How to implement zone as per IEC 62443 ?
Prashanth AC
CEO & Founder, ICSBit Labs | IEC 62443 Expert, Implementer | Certified ISA 62443 Instructor | SIS | NERC-CIP | SDLC for OT product & system
If you worked or discussed about IEC 62443, you must have also discussed about zoning and conduiting as one of the core requirement to secure an IACS.
IEC 62443 revolves around zoning and it acts as a fundamental activity to set security levels, security policy and compliances. One cannot have effective implementation of IEC 62443 without having optimum zoning.
Although zoning is basically described as "A security zone is a physical/ logical grouping of physical, informational, and application assets sharing common security requirements", it is important to understand What, Why and How of this concept.
What is zone ?
Let's dive deep into IEC 62443 for more understanding of zones.
Following points depict the concept of zones.
Few implementation of zones
2. Separate zones, each with security levels and security policy defined.
领英推荐
Why zone ?
Zone is the basic requirement for implementing IEC 62443. It is basis for the following
If the zoning is not optimum, it will perpetuate the error across CSMS, thus demanding rework, patch, budget, time and resources.
How to implement a zone ?
As per IEC 62443 few of the models can be used to define zones and conduits (communication zones). Below picture depicts a simplified form of it. It can be more related to greenfield and can be adopted for brownfield along with strategically planned change management.
Here,
Security levels are functions of time, which means, countermeasures will deteriorate over time due to dynamic nature of cybersecurity. Hence, it should be repeated at a predefined trigger points.
Conclusion
Recently we have seen many of the compromises on state owned critical infrastructure. RCAs mention one of the core reason as no defence-in-depth or no segregated networks. This is nothing but the above mentioned activities regarding zoning. If this is done with due diligence, we can make activities of adversaries, uneconomic or unsustainable, and prevent major incidents.