[OT Sec] Selection and Application of Security Levels (SL) for IACS Based on ISA/IEC 62443

Detailed Analysis of Security Level (SL) Determination in ISA/IEC 62443

The selection of Security Levels (SL) for Industrial Automation and Control Systems (IACS) is clearly defined in the ISA/IEC 62443 series of standards. As IACS environments become more complex, it is not practical to apply a single security level across the entire system. Instead, security levels should be applied per zone and conduit, based on a layered architecture. Moreover, SL determination should not be based solely on the number of vulnerabilities but rather on a comprehensive risk assessment, including the attacker’s capability and system criticality.

This document presents a detailed approach to SL selection, criteria, and application scenarios, including the meaning and use cases for SL 0.


1. SL Determination Approach in IACS: Entire System vs. Zone/Conduit-Based Approach

When defining the SL for an IACS, it is recommended to use a zone and conduit-based model, rather than applying one uniform level to the entire system. This approach is based on the Zone & Conduit Model defined in ISA/IEC 62443-3-2.

1) Zone & Conduit Model (ISA/IEC 62443-3-2)

In this model, the IACS network is divided into Zones and Conduits, and a risk assessment is conducted for each zone to determine the Target Security Level (SL-T).

  • Zone: A group of assets sharing similar security requirements
    • Examples: MES systems, process control networks, Safety Instrumented Systems (SIS)
  • Conduit: Communication pathways between zones
    • Examples: Firewalled interfaces between IT and OT networks

Examples:

  • IT network ↔ OT network: SL 3 or higher
  • SCADA ↔ PLC network: SL 2–3
  • Isolated safety systems: SL 4 may be applied

Each Zone and Conduit has a designated SL-T based on risk, and the system is not assigned a single SL for the entire architecture.

2) Component-Based SL Determination (ISA/IEC 62443-4-2)

ISA/IEC 62443-4-2 defines SL requirements for individual components such as PLCs, HMIs, and SCADA servers.

  • SCADA Server → SL 3 (requires strong authentication and encryption)
  • HMI → SL 2 (requires basic access control and logging)
  • Basic PLC → SL 1 (minimal password protection)

To effectively set SLs, both zone-based (ISA/IEC 62443-3-2) and component-based (ISA/IEC 62443-4-2) models should be integrated.


2. Criteria and Methodology for SL Selection

SL determination is not based on the number of vulnerabilities alone. It is a multi-faceted process that incorporates several key factors:

1) Risk-Based SL Selection (ISA/IEC 62443-3-2)

Risk assessment is the core method for SL determination. Key considerations include:

  • Asset Criticality:
    • Evaluate the importance of the system in operational processes.
    • Example: If a Safety System failure could lead to injury, a higher SL is required.
  • Attack Surface:
    • Systems connected to IT networks or the internet require a higher SL.
  • Threat Scenarios:
    • Potential insider threats, Zero-day attack risks, etc.

The outcome of this assessment determines the SL-T (Target Security Level). A gap analysis is then conducted by comparing SL-C (Achieved Security Level) with SL-T.

2) Attacker Capability-Based SL Selection (ISA/IEC 62443-3-3)

ISA/IEC 62443-3-3 categorizes SLs based on the attacker’s sophistication and capabilities:

SLAttacker TypeAttack Techniques
SL 1Basic internal attackerSimple password cracking
SL 2Skilled insiderNetwork packet manipulation
SL 3External attackerVulnerability scanning, exploitation
SL 4Nation-state-level attackerAdvanced Persistent Threats (APT), zero-day

Higher SLs require stronger security controls accordingly.

Certain industries require higher SLs due to regulatory obligations:

  • Power sector: IEC 62443 + NERC CIP → SL 3 minimum
  • Petrochemical plants: SL 2–3 typically required
  • Defense industry: NIST 800-82 → SL 4 may be mandated

3. Meaning and Application of SL 0

SL 0 indicates that no specific cybersecurity measures are required. It is applicable in special cases:

1) Physically Isolated Systems

  • Standalone systems with no network connectivity
    • Example: Simple mechanical devices used within a factory

2) Non-critical environments

  • Laboratory test equipment with no external exposure

3) Legacy Systems

  • Very old systems (e.g., 20+ year-old DCS) not designed with cybersecurity in mind

Even in SL 0 cases, physical security controls may still be necessary. However, most industrial environments require at least SL 1 or higher.


Conclusion

  • Security levels in IACS should be determined per zone and component, not for the entire system.
  • SL selection must be based on risk assessment, attacker capability, and industry regulations, not on the number of vulnerabilities.
  • SL 0 means no cybersecurity controls, but its application is limited to very specific scenarios.
  • Effective SL application requires tailoring the security architecture to the specific operational and threat environment of the industry.

Similar Posts

답글 남기기

이메일 주소는 공개되지 않습니다. 필수 필드는 *로 표시됩니다