[OT Sec] Understanding SIL and SL – Essential Foundations for OT System Design

✅ 1. SIL (Safety Integrity Level)

🔎 Definition

SIL (Safety Integrity Level) is a quantitative measure representing the reliability of safety functions within industrial systems. It indicates how reliably a designed safety function can prevent incidents that could harm people, equipment, or the environment.

📘 Applicable Standards

  • IEC 61508: General functional safety standard across industries (foundation for all SIL definitions)
  • IEC 61511: Process industry-specific (oil refining, chemicals)
  • IEC 62061: Machinery safety
  • ISO 26262: Automotive industry (branching into ASIL)

🧠 Key Elements for SIL Assessment

SIL levels are determined based on four key steps:

  1. Hazard Identification
  2. Risk Analysis
  3. Determining Required Risk Reduction
  4. Target SIL Determination

Example: A gas leak poses explosion risk → emergency valve closure must reliably activate → SIL 3 required.

📊 SIL Levels & Probability of Failure

SIL LevelProbability of Failure per Hour (PFH)Example Applications
SIL 1≥10⁻⁶ ~ <10⁻⁵/hourGeneral warning systems, no emergency shutdown required
SIL 2≥10⁻⁷ ~ <10⁻⁶/hourRegular process shutdown, hazardous material management
SIL 3≥10⁻⁸ ~ <10⁻⁷/hourGas shutoff valves, high-pressure steam controls
SIL 4≥10⁻⁹ ~ <10⁻⁸/hourNuclear plants, high-speed railway braking systems

Note: SIL 4 is rare in practical industries; most facilities require SIL 2~3.

✅ 2. SL (Security Level)

🔎 Definition

SL (Security Level) assesses the cybersecurity strength of industrial control systems (ICS/SCADA, DCS, PLC) against various attacker capabilities. Defined by IEC 62443 standards, it quantifies the system’s security robustness into four maturity levels based on potential attackers.

📘 Related Standards (IEC 62443)

StandardDescription
IEC 62443-1-1 ~ 1-4Definitions, structure, conceptual framework
IEC 62443-2-xPolicies, operations, governance (management)
IEC 62443-3-3System security requirements (Core for SL)
IEC 62443-4-2Component-specific security requirements (PLC, HMI, etc.)

🧠 SL Levels & Attacker Profiles

SL LevelAttacker CapabilityRequired Security Controls
SL 1Random or accidental intrudersBasic access control, password management
SL 2General hackers (basic technical skills)Authentication, vulnerability mitigation, basic network protection
SL 3Advanced hackers, insiders, advanced toolsZone-based security, detailed access controls, logging, integrity checks
SL 4Nation-state APT, high resourcesMulti-factor authentication, advanced threat detection, isolation, real-time response systems

SL is further categorized into Target Security Level (SL-T), Capability Security Level (SL-C), and Achieved Security Level (SL-A).

🔍 SIL vs. SL: Key Differences

CriteriaSIL (Safety Integrity Level)SL (Security Level)
PurposeReduce physical risk from functional failuresProtect systems from cyberattacks
ApproachReliability-based (probabilistic)Threat-based (security-focused)
Asset FocusPhysical safety devices (SIS, sensors, valves)Digital assets (PLC, HMI, networks)
Evaluation BasisProbability of failure (PFD/PFH)Checklist of security requirements
StandardsIEC 61508, IEC 61511IEC 62443-3-3, 4-2
Key PersonnelFunctional safety engineersOT security engineers, CISO

🏭 Practical Application Examples

Example 1: Chemical Plant Gas Detection and Isolation System

  • SIL: Gas leak detection and automatic valve closure → SIL 3 required.
  • SL: Protect valve operation from remote intrusion → SL 3 needed.

Example 2: Power Plant Control Systems

  • SIL: Automatic shutdown upon overpressure → SIL 2 or higher.
  • SL: SCADA hacking prevention → authentication, logging, isolation (SL 2~3).

Example 3: Railway Systems

  • SIL: Signal control malfunction could cause severe accidents → SIL 4.
  • SL: Prevent remote hacking of train control systems → SL 3~4.

🧩 Integrating SIL and SL in OT System Design

While SIL and SL originated from different disciplines—functional safety and cybersecurity—they must be integrated within modern OT system designs.

🔄 Examples of Integrated Strategy

Integration PointExplanation
Security Design to Protect Safety FunctionsSIL 3 emergency stop must include SL 3 access controls
Evaluating Security Threats as Safety RisksLinking Threat Modeling (security) with HAZOP/LOPA (safety)
Standards IntegrationJoint application of ISA/IEC 62443, ISO 27001, IEC 61511 standards

Without collaboration between safety and security teams, even high SIL-rated systems can fail due to cybersecurity vulnerabilities.

🎯 Summary

Key QuestionSILSL
What is protected?Lives and physical assetsDigital assets and control systems
Assessment BasisReliability, probability of failureAttacker capability, threat scenarios
Applied toSafety Instrumented Systems (SIS), ESD, pressure controlsICS, SCADA, PLC, networks
RelationshipComplementary; managing them separately increases risk

Similar Posts

답글 남기기

이메일 주소는 공개되지 않습니다. 필수 필드는 *로 표시됩니다