NATF__The NATF criteria and questionnaire update - mappings to certifications (2024)
NATF__The NATF criteria and questionnaire update - mappings to certifications (2024)
Update:
Mappings to Certifications
May 29, 2024
NATF does not endorse specific solution providers and provides the
webinar content for entity awareness of available resources.
If you put a question or comment in the chat or Q&A but want to remain anonymous,
please open with your request
4
Open Distribution for Supply Chain Materials
Agenda and Today’s Presenters
Opening remarks –
Thomas Galloway, President and CEO, NATF
NATF Supply Chain Criteria and Questionnaire Updates
David James Earley, Program Manager Cybersecurity & Supply Chain, NATF
Obtaining Assurance with Certifications –
Andre Ristaino, Managing Director, Global Consortia and Conformity
Assessment Programs, International Society of Automation (ISA)
5
Open Distribution for Supply Chain Materials
Opening Remarks
Tom Galloway,
NATF President and CEO
Tom Galloway
NATF President and CEO
Member Types
IOUs
Federal/Provincial
Cooperatives
State/Municipal
ISOs/RTOs
Coverage (US/Canada)
~85% miles 100 kV+
~90% net peak demand
11
Open Distribution for Supply Chain Materials
Objectives of NATF Supply Chain Initiatives
Security
Identify and address security risks introduced via supply chain
Industry Convergence
Achieve industry and supplier convergence on an approach (NATF Model) to
facilitate assessment of suppliers’ security posture
Compliance
Implementation guidance to meet supply chain related CIP standards
Collect Information
Includes a scoring
mechanism
https://www.natf.net/industry-
initiatives/supply-chain-industry-
coordination
26
Open Distribution for Supply Chain Materials
International Society of Automation
www.isasecure.org
29 May 2024
• Mr. Ristaino directs ISA’s consortiums and alliances, including, ISA Security Compliance Institute, ISA
Wireless Compliance Institute, ISAGCA, ICS4ICS; 150 combined companies with over $1.25 trillion of
turnover.
• Prior to ISA, Mr. Ristaino held positions at NEMA, Renaissance Worldwide and, Deloitte’s Advanced
Manufacturing Technology Group where he was a recognized leader in system lifecycle
methodologies.
• Mr. Ristaino earned a BS in Business Management from the University of Maryland, College Park
and an MS in Applied Computing from the American University in Washington DC with a focus on
expert systems and artificial intelligence.
[email protected]
ISA Automation Cybersecurity Leadership
ISASecure - ISA/IEC 62443 cybersecurity certification of COTS products, supplier
development processes and automation at asset owner operating sites. Established 2007.
45+ companies www.isasecure.org
ISAGCA - Bridge the gap between ISA/IEC 62443 standards and market adoption. Lead
cybersecurity culture transformation.
60+ companies https://isagca.org
ICS4ICS – Incident Command System for Industrial Control Systems (ICS4ICS) credentials
incident leaders & trains teams for responding to cyber attacks on automation in critical
infrastructure. Collaborates with FEMA and CISA; stood up under ISAGCA. 1,400
volunteers; over 850 companies www.ics4ics.org
ISA99 Committee – The ISA99 Standards committee is the origin of the ISA/IEC 62443
Standards. ISA99 Working groups draft and approve the ISA/IEC 62443 standards for
ISA99 submission to ANSI and IEC for approval as international standards.
Committee Over 1,500 volunteers www.isa.org/ISA99
ISA Education & Training – Education and training in all industrial automation and control
ISA systems topics, including cybersecurity.
Education Over 4,000 students in 2023. https://www.isa.org/training
ISA Conformity Assessment Program
International Society of
Automation (ISA)
501c3
Established 1949
ISA Conformity
Assessment Subsidiary
501c6
Established 2005
ISCI
ISA Security
Compliance Institute
2024 ISA Conformity Assessment Board
Chairman
ISA Past President
(Marty Bince) Prabhu Soundarrajan 2025
• Meets ANAB FM 5116 “Suitability of Schemes” requirements, and IAF MD25 and EA-1/22
for EU suitability of schemes.
• 2010 - First OT COTS certification scheme requiring ISO 17065 accredited certification
bodies, independently accredited by ISO 17011 Accreditation Bodies.
• 2011-First OT certification scheme to certify a safety system for nuclear sites (RTP Corp.).
• 2022-First and only ISA/IEC 62443 OT certification scheme for IIoT devices and gateway.
• 2023-Policies for certifying product families and for certifying OEM/relabeled products.
ISA/IEC 62443 Automation Security Lifecycle and
Shared Stakeholder Responsibility for Cybersecurity
Asset Owner – Leverage Standards:
• Part 1-1 – Concepts and models Asset Owners
•
•
Part 2-1 – Security program requirements
Part 2-2 – Security protection rating
Operate and Maintain
•
•
Part 2-3 – Patch management
Part 3-2 – Risk assessment and system design
Site Specific Systems
Maintenance Service Provider – Leverage Standards:
• Part 1-1 – Concepts and models
• Part 2-4 – Service providers
Integration Service Provider - Leverage Standards:
• Part 1-1 – Concepts and models
Integrators/Asset Owners
• Part 2-4 – Service providers Engineer and Integrate COTS
•
•
Part 3-2 – Risk assessment and system design
Part 3-3 – System requirements and security levels
into Site Specific Systems
Product Supplier - Leverage Standards:
• Part 1-1 – Concepts and models Product Suppliers
•
•
Part 3-3 – System requirements and security levels
Part 4-1 – Security development lifecycle
Design and Manufacture
• Part 4-2 – Component requirements COTS Control Systems
Phase I Study - IIOT Component Certification Based on the ISA/IEC 62443 Standards
https://gca.isa.org/iiot-component-certification-based-on-62443
Phase II Study - IIOT System Implementation and Certification Based on ISA/IEC 62443 Standards
(includes cloud provider)- https://isasecure.org/learning-center
Development Process versus Product Certifications
• ISCI is now recommending that suppliers certify to level 2 or higher. ISCI SL-1 certifications still
ensures that the supplier’s SDLA is at maturity level 3 or higher.
• OPAF (Open Process Automation Forum) standardized on level 2 or higher for their OPA Specification.
ISA/IEC 62443-4-1 (development process)
Security Development Lifecycle Assurance (SDLA)
1) Define scope of evaluation (companywide, division, product line, geographic location, other)
2) Organization must have a formal, defined SDL (System Development Lifecycle) methodology
4) Product supplier’s SDL must include all of the requirements in the eight practice areas
defined in the ISA/IEC 62443 standard. (this is what the auditor evaluates)
6) ISASecure requires maturity level 3 or better to pass. While the standard provides
‘informative’ definitions for 4 levels of process maturity, it is improper to publish them on a
certificate. So, while we do not publish the maturity level on the certificate, all ISASecure
certifications conform to the level 3 definition or better.
Eight Practice Areas in ISA/IEC 62443-4-1 (SDLA)
One through Four
Practice 1 Security Management (SM) The purpose of the security management practice is to ensure
that the security-related activities are adequately planned, documented and executed throughout the product’s
lifecycle
Practice 2 Specification of Security Requirements (SR) The processes specified by this practice are
used to document the security capabilities that are required for a product along with the expected product
security context
Practice 3 Secure by Design (SD) The processes specified by this practice are used to ensure that the
product is secure by design including defense in depth
Practice 4 Secure Implementation (SI) The processes specified by this practice are used to ensure that
the product features are implemented securely
Eight Practice Areas in ISA/IEC 62443-4-1 (SDLA)
Five through Eight
Practice 5 Security Verification and Validation Testing (SVV) The processes specified by this practice
are used to document the security testing required to ensure that all of the security requirements have been
met for the product and that the security of the product is maintained when it is used in its product security
context
Practice 6 Security Defect Management (DM) The processes specified by this practice are used for
handling security-related issues of a product that has been configured to employ its defense in depth strategy
(Practice 3) within the product security context (Practice 2)
Practice 7 Security Update Management (SUM) The processes specified by this practice are used to
ensure security updates associated with the product are tested for regressions and made available to product
users in a timely manner
Practice 8 Security Guidelines (SG) The processes specified by this practice are used to provide
documentation that describes how to integrate, configure, and maintain the defense in depth strategy of the
product in accordance with its product security context
ISA/IEC 62443-4-1 Inventory Requirements
The ISA/IEC 62443-4-1 standard includes a number of supplier requirements for
maintaining an ‘inventory’ of items comprising the component/system. SBOM’s are
one approach for meeting the inventory requirements for software. Inventory
requirements include:
• Software components
• Hardware components
• Compilers
• Configuration control
• Development and test applications (SUM-1, others)
• Third party and open-source components (SM-9, SM-10, others)
An ISASecure specification with these requirements can be downloaded for free using the following link:
• ISASecure ISA/IEC 62443-4-1 assessment matrix
ISA/IEC 62443-4-2 Component Security Assurance (CSA)
1) Product must be under configuration control and managed within the
organization’s certified SDL methodology.
2) Product development artifacts are audited to confirm that the product is properly
using the organization’s SDL certified to 62443-4-1. This includes audits of testing.
3) Products are VIT (vulnerability identification test) tested with Tenable Nessus
Scanner to confirm no known vulnerabilities exist.
6) ISASecure recommends security level 2 or better but will certify to any level
requested by the supplier.
ISA/IEC 62443-4-2 IIoT Component Security Assurance (ICSA)
1) Same requirements and rules as the CSA certification with the following
adaptations to account for IIoT characteristics.
a) Four requirements from ISA/IEC 62443-4-2 are dropped and sixteen new
requirements are added for things like secure boot, no zones and conduits, etc.
b) Allows only two security capability levels beginning with SL-3+ and then SL-4.
SL-1 and SL-2 are insufficient for IIOT devices and gateways.
2) Product development artifacts are audited to confirm that the product is properly
using the organization’s SDL certified to 62443-4-1. This includes audits of testing.
3) Products are VIT (vulnerability identification test) tested with Tenable Nessus
Scanner to confirm no known vulnerabilities exist.
6) ISASecure recommends security level 2 or better but will certify to any level
requested by the supplier.
Asset Owner Operating Site Assessment/Certification
ISA/IEC 62443 Asset “Core” ISASecure ACSSA Program
Owner Standards
(346 requirements)
Assessment Certification
62443-2-1 – Security
program Assessment
Certification Definition
requirements Specification & Report
Pass/fail
Standardized assessment
Program policies and procedures
methods, tools, and report.
62443-3-2 – Risk ISASecure TSC
assessment and Develops
Three-day Training Assessor Company
system design Specifications
Class Accreditation
Asset owner standards, ACSSA ISO 17020 and scheme specific
62443-3-3 – System assessment methodology requitements
requirements and
security levels Assessor Personnel
Specification Licensing
Credential Program
Agreements
Profile, education, experience,
62443-2-4 – Service End-users, consultants, CB, other
certifications
provider
Requirements
Planned Milestone Dates for Phase One
• Q3 2024 – ACSSA assessment specifications complete
[email protected]
[email protected]
[email protected]
[email protected]
(704) 945-1900
[email protected]