Shopping Cart

No products in the cart.

BS EN 62443-2-1:2010:2011 Edition

$215.11

Industrial communication networks. Network and system security – Establishing an industrial automation and control system security program

Published By Publication Date Number of Pages
BSI 2011 164
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. Weโ€™re here to assist you 24/7.
Email:[email protected]

IEC 62443-2-1:2010 defines the elements necessary to establish a cyber security management system (CSMS) for industrial automation and control systems (IACS) and provides guidance on how to develop those elements. This standard uses the broad definition and scope of what constitutes an IACS described in IEC/TS 62443-1-1. The elements of a CSMS described in this standard are mostly policy, procedure, practice and personnel related, describing what shall or should be included in the final CSMS for the organization. This bilingual version (2012-04) corresponds to the monolingual English version, published in 2010-11.

PDF Catalog

PDF Pages PDF Title
4 CONTENTS
7 FOREWORD
9 0 INTRODUCTION
0.1 Overview
0.2 A cyber security management system for IACS
0.3 Relationship between this standard and ISO/IEC 17799 and ISO/IEC 27001
11 1 Scope
2 Normative references
3 Terms, definitions, abbreviated terms, acronyms, and conventions
3.1 Terms and definitions
16 3.2 Abbreviated terms and acronyms
18 3.3 Conventions
4 Elements of a cyber security management system
4.1 Overview
19 Figures
Figure 1 โ€“ Graphical view of elements of a cyber security management system
20 4.2 Category: Risk analysis
Figure 2 โ€“ Graphical view of category: Risk analysis
Tables
Table 1 โ€“ Business rationale: Requirements
21 Table 2 โ€“ Risk identification, classification and assessment: Requirements
22 4.3 Category: Addressing risk with the CSMS
Figure 3 โ€“ Graphical view of element group:Security policy, organization and awareness
23 Table 3 โ€“ CSMS scope: Requirements
24 Table 4 โ€“ Organizing for security: Requirements
Table 5 โ€“ Staff training and security awareness: Requirements
25 Table 6 โ€“ Business continuity plan: Requirements
26 Table 7 โ€“ Security policies and procedures: Requirements
27 Figure 4 โ€“ Graphical view of element group: Selected security countermeasures
28 Table 8 โ€“ Personnel security: Requirements
29 Table 9 โ€“ Physical and environmental security: Requirements
30 Table 10 โ€“ Network segmentation: Requirements
31 Table 11 โ€“ Access control โ€“ Account administration: Requirements
32 Table 12 โ€“ Access control โ€“ Authentication: Requirements
33 Table 13 โ€“ Access control โ€“ Authorization: Requirements
34 Figure 5 โ€“ Graphical view of element group: Implementation
35 Table 14 โ€“ Risk management and implementation: Requirements
Table 15 โ€“ System development and maintenance: Requirements
36 Table 16 โ€“ Information and document management: Requirements
37 Table 17 โ€“ Incident planning and response: Requirements
38 4.4 Category: Monitoring and improving the CSMS
Figure 6 โ€“ Graphical view of category: Monitoring and improving the CSMS
39 Table 18 โ€“ Conformance: Requirements
40 Table 19 โ€“ Review, improve and maintain the CSMS: Requirements
41 Annex A (informative) Guidance for developing the elements of a CSMS
42 Figure A.1 โ€“ Graphical view of elements of a cyber security management system
Figure A.2 โ€“ Graphical view of category: Risk analysis
46 Figure A.3 โ€“ Reported attacks on computer systems through 2004 (source: CERT)
54 Table A.1 โ€“ Typical likelihood scale
56 Table A.2 โ€“ Typical consequence scale
57 Table A.3 โ€“ Typical risk level matrix
59 Figure A.4 โ€“ Sample logical IACS data collection sheet
61 Figure A.5 โ€“ Example of a graphically rich logical network diagram
68 Figure A.6 โ€“ Graphical view of element group:Security policy, organization, and awareness
84 Figure A.7 โ€“ Graphical view of element group: Selected security countermeasures
92 Figure A.8 โ€“ Reference architecture alignment with an example segmented architecture
97 Figure A.10 โ€“ Access control: Account administration
100 Figure A.11 โ€“ Access control: Authentication
105 Figure A.12 โ€“ Access control: Authorization
108 Figure A.13 โ€“ Graphical view of element group: Implementation
109 Table A.4 โ€“ Example countermeasures and practices based on IACS risk levels
111 Figure A.14 โ€“ Security level lifecycle model: Assess phase
112 Table A.5 โ€“ Example IACS asset table with assessment results
Table A.6 โ€“ Example IACS asset table with assessment results and risk levels
114 Figure A.15 โ€“ Corporate security zone template architecture
115 Figure A.16 โ€“ Security zones for an example IACS
116 Table A.7 โ€“ Target security levels for an example IACS
118 Figure A.17 โ€“ Security level lifecycle model: Develop and implement phase
122 Figure A.18 โ€“ Security level lifecycle model: Maintain phase
135 Figure A.19 โ€“ Graphical view of category: Monitoring and improving the CSMS
142 Annex B (informative) Process to develop a CSMS
Figure B.1 โ€“ Top level activities for establishing a CSMS
144 Figure B.2 โ€“ Activities and dependencies for activity: Initiate CSMS program
145 Figure B.3 โ€“ Activities and dependencies for activity: High-level risk assessment
146 Figure B.4 โ€“ Activities and dependencies for activity: Detailed risk assessment
Figure B.5 โ€“ Activities and dependencies for activity: Establish security policy, organization and awareness
147 Figure B.6 โ€“ Training and assignment of organization responsibilities
148 Figure B.7 โ€“ Activities and dependencies for activity:Select and implement countermeasures
149 Figure B.8 โ€“ Activities and dependencies for activity: Maintain the CSMS
150 Annex C (informative) Mapping of requirements to ISO/IEC 27001
Table C.1 โ€“ Mapping of requirements in this standard to ISO/IEC 27001 references
154 Table C.2 โ€“ Mapping of ISO/IEC 27001 requirements to this standard
158 Bibliography
BS EN 62443-2-1:2010
$215.11