC 62443 for power generation, seen through the lens of CIE

All participants will receive a copy of the new guide when it is released, shortly after the webinar.

In this webinar, you will learn:

arrow red right What are the IEC 62443 standards and which ones apply to power generation?

arrow red right How can CIE help IEC 62443-3-2 risk assessments determine Security Level targets?

arrow red right How can engineering-grade mitigations eliminate cyber threats, in addition to IEC 62443-3-3 mitigations?

arrow red right What kind of extra protection do we get from 62443-4-2 certified components?

 

About the Speaker

Picture of Andrew Ginter, Waterfall VP Industrial Security

Andrew Ginter, Waterfall VP Industrial Security

Andrew Ginter is the most widely-read author in the industrial security space, with over 20,000 copies of his first two books in print. He is a trusted advisor to the world's most secure industrial enterprises, and contributes regularly to industrial cybersecurity standards and guidance.

Picture of Dr. Jesus Molina, Director of Industrial Security

Dr. Jesus Molina, Director of Industrial Security

Jesus Molina is Waterfall’s Director of Industrial Security. He is a security expert in both OT and IT security. A former hacker, his research on offensive security in industrial systems has been echoed by many publications and media, including Wired and NPR.
Mr. Molina has acted as chair of several security organizations, including the Trusted Computing Group and the IoT Internet Consortium. He is the co-writer of the Industrial Internet Security Framework and the author of several security-related patents and academic research papers.

Share

Register Now

The post Engineering-Grade IEC 62443 – A Guide For Power Generation appeared first on Waterfall Security Solutions.

]]>
Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/webinar-recording-aveva-enabling-the-digital-transformation-of-electric-utilities-with-engineering-grade-security/ Thu, 14 Sep 2023 09:50:10 +0000 https://waterfall-security.com/?p=11244 Cyber attacks are becoming more sophisticated, cloud-based innovation is increasing attack opportunities, and governments are issuing stronger cyber regulations, such as the new European NIS2 and the new German KRITIS directives.

The post Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities appeared first on Waterfall Security Solutions.

]]>

Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities

We had a great webinar with a nice turnout. The topic was how the digital transformation of the Electric Utilities industry is unleashed once engineering-grade cybersecurity is able to protect in the industrial systems.
Picture of Waterfall team

Waterfall team

AVEVA | Webinar | Engineering Grade Security for Water Utilities

Our Webinar with Andrew Ginter of Waterfall Security Solutions and Bill McEvoy of AVEVA covered many facets of the growing inter-connectivity within the electric utilities industry, and how securing that connectivity is vital for enabling it. 

Some of the main topics discussed throughout the webinar included:

  • New tools and approaches for digitization, innovation and cost savings.
  • New cyber threats and regulations.
  • New engineering-grade solutions for cyber threats to OT systems.

Listen in >>

Once a connectivity product can be installed safely, there is little reason not to use it.

The main takeaways from the webinar focused around the increased relevance between increased connectivity, and how secure that connectivity is. The only obstacles to increase connectivity are the security implications. Once a connectivity product can be installed safely, there is little reason not to use it.

Share

Stay up to date

Subscribe to our blog and receive insights straight to your inbox

The post Webinar: AVEVA | Enabling the Digital Transformation of Electric Utilities appeared first on Waterfall Security Solutions.

]]>
How Are OT Hackers Getting IN Today? https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/how-are-ot-hackers-getting-in-today/ Wed, 12 Jul 2023 00:00:00 +0000 https://waterfall-security.com/ot-insights-center/uncategorized/how-are-ot-hackers-getting-in-today/ The post How Are OT Hackers Getting IN Today? appeared first on Waterfall Security Solutions.

]]>

Operational Technology (OT) refers to the hardware and software systems that control and monitor physical devices and processes in industries such as energy, manufacturing, transportation, and utilities. OT systems are often used in critical infrastructure and are increasingly connected to the internet, making them potential targets for hackers.

What Is OT Ransomware and Why Should You Care?

In recent years, there has been a sharp increase in cyber attacks targeting OT systems. In our recent 2023 Threat Report, we mapped out 57 cybersecurity incidents that had physical consequences out of 218 reported attacks. These events highlight the vulnerabilities of OT systems, the potential consequences of “successful” attacks, and most importantly, the fact that they are dramatically increasing each year.

OT hackers, also known as industrial control system (ICS) or SCADA (Supervisory Control and Data Acquisition) cyber attackers, typically aim to gain unauthorized access to OT networks and disrupt or manipulate critical processes. Their motivations may vary, including financial gain, espionage, activism, or sabotage.

Here are some general activities OT hackers are busy with these days:

OT hackers typically search for vulnerabilities in ICS and SCADA systems, such as outdated software, weak passwords, or insecure network configurations, as well as using open-source research to find exploits for these vulnerabilities in order to gain unauthorized access.

Finding and Exploiting OT System Vulnerabilities

Here’s an example of Hunting for ICS vulnerabilities by Cody Bernadry:

AI-Generated Malware Targeting OT Hardware

In the past, ICS hackers would require large teams to create the malware payloads that they intended to install once they hacked into the system. Most OT systems are fairly obscure when compared against common technology such as computers and smartphones, so finding hackers that are familiar with each OT system was the biggest obstacle. With the recent advent of AI that can write code, hackers can explain what they need in simple English, and then have the required code generated for them, ready for the attack.

Additionally, AI generated malware is much harder to catch, as it is considered clean when scanned by an IDS or malware detectors, since it is the first time that code is being used anywhere.

Here’s a clip from Cyber News that highlights some examples of using ChatGPT to generate malware, or simply recreating existing malware but with fresh code that can’t be detected as easily:

Social Engineering:

Sometimes, hackers don’t use any software to bypass all the safeguards, rather, they use the weakness of human nature to gain access.

Who would win:

  • The most robust firewall and IDS ever created?
    or…
  • A sweet mom with a crying baby in the background who just needs some help getting back into the system?Have a look:

This crying-baby social engineering hack shown in the video above is largely focused on getting IT credentials and info. The scope of this article is on OT hackers, so it is important to point out that most attacks on OT are initiated via the IT. So, it is totally expected that social engineering techniques focused on penetrating OT defenses would have a kill-chain that runs through the IT department.

Social Engineering Bus Hack:
As machinery and systems become more hardware and less software, does that negate the possibility of it being hacked? This hacker points out how he used knowledge combined with a unique hole puncher and thrown-out stacks of bus transfer tickets to “hack the system” and get free bus rides. Take a look:

 

Supply Chain Cyber Attacks:

Instead of engaging a target directly, hackers sometimes try to target an OT network indirectly by focusing on their supply chain of 3rd party vendors. All it takes is just one of many vendors to miss something to end up providing a “backdoor” to the entire OT network. By compromising the supply chain via 3rd parties, hackers can gain access to the targeted systems indirectly, in ways that are way more cumbersome to audit and prevent.

Here we have some examples of supply chain attacks, including an explanation of Target’s Customer Data Breach which was the result of hackers exploiting the air conditioning ICS because they had only used the free version of the malware software, and not the paid version. Once the HVAC system was hacked, the hackers used that access to install skimming software on each cash register’s credit card reader and recorded the credit card details of all customer transactions.

Have a look:

OT Ransomware: The Ultimate Goal

OT ransomware attacks are where hackers encrypt critical systems, and then demand a ransom (payment) for the decryption key which is needed to unlock everything. The kind of attacks have increasingly targeted OT systems because the “critical” aspects of their purpose are seen as applying pressure for the ransom to be paid.

The BBC did a short piece about a Norwegian company that suffered a costly ransomware attack. Have a look:

It’s important to note that the field of cybersecurity is dynamic, and new attack techniques and methods continuously emerge over time. Organizations that rely on OT systems should keep updated on the latest security best practices.

In conclusion, the activities of OT hackers pose a significant threat to operational technology systems in vital industries. The increasing number of cyber attacks targeting these systems emphasizes the vulnerabilities they face and the potential consequences of successful attacks. OT hackers often employ many other tactics than the ones mentioned above and are able to gain unauthorized access and disrupt critical processes. By understanding the tactics and activities of OT hackers, organizations can better posture their cyber defenses in order to protect their critical infrastructure and ensure the reliability and security of their operations in an increasingly interconnected world.

Real-World OT Ransomware Case Studies

Colonial Pipeline: Lessons from America’s Largest Fuel Disruption

In May 2021, the Colonial Pipeline—which supplies nearly half of the fuel to the U.S. East Coast—was forced to shut down after a ransomware attack compromised its IT systems. While the operational technology (OT) systems controlling fuel flow were not directly encrypted, the company proactively halted operations to prevent the attack from spreading, triggering the largest fuel disruption in U.S. history. Gas shortages rippled across multiple states, panic buying ensued, and the incident highlighted the cascading impact of a cyberattack on critical infrastructure.

The Colonial Pipeline attack exposed several key lessons for industrial organizations. First, IT-OT interdependencies mean that even attacks on corporate networks can halt physical operations if clear segmentation and response plans are lacking. Second, ransomware actors are now targeting critical infrastructure for financial and strategic gain, making proactive security measures essential. Finally, the incident underscores the need for secure remote access, network segmentation, and incident response planning—because when IT is compromised, OT resilience becomes the last line of defense.

Norsk Hydro: Manufacturing Resilience Under Attack

In March 2019, Norsk Hydro, one of the world’s largest aluminum producers, suffered a devastating ransomware attack that spread rapidly through its IT networks. The attack forced the company to halt or switch to manual operations across multiple plants and global facilities, significantly disrupting production. Despite the sudden impact, Norsk Hydro chose not to pay the ransom, instead relying on backups, strong incident response procedures, and transparent communication to recover operations.

The attack on Norsk Hydro highlights the critical importance of operational resilience in industrial environments. Effective segmentation between IT and OT networks, combined with manual fallback procedures, allowed the company to maintain essential functions while restoring its systems. Their response demonstrated that preparation, transparency, and a strong cybersecurity culture are as vital as the technologies themselves. The incident remains a benchmark for how manufacturers can respond to modern cyber threats without capitulating to attackers.

Water Treatment Facility Attacks: Critical Infrastructure at Risk

Cyberattacks on water treatment facilities have become a stark reminder of the vulnerabilities facing critical infrastructure. In 2021, a hacker gained remote access to a water treatment plant in Oldsmar, Florida, attempting to alter chemical levels in the drinking water to dangerous concentrations. Only the quick response of an operator prevented a potentially catastrophic public safety incident. Similar attacks worldwide, often targeting remote access points or outdated industrial control systems, demonstrate how even small facilities can become high-impact targets.

These incidents underscore the urgent need for robust cybersecurity in water and utility operations. Weak or unmonitored remote access, poor network segmentation, and reliance on legacy systems create an open door for attackers. Protecting water treatment infrastructure requires hardware-enforced remote access, continuous monitoring, and layered defenses to ensure that public health and safety are never left to chance.

Regulatory Frameworks and Compliance Requirements

As industrial organizations become increasingly connected, regulatory bodies are raising the bar for cybersecurity. Governments and industry authorities worldwide have issued standards, mandates, and best practices to help critical infrastructure operators strengthen their defenses. Compliance is not only a legal and contractual obligation but also a fundamental step toward reducing risk, protecting operations, and maintaining public trust.

From CISA in the United States to ENISA in Europe and NERC CIP for the energy sector, these frameworks establish the minimum expectations for securing operational technology (OT) environments. Compliance also ensures that your organization can respond effectively to audits, maintain certifications, and demonstrate due diligence in the event of a cyber incident.

Understanding Your Compliance Obligations

The first step toward meeting compliance requirements is knowing which regulations apply to your organization. Obligations may vary depending on your industry, geography, and the type of industrial systems you operate. Key areas often include:

  • Access Control and Authentication – Ensuring that only authorized personnel can access critical OT systems.

  • Network Segmentation and Monitoring – Isolating sensitive OT assets from IT networks and monitoring traffic for anomalies.

  • Incident Response and Reporting – Preparing for and documenting responses to cyber incidents to meet regulatory reporting timelines.

  • Data Privacy and Protection – Safeguarding operational and personal data in line with GDPR, CCPA, or sector-specific laws.

By understanding your compliance landscape and integrating it into your cybersecurity strategy, you reduce risk while avoiding costly penalties and reputational damage.

Implementing Security Controls

Implementing effective security controls is essential for protecting industrial and OT environments against evolving cyber threats. Unlike traditional IT systems, industrial control systems (ICS) and SCADA environments require tailored defenses that prioritize safety, uptime, and reliability. A layered approach—often referred to as defense in depth—ensures that if one control fails, others remain in place to mitigate risk.

Key security controls for industrial networks include:

  • Network Segmentation – Isolate OT networks from IT and external connections to minimize attack surfaces.

  • Strict Access Control – Implement role-based access, multi-factor authentication (MFA), and the principle of least privilege.

  • Continuous Monitoring and Logging – Track network activity, identify anomalies, and enable rapid response to suspicious events.

  • Patch and Vulnerability Management – Regularly update OT systems where feasible and mitigate risks for legacy or unpatchable devices.

  • Secure Remote Access – Replace traditional VPNs and jump hosts with hardware-enforced or unidirectional access solutions.

  • Backup and Recovery Plans – Maintain tested backups to ensure operational resilience in the event of an incident.

By implementing these controls in alignment with regulatory frameworks and industry best practices, organizations can significantly reduce their exposure to attacks while maintaining operational continuity.

Key Takeaways: Protecting Your OT Network from Ransomware

In conclusion, the activities of OT hackers pose a significant threat to operational technology systems in vital industries. The increasing number of cyber attacks targeting these systems emphasizes the vulnerabilities they face and the potential consequences of successful attacks. OT hackers often employ many other tactics than the ones mentioned above and are able to gain unauthorized access and disrupt critical processes. By understanding the tactics and activities of OT hackers, organizations can better posture their cyber defenses in order to protect their critical infrastructure and ensure the reliability and security of their operations in an increasingly interconnected world.

The post How Are OT Hackers Getting IN Today? appeared first on Waterfall Security Solutions.

]]>
Cybersecurity Risk Assessment using IEC 62443 | Episode 104 https://waterfall-security.com/ot-insights-center/transportation/cybersecurity-risk-assessment-using-iec-62443/ Sun, 23 Apr 2023 00:00:00 +0000 https://waterfall-security.com/ot-insights-center/uncategorized/cybersecurity-risk-assessment-using-iec-62443/ The post Cybersecurity Risk Assessment using IEC 62443 | Episode 104 appeared first on Waterfall Security Solutions.

]]>
The post Cybersecurity Risk Assessment using IEC 62443 | Episode 104 appeared first on Waterfall Security Solutions.

]]>
The Essential Guide To ISA IEC 62443 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/the-essential-guide-to-isa-iec-62443/ Sat, 11 Mar 2023 00:00:00 +0000 https://waterfall-security.com/ot-insights-center/uncategorized/the-essential-guide-to-isa-iec-62443/ The post The Essential Guide To ISA IEC 62443 appeared first on Waterfall Security Solutions.

]]>
Understanding IEC 62443: Cybersecurity for Industrial Control Systems

IEC 62443 is a global cybersecurity standard for industrial automation and control systems (IACS). It defines security requirements for system components, processes, and organizations. The standard helps reduce cyber risks by guiding asset owners, system integrators, and product suppliers on implementing secure-by-design principles and defense-in-depth strategies.

The ISA/IEC 62443 set of cyber-security standards are truly great. They are the world’s most popular, most widely applicable, and most comprehensive standards for securing industrial automation and control systems (IACS or ICS). Created by the International Society of Automation (ISA) and then accepted and co-developed by Europe’s International Electro-technical Commission (IEC), the standards were endorsed by the UN for their Cybersecurity Common Regulatory Framework in 2019. In September 2020, the new Part 3-2 of the standard was released, providing guidance on performing risk assessments on an IACS so that security countermeasures can be identified and applied.

IEC 63443 reflective vestsIn 2021, IEC members voted to make 62443 a horizontal standard, meaning it will form the basis for all future ISA and IEC industry specific industrial security standards and frameworks. Most ICS security standards are narrow in scope and tied to an industry, nation, or government body. It’s very refreshing that 62443 is completely generalized. It would be nice to say that it’s almost perfect, but automation and control technologies are changing fast, and a standard this big does have some confusing spots. This is not lost on ISA’s SP99 technical committee that writes the standard, who are hard at work on a major rewrite of several of the older sections. So, if you’re tasked with implementing IEC 62443, what are the essentials you need to know? What’s confusing, and what’s changing?

 

Speak with one of our 62443 experts  >> Contact Us >>

 

Essential Knowledge for Protecting ICS Networks

IEC 62443 is a multi-part standard, and very broad. I’m assuming that readers here will be asset owners or charged with protecting an industrial site. In that case, relevant sections to get started are:

  • 1-1, Terminology, concepts and models
  • 2-1, Security program requirements for IACS asset owners
  • 3-2, Risk assessments for system design
  • 3-3, Security requirements and security levels

These are outlined in red in the following chart in Figure 1.


IEC 62443 Standards Family Block Diagram
Figure 1: ISA/IEC 62443 Standards most relevant to industrial asset owners & operators

62443 Welder GraphicGetting access to the IEC 62443 standards does cost money, but I highly recommend grabbing the free Quick Start Guide, downloadable from the ISA. Also – membership in the ISA is less than the cost of two or three volumes of the standards, and ISA members get free access to ISA and IEC 62443 standards.

In a nutshell, implementing the standard to secure an ICS site means implementing a security program, described in 62443-2-1. To do so, a risk assessment would be carried out and any changes to the network and security design would be made, based on 62443-3-2. Based on the assessment results and design that exists, that site’s cyber defenses would be categorized into one of five levels, described in the 3-3 document. The level selected determines the degree of requirements needed to complete implementation of the security program, so secure the site to what you have determined is an acceptable level. The higher the security level, the greater the strength of the applied protection. The five levels are summarized in Table 1: IEC/ISA 62443-3-3 Security Levels.

Security Level Definition Means Resources Skills Motivation
SL-0 No special requirement or protection required
SL-1 Protection against unintentional or accidental misuse Simple Low Generic Low
SL-2 Protection against intentional misuse by simple means with few resources, general skills and low motivation
SL-3 Protection against intentional misuse by sophisticated means with moderate resources, IACS-specific knowledge, and moderate motivation Sophisticated Moderate ICS specific Moderate
SL-4 Protection against intentional misuse using sophisticated means with extensive resources, IACS-specific knowledge, and high motivation Sophisticated Extended ICS specific High

Table 1: IEC/ISA 62443-3-3 Security Levels

Effectively, 62443 lays out a roadmap to engineer cyber security defenses, and to iterate between risk assessments and system design until an acceptable level of protection is deployed. IEC 62443 security levels are all defined based on the type of threat – the most capable adversary that the system is designed to defend against. This worst-case attacker is further defined in terms of their means, resources, skills and motivation. While this all sounds great, selecting the appropriate security level is confusing, and it is unfortunately too easy to select the wrong security level as the target level for an automation system or site.

 

Would you like to speak with one of our IEC 62443 experts?  >> Click Here >>

IEC 62443 Part 3-3: Picking The Right Security Levels

Choosing a security level (SL) target is difficult in the current version of IEC 62443 Part 3-3, because in most of the 62443 series of documents, security levels are described in terms of the characteristics of the perceived adversary, and not in terms of the worst-case consequences of compromise.

In a bit more detail, IEC 62443-1-1 states that a target security level should be assigned to every network zone based on a “… consideration of the likelihood and consequences of security of a zone or conduit being compromised.” The problem is that 62443-3-3 (repeatedly) describes security levels as in Table (1) – in terms of the capabilities of the adversaries the zone must be protected against, not in terms of consequence severity. This is not entirely wrong – it is reasonable for example to look at a safety system designed to prevent an environmental catastrophe and say that this safety system deserves the highest degree of protection – SL4. The problem is that many practitioners forget this one paragraph in 1-1 and look at 3-3, where security levels are repeatedly defined in terms of the capabilities of the adversary.

IEC 62443 section 3-3 was released over a decade ago, in 2013. Back then, risk assessments based on the profile of an attacker alone were understood to be a robust method. This might make sense if you are trying to protect the information in your network, where denying access to the information systems would use the most sophisticated defenses to make it very difficult for the attacker. With industrial systems and critical infrastructure, protecting operations is key. Here the goal is to keep operations running safely, continuously, and reliably. The updated way to look at operational cyber risk is to consider that every CPU, at any level of the control system, could be compromised to mis-operate. Then consider what systems and processes pose a health and safety, or operational reliability risk, with consequences too dangerous or costly for the business or operations team to accept. It is important that the process be protected from harm, and not be solely concerned about who or what type of threat would cause that harm.

62443 coil inspectionTake the example of a small-batch distillery, renowned for their gin made from locally sourced ingredients. Being in the mountains, seasons are short and only one batch is produced per year. Any spoilage of the batch by any threat actor could bring unacceptable harm to the business, including bankruptcy. Tampering of the safety instrumented systems on the still could cause a fire, release of steam, or product. But since a very small number of staff generally stay out of the plant, have a regimented safety program, and stay safe behind a sealed door and tempered glass during operations, the greatest concern is losing their precious gin. They are mostly concerned about their local competition and the rise in the threat of criminal ransomware groups, more than they are about sophisticated ‘nation-state’ attackers.

Contrast the gin distillery to the example of a 600 MW natural gas-fed power plant. Here, mis-operation could cause not only loss of power to thousands of downstream customers, but loss of extremely long lead-time assets such as turbines, power lines, transformers and more. Further, the health and safety consequences of out-of-control rotating equipment, electric arcs, would be completely unacceptable. In some cases, a loss of 600 MW can be absorbed by the electric grid with enough excess capacity, but during times of peak demand could instead cause widespread outages over large geographical regions. The ensuing chaos on such a scale significantly endangers the public. Whether an attack is made by an unsophisticated adversary just poking around (a ‘script-kiddie’), or a highly motivated and well-resourced attacker (a ‘nation state’ group) does not really matter. The power company is expected, and mandated by regulations, to prepare their defenses accordingly. A higher security level and stronger security program should be chosen to protect a power plant than for a distillery, because of the nature of the consequences, not because of the nature of the expected adversary.

Into The Future with IEC 62443

The point is that consequences determine the security level, not the nature of the threat or the adversary. A risk assessment asking the wrong questions could lead to a naively applied security level and program. It’s good to know that the ISA is aware of this fact. About a year ago, on the Industrial Security Podcast Episode #73, Eric Cosman, chair of the ISA99 committee which authors the series of standards, mentioned that a revision to 62443 Part 3-3  is in the works, and that security levels were being re-evaluated in light of issues like this that have come up in the course of using the standards this last decade.

62443 It might sound like IEC 62443 has fatal flaws. Far from it. Last year, Alex Nicoll, co-chair of the ISA99 committee, appeared on the Industrial Security Podcast Episode #79. In it, he expressed the committee’s goal to keep up with industry changes, and the understanding that change is occurring quickly in not only automation and control, but in cyber security as well. The committee has largely achieved its goal of creating a general, widely-applicable and accepted framework for improving security in the industrial and critical infrastructure space.  He re-affirmed concerns around Security Levels and Risk Assessments, while also mentioning that new technologies like containerization, virtualization, edge devices and the cloud need to be incorporated. Alex mentioned that the strength of the standard is that it is made up of volunteers and depends on input from those with experience to ensure standard is relevant and applicable to a wide range of businesses. Applying principles is key, as fundamentals haven’t changed in 20-30 years and requires collaborative input and effort from asset owners, operators, integrators, and suppliers.

In short, the series of standards is useful and valuable. Issues have been identified with the series, and are being addressed in new versions of the standard.

 

Speak with one of our 62443 experts  >> Contact us>>

The post The Essential Guide To ISA IEC 62443 appeared first on Waterfall Security Solutions.

]]>
Risk-based Security Levels – updating ISA/IEC 62443-3-3 | Episode #79 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/risk-based-security-levels-updating-isa-iec-62443-3-3-episode-79/ Wed, 16 Mar 2022 00:00:00 +0000 https://waterfall-security.com/ot-insights-center/uncategorized/risk-based-security-levels-updating-isa-iec-62443-3-3-episode-79/ The post Risk-based Security Levels – updating ISA/IEC 62443-3-3 | Episode #79 appeared first on Waterfall Security Solutions.

]]>
The widely-used 62443-3-3 standard is being updated. One big change is making security levels risk-based. Join Alex Nicoll, co-chair of the ISA committee updating the standard, to look at what this means and how it will work.

Listen now or Download for later

Apple Podcasts Google Podcasts Spotify RSS Icon

THE INDUSTRIAL SECURITY PODCAST HOSTED BY ANDREW GINTER AND NATE NELSON AVAILABLE EVERYWHERE YOU LISTEN TO PODCASTS​

Previous episodes

The post Risk-based Security Levels – updating ISA/IEC 62443-3-3 | Episode #79 appeared first on Waterfall Security Solutions.

]]>
Complete Rewrite – API 1164 Rev 3 | Episode #78 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/complete-rewrite-api-1164-rev-3-episode-78/ Wed, 23 Feb 2022 00:00:00 +0000 https://waterfall-security.com/ot-insights-center/uncategorized/complete-rewrite-api-1164-rev-3-episode-78/ The post Complete Rewrite – API 1164 Rev 3 | Episode #78 appeared first on Waterfall Security Solutions.

]]>
Functional vs operational safety, profiles, deep connections to IEC 62443 and more. Tom Aubuchon, Principal Consultant at Ethosecure Consulting and Suzanne Lemieux, Director Operations Security and Emergency Response Policy at the American Petroleum Institute join us to look at API 1164 Rev 3 – a complete rewrite of a pioneering cybersecurity standard.

Listen now or Download for later

Apple Podcasts Google Podcasts Spotify RSS Icon

THE INDUSTRIAL SECURITY PODCAST HOSTED BY ANDREW GINTER AND NATE NELSON AVAILABLE EVERYWHERE YOU LISTEN TO PODCASTS

Previous episodes

The post Complete Rewrite – API 1164 Rev 3 | Episode #78 appeared first on Waterfall Security Solutions.

]]>
Stronger & Faster – ISA/IEC 62443 | Episode #73 https://waterfall-security.com/ot-insights-center/ot-cybersecurity-insights-center/stronger-faster-isa-iec-62443-episode-73/ Tue, 07 Dec 2021 00:00:00 +0000 https://waterfall-security.com/ot-insights-center/uncategorized/stronger-faster-isa-iec-62443-episode-73/ The post Stronger & Faster – ISA/IEC 62443 | Episode #73 appeared first on Waterfall Security Solutions.

]]>
The IEC 62443 security standards are evolving. Eric Cosman, co-chair of the ISA SP-99 committee that creates the 62443 standards joins us in this episode. Eric looks at how experience using the 62443 standards is driving change in a number of key areas.

Listen now or Download for later

Apple Podcasts Google Podcasts Spotify RSS Icon

THE INDUSTRIAL SECURITY PODCAST HOSTED BY ANDREW GINTER AND NATE NELSON AVAILABLE EVERYWHERE YOU LISTEN TO PODCASTS​

Previous episodes

The post Stronger & Faster – ISA/IEC 62443 | Episode #73 appeared first on Waterfall Security Solutions.

]]>