Engineered and technical controls pertain to Supply Chain Security aspects of Industrial Control System
Amit Singh
Sr. Control Systems & Instrumentation Engineering Professional I Functionally Safe & Cyber Secured Critical OT Infra Engineering Specialist I IEC 61511 FSE Certified TUV I ISA99/IEC 62443 Certified Fundamental Specialist
Supply chain security in the context of Industrial Control System (ICS) security covers a wide range of aspects that aim to protect the ICS from vulnerabilities introduced through the supply chain. The IEC 62443 series of standards provides comprehensive guidelines and requirements for securing ICS, including aspects related to supply chain security.
While formulating ICS security Framework OR Scope of Work for technical bid evaluations either for hardening of existing brownfield ICS infrastructure, upgrades, migrations OR new greenfield System under Consideration (SuC) for upcoming critical infrastructure/projects, Following are the key aspects to consider in compliance to IEC 62443 series:
Aspects of Supply Chain Security
2. Secure Procurement Practices
3. Component Integrity and Authenticity
4. Secure Development Lifecycle (SDL)
5. Transparency and Traceability
6. Security Testing and Validation
7. Incident Response and Management
8. Regulatory Compliance
How ICS Supply Chain security can be driven systematically in line with IEC 62443 series
The IEC 62443 series of standards is specifically designed to address the cybersecurity of industrial automation and control systems. It provides a framework that includes requirements and guidelines for securing the supply chain. The relevant parts of the IEC 62443 series that cover supply chain security include as follows:
领英推荐
i) IEC 62443-2-4: Security Program Requirements for IACS Service Providers
ii) IEC 62443-3-3: System Security Requirements and Security Levels
iii) IEC 62443-4-1: Secure Product Development Lifecycle Requirements
iv) IEC 62443-4-2: Technical Security Requirements for IACS Components
Likewise, any other Lifecycle management program auditing, benchmarking and compliance with reference to defined performance standards such as PSM or Functional Safety management (IEC61508/51511), Quality Management System (ISO9001) etc.; there are involvements of internal and external stakeholders with defined roles and responsibilities which is part of Lifecycle and driven systematically to all phases such as concept, design engineering, deployment, testing & implementation and maintaining up to decommissioning or end of the life.
As a part of Industrial Control System security program, maintaining integrity of system requirements as a whole is paramount for System under Consideration / respective ICS infrastructure to be effective at each and every phases.
Consider an example that particular industrial complex asset/plan considered ICS infrastructure have gone through risk assessment process and outcome is to maintain Security Level-2 (SL2) OR Security Level-3 (SL3) for respective zones / conduits. What does it mean exactly in broader prospect of engineering, design, testing & deployment?
Based on these understandings we need to be clear that most of the threat actors be it intentional OR unintentional, internal OR external the cause of impact initiates from any of the component hardware involvement, software triggered or due to configurational gaps but remains overlooks sometimes which arises as "vulnerabilities" sooner or later. I am highlighting these points because of following reasons:
NOTE: Sometime sub-vendor/supplier info asked to furnish by System Integrators but not with core purpose of understanding this aspect but to maintain long term spares and services.
Being an end-user OR asset owner, one should clearly keep in mind that Industrial Control System security management is not just creating the engineered control defense ion depth barriers, patch management, upgrades etc. but it is a wholistic approach which will not be effective without involving each stakeholder of involved pieces/components/system requirements integrity.
Product/components suppliers of Industrial Control System is of the key stakeholder's design, development & implementation phase whole tight lesioning goes along with successful System Integrator/Main Automation Vendor however accountabilities and responsibilities shall be well defined as a part of Industial Control System Framework to be answerable from above raise aspects.
During one of the technical clarification's sessions, I remember while raised the question to one of the System Integrator that why these particular pieces and components "Common Vulnerabilities and Exposures (CVEs)", updates and outdates is not well informed in advance than getting information from open sources & similar question regarding obsolescence and upgrades such as OS, Network Switches, Firewalls etc... answer was quite simple as "these are not directly driven by respective system integrator company but driven by xyz vendors which is beyond their control" which is something any asset owner/end-user would like to listen specially in context to supply chain security aspect. This is why a well frames strategy shall be formulated also considering the fact now a days many independent agencies have competency for such compliance criteria such as TUV, ISCI, UL etc.; to make sure that respective phases of product development security assessments are in matured enough state including development lifecycle, system security requirements and device/components secured by hardware, software and configuration point of view followed by independent verifications and validation process in place within Organization OR by 3rd parties.